Experts think AI Might Mess with us in the Next Five Years

When we talk about the dangers posed by artificial intelligence, the emphasis is usually on the unintended side effects. We worry that we might accidentally create a super-intelligent AI and forget to program it with a conscience; or that we’ll deploy criminal sentencing algorithms that have soaked up the racist biases of their training data. What about the people who actively want to use AI for immoral, criminal, or malicious purposes? Aren’t they more likely to cause trouble — and sooner? The answer is yes, according to more than two…

Hackers can see your Tinder photos and figure out your matches

Tinder isn’t using encryption to keep your photos safe from strangers who are sharing the same coffee shop Wi-Fi as you, security researchers have found out. Researchers from the Tel Aviv-based firm Checkmarx found that Tinder’s iOS and Android mobile apps still lack basic HTTPS encryption, meaning that anyone sharing the same Wi-Fi as you can see your Tinder photos or add their own into the photostream. The firm built a proof-of-concept app called TinderDrift, demoed on YouTube, that can reconstruct a user’s session on Tinder if that person is…

Phishing Makes It Easy To Hijack Accounts

Cyber-thieves grab almost 250,000 valid log-in names and passwords for Google accounts every week, suggests research. The study by Google and UC Berkeley looked at the ways email and other accounts get hijacked. It used 12 months of log-in and account data found on websites and criminal forums or which had been harvested by hacking tools. Google said the research helped secure accounts by showing how people fell victim to scammers and hackers. During the 12 months studying the underground markets, the researchers identified more than 788,000 credentials stolen via…

How to spot a phishing email

Phishing emails flow into inboxes year-round, especially during the holidays. Here are some clues to help your users spot “fishy” emails. Every day these countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages are so outlandish that they are obvious frauds, others can be a bit more convincing. So how do you tell the difference between a phishing message and a legitimate message? Unfortunately, there is no one single technique that works in every situation, but there are a number of things…

Over 36.5 million Android users get infected by Judy Malware

A new malware named ‘Judy’ has been found in over 41 apps on the Google Play Store, and it has infected between 8.5 million to 36.5 million users. This is according to a report from security research firm Check Point, which discovered the malware and alerted Google. The search giant has started removing these infected apps from the Play Store. According to researchers from Check Point, the apps were available on the Play Store for years, but have been clean and virus-free for most of the time. It appears that…

Google’s battle with Android malware: Who wins?

While most people are aware of the malicious threats targeting their computers, many still don’t realise that their mobile devices are an increasingly lucrative a target for cybercriminals. The main way smartphones are attacked is though apps, often ones which pose as innocent and useful but actually aim to steal data or in the case of ransomware, force users to pay up. Recently, google uncovered the Android version of Pegasus, a mobile spyware created by NSO Group, an Israeli surveillance company considered the most advanced producer of mobile spyware on…

Google Docs phishing attack is fixed

Google Docs users were hit by a widespread phishing attempt everywhere being spammed with what appeared to be malicious invitations to log on to their Google accounts. Unlike your garden-variety cyberattack, many of the telltale signs that could tip off that something was awry are absent. What made this attack so tricky to detect was that it took advantage of Google’s legitimate tool for sharing data with responsible third-party apps. Since the bogus invitation was being routed through Google’s real system, nothing was misspelled, the icons looked accurate, and it’s hard to know something’s…

Old Windows malware may have tampered with 132 Android apps

Google has removed 132 apps from its Play store following a malicious coding flaw that was found possibly because the developers were using infected computers with malware, according to security researchers. The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks. Google investigation indicates that the developers of these infected apps are not to blame, but are more likely victims themselves. “We believe it is most likely that the…

Amid cyberattacks, ISPs try to clean up the internet

Antivirus software is not what it used to be. The sneaky, sophisticated security threats your PC faces now have gone far beyond what traditional software can do. The future of protecting your PC will require a multi-pronged approach involving vigilant updates, bug bounties, and artificial intelligence. If your computer’s been hacked, Dale Drew might actually know something about that. Dale Drew, the chief security officer at a major internet backbone provider that’s routinely on the lookout for cyberattacks on the network level has led the company to linked more than…

Banks remains top cybercrime targets globally

Cybersecurity

As digital technology develops, the business organizations continue to experience more transformations and disruptions exposing themselves to more opportunities and threats. Attacks against the finance industry are becoming increasingly sophisticated and highly targeted. The economic crime has as well gone digital as every sector of commerce digitalizes. According to a U.S. cybersecurity report released by IBM, the financial-services industry ranked third in number of cyberattacks in 2015, after health care and manufacturing. Reports also indicate that there were 2.46 million cyber incidents and 2.11 million victims of cyber crime in…