American law enforcement agencies recently dismantled the Aisuru, Kimwolf, JackSkid, and Mossad botnets—a collection of cybercriminal tools that have compromised over 3 million devices globally, many within residential networks, and were utilized to execute record-setting digital assaults. Concurrently, hundreds of millions of iPhones are currently susceptible to exploitation by DarkSword, a novel instrument employed by Russian cyber adversaries to pilfer sensitive data from individuals.
Client support interactions and conversations with Sears Home Services’ AI bot, Samantha, were left unprotected and publicly accessible until a researcher brought the matter to light. This incident revealed private particulars from calls and chats, at times encompassing several hours of additional audio seemingly captured post-conversation, unbeknownst to callers. Separately, WIRED examined numerous Telegram channels featuring employment advertisements for “AI face models.” The individuals who secure these positions are predominantly female and are likely serving as the public persona for AI-driven deceptions aimed at defrauding victims of their funds.
Meta recently declared its intention to discontinue comprehensive encryption safeguards for Instagram Direct Messages on May 8, attributing the change to limited uptake of the functionality. The corporation had long assured this protection would be standard for Instagram chat, and specialists are concerned that this policy reversal could establish a perilous example within the technology sector. In other Meta encryption news, however, Signal founder Moxie Marlinspike revealed this week that he will partner with the digital behemoth to integrate his secure artificial intelligence system, Confer, into Meta AI in some capacity.
Additionally, there’s more. Weekly, we compile updates on digital safety and personal data protection that we didn’t explore thoroughly on our own. Access the complete narratives by selecting the titles. Maintain your digital security.
Picture having to account for this to your superior: You are unable to commute to your workplace because your legally required alcohol ignition interlock device prevents vehicle ignition—not due to alcohol consumption, as you attest, but because that breath alcohol measurement apparatus has been rendered inoperable by a digital assault targeting its manufacturer.
Intoxalock, a producer of vehicle alcohol interlock systems utilized daily by 150,000 American motorists, disclosed this week that it had been subjected to a cyber intrusion, leading to its “systems presently undergoing an outage,” as per a statement published on its online portal. Concurrently, drivers utilizing these devices have indicated being left immobile owing to the gadgets’ failure to link with the firm’s infrastructure. “Our automobiles are effectively useless at this moment, through no error of our own,” one user posted on Reddit. “I am facing consequences at my employment and experience utter powerlessness.”
The inabilities to operate seem to stem from Intoxalock’s breath alcohol measurement apparatuses requiring routine adjustments that necessitate a link to the company’s servers. Motorists who are scheduled for an adjustment and are unable to complete it due to the firm’s operational halt have found themselves immobilized. However, the company now declares on its online portal that it’s providing ten-day deferrals for such adjustments attributable to its digital security incident, as well as vehicle recovery assistance in certain situations. Meanwhile, Intoxalock has not clarified the nature of the digital assault it is encountering, nor if malicious actors have acquired any client information from the company.
In March of the preceding year, 2023, FBI director Christopher Wray acknowledged, for the initial occasion, that the bureau had acquired geospatial mobile device information within the US. While the FBI had earlier compensated for cellular device particulars from third-party information intermediaries—rather than obtaining a judicial authorization—it had ceased this practice, Wray stated. “This activity has been dormant for a period,” Wray asserted. Advancing three years hence, the FBI is again procuring geographical tracking information employable for monitoring US citizens.
During a senatorial deliberation held on Wednesday, FBI director Kash Patel reaffirmed that the bureau is acquiring “publicly offered data,” which he stated was “in line with the Constitutional framework” and other legal statutes. “This has yielded significant intelligence insights for our operations,” Patel remarked. This methodology entails the FBI obtaining data from third-party information vendors, who purvey vast quantities of information, encompassing mobile device geographical coordinates, amassed by promotional software embedded within applications.
{content}
Source: {feed_title}

