News Warner Logo

News Warner

Cybersecurity

Hacking the grid: How digital sabotage turns infrastructure into a weapon

Hacking the grid: How digital sabotage turns infrastructure into a weapon The modern power grid’s reliance on internet-connected computers makes it vulnerable to digital sabotage, where hackers can manipulate critical infrastructure without firing a shot. Malware can compromise controller devices, creating a “split reality” where legitimate commands are replaced with malicious instructions, leading to physical […]

๐Ÿ’ป Technology

NASA Develops Blockchain Technology to Enhance Air Travel Safety and Security

NASA Develops Blockchain Technology to Enhance Air Travel Safety and Security NASA has developed a blockchain technology to enhance air travel safety and security by protecting flight data from cyber threats. The system uses a decentralized database approach, where information is shared across a vast network, recording and verifying every change to ensure data accuracy […]

๐Ÿ’ป Technology

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two cybersecurity employees plead guilty to carrying out ransomware attacks Two former cybersecurity employees, Ryan Goldberg and Kevin Martin, have pleaded guilty to carrying out ransomware attacks. The duo extorted $1.2 million in Bitcoin from a medical device company and targeted several others using ALPHV / BlackCat ransomware. Goldberg, who was a ransomware negotiator, and […]

๐Ÿ’ป Technology

How hackers are using AI and how to protect yourself

How hackers are using AI and how to protect yourself โ€ข Hackers are leveraging artificial intelligence (AI) to enhance their malicious activities, including phishing attacks, malware creation, and social engineering. โ€ข AI-powered tools can analyze vast amounts of data to identify vulnerabilities and predict human behavior, making them more effective at evading detection. โ€ข To […]

๐Ÿ’ป Technology

AI browsers are a cybersecurity time bomb

AI browsers are a cybersecurity time bomb A new generation of AI-powered web browsers has been launched, including ChatGPT Atlas and Microsoft’s Copilot Mode for Edge. These AI browsers can answer questions, summarize pages, and even take actions on your behalf, offering a more convenient and hands-off browsing experience. However, cybersecurity experts warn that this […]

๐Ÿ’ป Technology

Discord customer service data breach leaks user info and scanned photo IDs

Discord customer service data breach leaks user info and scanned photo IDs Discord suffered a data breach involving one of its third-party customer service providers. The unauthorized party gained access to user information, including names, usernames, emails, and credit card numbers (last four digits). Images of government IDs from users who had appealed an age […]

๐Ÿ’ป Technology

How poisoned data can trick AI โˆ’ and how to stop it

How poisoned data can trick AI โˆ’ and how to stop it Data poisoning refers to the intentional feeding of wrong or misleading data into an automated system, which can lead to dangerous outcomes such as backdoor attacks, data leaks, and espionage. Data poisoning can be used to disrupt critical infrastructure, such as transportation systems, […]

๐Ÿ’ป Technology

Your data privacy is slipping away โ€“ hereโ€™s why, and what you can do about it

Your data privacy is slipping away โ€“ hereโ€™s why, and what you can do about it Despite growing efforts to improve cybersecurity, personal data breaches are accelerating, with companies sending out over 1.3 billion notifications to victims in 2024. The three pillars of solid personal privacy protection are: accessible technical controls (e.g., encryption and multifactor […]

๐Ÿ’ป Technology

How vulnerable is critical infrastructure to cyberattack in the US?

How vulnerable is critical infrastructure to cyberattack in the US? Critical infrastructure in the US, including water, health, and energy systems, is increasingly vulnerable to cyberattacks. A “hybrid” battle between physical and digital attacks is becoming more common, making critical infrastructure a target for both nation-state and non-state actors. The 2021 Colonial Pipeline ransomware attack […]

๐Ÿ“ฐ News

Cyberattacks shake votersโ€™ trust in elections, regardless of party

Cyberattacks shake votersโ€™ trust in elections, regardless of party Cyberattacks are eroding trust in American elections, affecting both Democrats and Republicans, regardless of party affiliation. The digital transformation of voting systems has made them more accessible and efficient, but also more complex and vulnerable to cyber threats. A recent study found that even exposure to […]

๐Ÿ“ฐ News