Amazon was caught red-handed, handing over Ring doorbell footage to law enforcement agencies without user permission, subpoenas, warrants, without any of the traditional legal controls which prevent liberal disclosure of non-public data to law enforcement. This disclosure was set to further ignite ongoing debates about privacy and civil liberties in relation to the tech giant’s video-sharing agreements with police departments nationwide.
Concerns over the potential impact of tech company layoffs on the integrity of the 2024 elections are being raised by three U.S. senators. Democratic Senators Amy Klobuchar from Minnesota, Peter Welch from Vermont, and Dick Durbin from Illinois are questioning whether recent workforce reductions at Meta (formerly Facebook), Alphabet (the parent company of Google), and Twitter could compromise the fight against misinformation.
In an ongoing effort to secure its products against cyber threats, Apple has successfully addressed three new zero-day vulnerabilities that were under exploitation. These vulnerabilities, weaponized by cyber attackers, facilitated the installation of Triangulation spyware on iPhones using zero-click exploits in iMessage.
Today, we’re drawing your attention to a sinister new scam flourishing on social marketplaces like Facebook’s Marketplace. This time, digital wallets are under threat, with the likes of Venmo, PayPal, and other cash transfer apps falling victim to these deceptive practices.
Cyber Crime Chronicles: Unmasking the ‘CLOP Ransomware’ Attack on U.S. Federal Government and NATO Allies
Welcome to another deep dive from The Internet Patrol, where we unearth the Internet’s most complex and impactful stories for your edification. In today’s exploration, we delve into a major cyber attack that has, unfortunately, compromised the security of the U.S. federal government and allies, including NATO members.
Researchers Sound the Alarm as Extortionists Target Victims Using File-Transfer Software
Digital security firm Kaspersky has posted information about a recent cyberattack that targeted the iPhones of Kaspersky employees, which were infected with spyware that is part of a campaign the company dubbed, “Operation Triangulation.”
In what is seen by many as an alarming move, the UK Government has been discretely expanding a contentious surveillance technology with the potential to log and store the internet histories of millions of individuals.
Let’s face it, we’re all in constant pursuit of that elusive 100% battery. And when we hear about ‘fast charging’, it’s like music to our ears. But here’s a poser: can you fast-charge your iPhone or iPad using a beefier USB-C charger from your MacBook Pro or MacBook Air?
DOJ and Five Eyes Coalition Triumph over Turla: Russian Cyber-Espionage Network Dismantled Amid Concerns for Global Cybersecurity
In a landmark victory for global cybersecurity, the U.S. Department of Justice (DOJ), alongside the intelligence agencies of the Five Eyes alliance, has successfully disrupted the cyber-espionage activities of Turla, a notorious cybercrime group linked to Russia. Turla, known for its advanced cyber-espionage techniques, has been a persistent thorn in the side of international cyber defense.
Navigating the Cyber Seas: Unmasking and Dodging the Latest Email Phishing Scams Like a Seasoned Mariner!
Ahoy, digital sailors! Today, we’re embarking on a thrilling voyage to navigate the treacherous waters of the internet. Our mission? To help you, our dear readers, spot and avoid the latest phishing scams that are swimming around in your email inbox, just waiting to take a bite out of your…
According to a new report, ransomware attacks are still a major issue for organizations, and many are still choosing to pay the ransom.
Public charging stations in places such as airports, malls, and hotels are convenient for keeping your devices charged up when you’re on the go. However, according to the FBI’s Denver field office, these free charging stations are increasingly being hijacked by bad actors who use them to infect devices with malware that can steal sensitive data. They advise users to avoid using these public USB ports and to carry their own charger and USB cord and use an electrical outlet instead.
“Artificial Intelligence (AI) is transforming the way we live and work, just like the internet did.”
Claims like these have become common in the media and academic journals. Large language models (LLMs) are algorithms that form the basis of this type of AI.