Tag: Apple

  • Unit 42: Stealers on the Rise: A Closer Look at a Growing macOS Threat

    Source URL: https://unit42.paloaltonetworks.com/?p=138244 Source: Unit 42 Title: Stealers on the Rise: A Closer Look at a Growing macOS Threat Feedly Summary: Atomic Stealer, Poseidon Stealer and Cthulhu Stealer target macOS. We discuss their various properties and examine leverage of the AppleScript framework. The post Stealers on the Rise: A Closer Look at a Growing macOS…

  • Hacker News: AI systems with ‘unacceptable risk’ are now banned in the EU

    Source URL: https://techcrunch.com/2025/02/02/ai-systems-with-unacceptable-risk-are-now-banned-in-the-eu/ Source: Hacker News Title: AI systems with ‘unacceptable risk’ are now banned in the EU Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines the recent developments regarding the EU’s AI Act, a regulatory framework aimed at managing the risks associated with AI systems. It details the compliance deadlines,…

  • Hacker News: Everyone knows your location: tracking myself down through in-app ads

    Source URL: https://timsh.org/tracking-myself-down-through-in-app-ads/ Source: Hacker News Title: Everyone knows your location: tracking myself down through in-app ads Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights a significant geolocation data leak involving over 2,000 apps that collect user data without consent, revealing privacy risks from intricate advertising networks. The author’s personal investigation…

  • Simon Willison’s Weblog: Quoting Benedict Evans

    Source URL: https://simonwillison.net/2025/Feb/2/benedict-evans/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Benedict Evans Feedly Summary: Part of the concept of ‘Disruption’ is that important new technologies tend to be bad at the things that matter to the previous generation of technology, but they do something else important instead. Asking if an LLM can do very specific and…

  • Slashdot: Italy Blocks DeepSeek Over Data Privacy Concerns

    Source URL: https://yro.slashdot.org/story/25/01/30/2249212/italy-blocks-deepseek-over-data-privacy-concerns Source: Slashdot Title: Italy Blocks DeepSeek Over Data Privacy Concerns Feedly Summary: AI Summary and Description: Yes Summary: Italy’s data protection authority has taken decisive action against the Chinese AI chatbot DeepSeek due to concerns over the lack of transparency regarding user data collection and storage practices. The agency’s intervention highlights the…

  • Hacker News: Majority of US teens have lost trust in Big Tech

    Source URL: https://techcrunch.com/2025/01/29/report-majority-of-u-s-teens-have-lost-trust-in-big-tech/ Source: Hacker News Title: Majority of US teens have lost trust in Big Tech Feedly Summary: Comments AI Summary and Description: Yes Summary: A new report by Common Sense Media reveals that American teens have significantly lost their trust in major tech companies, particularly concerning their use of AI and personal data…

  • Data and computer security | The Guardian: DeepSeek blocked from some app stores in Italy amid questions on data use

    Source URL: https://www.theguardian.com/technology/2025/jan/29/deepseek-blocked-some-app-stores-italy-questions-data-use Source: Data and computer security | The Guardian Title: DeepSeek blocked from some app stores in Italy amid questions on data use Feedly Summary: Italian and Irish regulators want answers on how data harvested by chatbot could be used by Chinese governmentThe Chinese AI platform DeepSeek has become unavailable for download from…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/29/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, as confirmed by Fortinet. CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors…