Source
Wired
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
The California Age-Appropriate Design Code would launch a huge online privacy experiment. And it won’t just affect children.
Researchers found that mobile applications contain keys that could provide access to both user information and private files from unconnected apps.
Prepaid phones are looking good as privacy worries peak.
Plus: Chrome patches another zero-day flaw, Microsoft closes up 100 vulnerabilities, Android gets a significant patch, and more.
In the last two weeks of the war, an ad hoc team armed with group chats, QR codes, and satellite maps launched a mad dash to save imperiled Afghan allies.
Anti-Putin media network February Morning has become a central player in the underground fight against the Kremlin.
Plus: An Iranian hacking tool steals inboxes, LastPass gets hacked, and a deepfake scammer targets the crypto world.
The phishing attack on the SMS giant exposes the dangers of B2B companies to the entire tech ecosystem.
An attack on Russian mercenaries shows how militaries are increasingly using open source data—with sometimes deadly consequences.