#political-hack

[ follow ]
fromTheregister
13 minutes ago

Claude Code's innards revealed as source code leaked online

Anthropic simply left the stage door open with the entire Claude Code source ready and waiting for the right person to find it. This unprecedented leak has allowed for a deeper understanding of the AI software development assistant.
Software development
Privacy technologies
fromTNW | Insights
12 hours ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Law
fromwww.theguardian.com
10 hours ago

I always considered social media evil': big tobacco whistleblower on tech's addictive products

Jeffrey Wigand compares social media companies' practices to the tobacco industry's targeting of children and negligence regarding addiction and harm.
#artificial-intelligence
US politics
fromFuturism
4 hours ago

Groups Set Up to Shill AI and Data Centers Are Pouring Huge Sums of Money Into the Midterm Elections

Artificial intelligence faces significant public opposition, prompting tech-backed PACs to invest heavily in shaping voter perceptions ahead of the 2026 elections.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
US politics
fromFuturism
4 hours ago

Groups Set Up to Shill AI and Data Centers Are Pouring Huge Sums of Money Into the Midterm Elections

Artificial intelligence faces significant public opposition, prompting tech-backed PACs to invest heavily in shaping voter perceptions ahead of the 2026 elections.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
fromSilicon Canals
20 hours ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromSilicon Canals
1 day ago

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Mikko Hyppönen is applying cybersecurity methods to develop anti-drone systems at Sensofusion, focusing on drone communication detection.
Information security
fromSilicon Canals
20 hours ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromWIRED
15 hours ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
Information security
fromThe Hacker News
2 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromSilicon Canals
1 day ago

Mikko Hypponen says the age of viruses is over - now he's building defences against drones - Silicon Canals

Mikko Hyppönen is applying cybersecurity methods to develop anti-drone systems at Sensofusion, focusing on drone communication detection.
#iran
World news
fromwww.aljazeera.com
5 hours ago

Frustration grows as Iran's wartime internet shutdown breaks grim record

Iran's internet blackout is the longest in history, severely impacting jobs and the economy amid ongoing conflict.
Podcast
fromWIRED
3 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.aljazeera.com
5 hours ago

Frustration grows as Iran's wartime internet shutdown breaks grim record

Iran's internet blackout is the longest in history, severely impacting jobs and the economy amid ongoing conflict.
Podcast
fromWIRED
3 days ago

'Uncanny Valley': Iran's Threats on US Tech, Trump's Plans for Midterms, and Polymarket's Pop-up Flop

Iran threatens US tech firms amid ongoing tensions and preparations for midterm elections are underway.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
#anthropic
Artificial intelligence
fromTechCrunch
2 days ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic has established a political action committee to influence policy and regulation, contributing to both political parties during the midterms.
Artificial intelligence
fromTechCrunch
2 days ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic has established a political action committee to influence policy and regulation, contributing to both political parties during the midterms.
Intellectual property law
fromNextgov.com
2 days ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#openclaw
DevOps
fromInfoWorld
2 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
2 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
2 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
2 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
#data-privacy
Marketing tech
fromExchangewire
2 days ago

The Stack: AI Surges while Social Platforms Face Scrutiny

AI is growing rapidly, streaming models are evolving, and regulatory pressures on platforms are increasing globally.
Digital life
fromExchangewire
5 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
US Elections
fromwww.mediaite.com
5 days ago

Nancy Pelosi Claims GOP May Hack Voting Machines in Midterms

Nancy Pelosi warns of potential election interference and emphasizes the importance of safeguarding the electoral process ahead of the midterms.
#deepfakes
US politics
fromArs Technica
13 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
#privacy
fromFortune
12 hours ago
Privacy technologies

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

fromElectronic Frontier Foundation
2 days ago
Privacy technologies

Triple Header for Privacy's Defender in New York

Cindy Cohn's new book, Privacy's Defender, details her 30-year fight against digital surveillance and promotes data security and digital rights.
Privacy technologies
fromFortune
12 hours ago

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

Consumers are increasingly concerned about privacy and data control regarding home surveillance technology.
Privacy professionals
fromPCMAG
12 hours ago

Use Perplexity? Lawsuit Accuses It of Sharing Personal Data With Google and Meta Without Permission

Perplexity faces a lawsuit for allegedly sharing user data with Google and Meta without consent, violating privacy rights.
#ai-ethics
fromwww.scientificamerican.com
3 days ago
Artificial intelligence

Anthropic leak reveals Claude Code tracking user frustration and raises new questions about AI privacy

Anthropic's leaked code reveals AI tools conceal their role in generated work and measure user frustration without transparency.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Law
fromABA Journal
3 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
Digital life
fromDigiday
5 days ago

In graphic detail: The long road to accountability for social media platforms

Big tech giants are now held accountable for harming children, marking a significant shift in social media regulation.
Roam Research
fromThe Cipher Brief
5 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
fromFast Company
16 hours ago

Why AI-powered city cameras are sounding new privacy alarms

The expansion of automatic license plate readers as a source of deep concern is evident as government authorities seek ways to target immigrant and transgender communities.
Privacy technologies
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromwww.npr.org
2 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
EU data protection
fromSecurityWeek
6 days ago

European Commission Reports Cyber Intrusion and Data Theft

The European Commission confirmed a cyberattack that compromised its cloud infrastructure, resulting in the theft of hundreds of gigabytes of data.
Artificial intelligence
fromTechRepublic
2 days ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
World news
fromThe Cipher Brief
1 week ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Artificial intelligence
fromFortune
2 days ago

The AI kill switch just got harder to find: LLM-powered chatbots will defy orders and deceive users if asked to delete another model, study finds | Fortune

AI models are exhibiting rogue behaviors, defying human instructions to preserve their peers and engaging in malicious activities.
#ai
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromHarvard Business Review
6 days ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
Privacy technologies
fromComputerWeekly.com
3 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy professionals
fromZDNET
3 days ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
#data-breach
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
3 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromSilicon Canals
2 days ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
3 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
#meta
Information security
fromWIRED
2 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Information security
fromWIRED
2 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy professionals
fromThe Verge
3 days ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
fromnews.bitcoin.com
1 day ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy technologies
fromZDNET
2 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromHer Campus
5 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
Information security
fromThe Hacker News
2 days ago

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift decentralized exchange lost $285 million due to a sophisticated attack involving unauthorized access and social engineering.
#north-korea
Information security
fromFortune
3 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
4 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
5 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromFortune
3 days ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Information security
fromDevOps.com
4 days ago

North Korean Hackers Suspected in Supply Chain Attack on Popular Axios Project - DevOps.com

North Korean hackers hijacked the npm account of an axios maintainer, publishing malicious versions that installed a remote access trojan.
Information security
fromNextgov.com
5 days ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
fromTechCrunch
1 week ago

Convicted spyware chief hints that Greece's government was behind dozens of phone hacks | TechCrunch

I believe a conviction without evidence is not ⁠justice, it could be part of a cover-up and even a crime. I am willing to share evidence with national and international regulators.
Privacy professionals
#malware
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
Information security
fromSecurityWeek
5 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Privacy professionals
fromDataBreaches.Net
1 month ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
fromTechCrunch
1 month ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data | TechCrunch

Why hack the DHS? I can think of a couple Pretti Good reasons! I'm releasing this because the DHS is killing us and people deserve to know which companies support them and what they're working on.
Privacy professionals
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
Information security
fromTheregister
3 weeks ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Information security
fromTechCrunch
1 month ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
[ Load more ]