Tag: risks
-
Schneier on Security: Encryption Backdoor in Military/Police Radios
Source URL: https://www.schneier.com/blog/archives/2025/08/encryption-backdoor-in-military-police-radios.html Source: Schneier on Security Title: Encryption Backdoor in Military/Police Radios Feedly Summary: I wrote about this in 2023. Here’s the story: Three Dutch security analysts discovered the vulnerabilities—five in total—in a European radio standard called TETRA (Terrestrial Trunked Radio), which is used in radios made by Motorola, Damm, Hytera, and others. The…
-
The Register: Malware-ridden apps made it into Google’s Play Store, scored 19 million downloads
Source URL: https://www.theregister.com/2025/08/26/apps_android_malware/ Source: The Register Title: Malware-ridden apps made it into Google’s Play Store, scored 19 million downloads Feedly Summary: Everything’s fine, the ad slinger assures us Cloud security vendor Zscaler says customers of Google’s Play Store have downloaded more than 19 million instances of malware-laden apps that evaded the web giant’s security scans.……
-
Slashdot: Google To Require Identity Verification for All Android App Developers by 2027
Source URL: https://tech.slashdot.org/story/25/08/25/1716213/google-to-require-identity-verification-for-all-android-app-developers-by-2027?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Google To Require Identity Verification for All Android App Developers by 2027 Feedly Summary: AI Summary and Description: Yes Summary: Google is implementing mandatory identity verification for all Android app developers beginning in September 2026 in select countries, with global expansion through 2027. This measure aims to combat malware…
-
Slashdot: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts
Source URL: https://it.slashdot.org/story/25/08/25/1654220/perplexitys-ai-browser-comet-vulnerable-to-prompt-injection-attacks-that-hijack-user-accounts?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant vulnerabilities in Perplexity’s Comet browser linked to its AI summarization functionalities. These vulnerabilities allow attackers to hijack user accounts and execute malicious commands, posing…
-
The Cloudflare Blog: Beyond the ban: A better way to secure generative AI applications
Source URL: https://blog.cloudflare.com/ai-prompt-protection/ Source: The Cloudflare Blog Title: Beyond the ban: A better way to secure generative AI applications Feedly Summary: Generative AI tools present a trade-off of productivity and data risk. Cloudflare One’s new AI prompt protection feature provides the visibility and control needed to govern these tools, allowing AI Summary and Description: Yes…
-
Wired: IBM and NASA Develop a Digital Twin of the Sun to Predict Future Solar Storms
Source URL: https://www.wired.com/story/ibm-and-nasa-develop-a-digital-twin-of-the-sun-to-predict-future-solar-storms/ Source: Wired Title: IBM and NASA Develop a Digital Twin of the Sun to Predict Future Solar Storms Feedly Summary: The tool models the sun using AI, and its developers say it can anticipate solar flares 16 percent more accurately and in half the time of current prediction systems. AI Summary and…