Security News
![Crooks crack customer info at tracking device vendor Tile, issue 'extortion' demands](/static/build/img/news/crooks-crack-customer-info-at-tracking-device-vendor-tile-issue-extortion-demands-small.jpg)
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
![OpenAI, Meta, and TikTok Crack Down on Covert Influence Campaigns, Some AI-Powered](/static/build/img/news/openai-meta-and-tiktok-crack-down-on-covert-influence-campaigns-some-ai-powered-small.jpg)
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence...
![Google to crack down on third-party YouTube apps that block ads](/static/build/img/news/google-to-crack-down-on-third-party-youtube-apps-that-block-ads-small.jpg)
YouTube announced yesterday that third-party applications that block ads while watching YouTube videos violates its Terms of Service, and it will soon start taking action against the apps. Google exposes numerous APIs allowing developers to integrate YouTube into their applications, showing videos or retrieving data about videos hosted on the platform.
![How malicious email campaigns continue to slip through the cracks](/static/build/img/news/how-malicious-email-campaigns-continue-to-slip-through-the-cracks-small.jpg)
In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have found that malicious email threats bypassing secure email gateways increased over 100% in the past year.
![Canonical cracks down on crypto cons following Snap Store scam spree](/static/build/img/news/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree-small.jpg)
Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.
![U.S. Cracks Down on Predatory Spyware Firm for Targeting Officials and Journalists](/static/build/img/news/u-s-cracks-down-on-predatory-spyware-firm-for-targeting-officials-and-journalists-small.jpg)
The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and five entities associated with the Intellexa Alliance for their role in “developing,...
![Korean eggheads crack Rhysida ransomware and release free decryptor tool](/static/build/img/news/korean-eggheads-crack-rhysida-ransomware-and-release-free-decryptor-tool-small.jpg)
Some smart folks have found a way to automatically unscramble documents encrypted by the Rhysida ransomware, and used that know-how to produce and release a handy recovery tool for victims. Rhysida is a newish ransomware gang that has been around since May last year.
![Raspberry Pi Pico cracks BitLocker in under a minute](/static/build/img/news/raspberry-pi-pico-cracks-bitlocker-in-under-a-minute-small.jpg)
We're very familiar with the many projects in which Raspberry Pi hardware is used, from giving old computers a new lease of life through to running the animated displays so beloved by retailers. The technique was published in a YouTube video over the weekend and demonstrated how a Raspberry Pi Pico can be used to gain access to a BitLocker-secured device in under a minute, provided you have physical access to the device.
![Microsoft Takes Legal Action to Crack Down on Storm-1152's Cybercrime Network](/static/build/img/news/microsoft-takes-legal-action-to-crack-down-on-storm-1152-s-cybercrime-network-small.jpg)
Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a group called Storm-1152 that peddled roughly 750 million fraudulent Microsoft accounts and tools through a...
![U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses](/static/build/img/news/u-s-doj-cracks-down-on-north-korean-it-scammers-defrauding-global-businesses-small.jpg)
The U.S. government has announced the seizure of 17 website domains used by North Korean information technology (IT) workers as part of an illicit scheme to defraud businesses across the world,...