Tech October 28 5 social media safety tips to protect your privacy online Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Cybercrime October 25 Payroll scam hits US universities as phishing wave tricks staff Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Android October 23 Delete the fake VPN app stealing Android users' money Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
China October 21 China accuses US of yearslong cyberattack on national time service Chinese intelligence claims NSA hackers infiltrated Beijing's time service center for years using 42 specialized cyber weapons.
Artificial Intelligence October 20 AI girlfriend apps leak millions of private chats Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
Cybercrime October 19 Discord confirms vendor breach exposed user IDs in ransom plot Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.
Cybercrime October 18 AI flaw leaked Gmail data before OpenAI patch Cybersecurity experts warn about a ShadowLeak vulnerability that weaponized ChatGPT's Deep Research agent to steal personal data from Gmail accounts through hidden commands.
Tech October 17 Former Google CEO warns AI systems can be hacked to become extremely dangerous weapons Eric Schmidt alerts that hackers can reverse-engineer AI models to bypass safety measures, citing examples like the jailbroken ChatGPT variant called DAN.
Microsoft October 17 Microsoft sounds alarm as hackers turn Teams platform into 'real-world dangers' for users Cybercriminals exploit Microsoft Teams through impersonation, malicious links and fake profiles to gather intel and deliver ransomware to personal and work devices.
Cybercrime October 14 How to spot and stop AI phishing scams AI phishing scams now use voice cloning and deepfake technology to trick victims, but Kurt "CyberGuy" Knutsson reveals warning signs to watch for.
How To Tech October 12 Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.