Web portal leaves kids’ chats with AI toy open to anyone with Gmail account
Just about anyone with a Gmail account could access Bondu chat transcripts.
Just about anyone with a Gmail account could access Bondu chat transcripts.
Settlement comes more than 6 years after Gary DeMercurio and Justin Wynn’s ordeal began.
One of the last holdouts for ransomware discussions, RAMP is taken down.
Abusing Microsoft’s reputation may make scam harder to spot.
Company’s autodiscover caused users’ test credentials to be sent outside Microsoft networks.
Storing recovery keys with Microsoft allows the company to unlock your disk.
Destructive payload unleashed on tenth anniversary of Russia’s attack on Ukraine’s grid.
The onslaught includes LLMs finding bogus vulnerabilities and code that won’t compile.
Crypto theft was “the worst thing I had ever done.”
Windows laggards still using the vulnerable hashing function: Your days are numbered.
NYT says US hackers were able to turn off power and then quickly turn it back on.
Even Google’s own earbuds are vulnerable to the Fast Pair hack.
Exploit exfiltrating data from chat histories worked even after users closed chat windows.
Scheme allegedly cost taxpayers $150,000.
VoidLink includes an unusually broad and advanced array of capabilities.
Introducing Confer, an end-to-end AI assistant that just works.
SpaceX opened its 2026 launch campaign with a mission for the Italian government.
Spying doesn’t become legal just because “cheaters” are the targets.
Will LLMs ever be able to stamp out the root cause of these attacks? Possibly not.
Californians can now submit demands requiring 500 brokers to delete their data.
The past year has seen plenty of hacks and outages. Here are the ones topping the list.
The extensions, available for Chromium browsers, harvest full AI conversations over months.
The weak RC4 for administrative authentication has been a hacker holy grail for decades.
Open source React executes malicious code with malformed HTML—no authentication needed.
Researchers say there’s more to the network, which has operated for 14 years.
Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived.
Voting system required three keys. One of them has been “irretrievably lost.”
So far, the hackers are laying low, likely for later use.
Integration of Copilot Actions into Windows is off by default, but for how long?
Bitcoin mining hardware exec falls for sophisticated crypto scam to tune of $200k
Fleets of laptops run from US residences gave appearance workers were in the US.
The results of AI-assisted hacking aren’t as impressive as many might have us believe.
Relatively new technique can bypass many endpoint protections.
Targeted attack could steal all of a phone’s data and activate camera or mic.
Ransomware doesn’t pay what it used to.