Economy
-
Encryption made for police and military radios may be easily cracked
Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by…
Read More » -
It’s getting harder to skirt RTO policies without employers noticing
Companies are monitoring whether employees adhere to corporate return-to-office (RTO) policies and are enforcing the requirements more than they have…
Read More » -
Adult sites are stashing exploit code inside racy .svg files
Dozens of porn sites are turning to a familiar source to generate likes on Facebook—malware that causes browsers to surreptitiously…
Read More » -
Google discovered a new scam—and also fell victim to it
In June, Google said it unearthed a campaign that was mass-compromising accounts belonging to customers of Salesforce. The means: an…
Read More » -
OpenAI launches GPT-5 free to all ChatGPT users
On Thursday, OpenAI announced GPT-5 and three variants—GPT-5 Pro, GPT-5 mini, and GPT-5 nano—what the company calls its “best AI…
Read More » -
Here’s how deepfake vishing attacks work, and why they can be hard to detect
By now, you’ve likely heard of fraudulent calls that use AI to clone the voices of people the call recipient…
Read More » -
Voice phishers strike again, this time hitting Cisco
Cisco said that one of its representatives fell victim to a voice phishing attack that allowed threat actors to download…
Read More » -
AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says
AI search engine Perplexity is using stealth bots and other tactics to evade websites’ no-crawl directives, an allegation that if…
Read More » -
At $250 million, top AI salaries dwarf those of the Manhattan Project and the Space Race
Silicon Valley’s AI talent war just reached a compensation milestone that makes even the most legendary scientific achievements of the…
Read More » -
Microsoft catches Russian hackers targeting foreign embassies
Russian-state hackers are targeting foreign embassies in Moscow with custom malware that gets installed using adversary-in-the-middle attacks that operate at…
Read More »