• Relentless hackers abandon Windows to target your Apple ID
    www.foxnews.com
    Published April 3, 2025 10:00am EDT close Chinese hackers tried to breach Trump, Vance phones: report Fox News correspondent David Spunt has more on the "sophisticated penetration" of several carriers on "Special Report." If theres one thing that has become clear over the past year, its that Apple devices are not as secure as the company wants you to believe.Were four months into 2025 and there have already been over 10 instances in which attackers specifically targeted Apple users, and these are just the incidents we know of.Ill admit no device is foolproof, but there seems to be a growing trend where bad actors prefer targeting Apple users over other platforms. In fact, security researchers have recently identified a new phishing campaign in which hackers, who previously focused on Windows, are now setting their sights on Apple IDs.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A person working on an Apple laptop (Kurt "CyberGuy" Knutsson)What you need to knowSecurity researchers atLayerX Labs have uncovered a new phishing campaign that specifically targets Mac users, marking a shift from its previous focus on Windows. The attackers initially lured Windows users with fake Microsoft security alerts designed to steal login credentials. However, after Microsoft, Chrome and Firefox implemented new security features to block these attacks, the hackers started redirecting their efforts toward Mac users instead.The new attack closely mirrors its predecessor but with key modifications. The phishing pages have been redesigned to resemble Apples security warnings, making them appear legitimate to macOS users. The attack code has also been adjusted to specifically detect macOS and Safari users, ensuring that only Apple users see the fraudulent pages.Plus, despite shifting their focus, the attackers continue to host these phishing pages on Microsofts Windows[.]net domain. Since this is a trusted Microsoft platform, it allows the phishing pages to evade detection by security tools that assess risk based on domain reputation. Compromised websites displaying fake security warning (LayerX)How victims are lured inThe phishing campaign exploits common yet highly effective methods called typosquatting and malicious redirects. Victims often end up on these phishing pages after making a simple mistake, such as mistyping a URL while trying to visit a legitimate website.Instead of reaching the intended site, they land on a compromised domain parking page. From there, they are redirected through multiple websites before ultimately arriving at the phishing page, which presents a fake Apple security warning. Believing their Apple ID is at risk, victims are tricked into entering their credentials, unknowingly handing them over to the attackers.One notable case involved a person using Safari who was working at a business secured by a Secure Web Gateway. Despite the organizations security measures, the phishing attempt managed to bypass the gateways protections.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Compromised websites displaying fake security warning (LayerX)7 ways to stay safe from attackers targeting Apple usersPhishing campaigns are increasingly targeting macOS users, but youre not defenseless. Here are four essential steps to protect yourself.1. Use strong antivirus software:A reliable antivirus program is your first line of defense against phishing attempts and malicious websites. While Apples built-in security features provide some protection, they arent foolproof, especially against sophisticated phishing attacks that mimic legitimate Apple warnings. A robust antivirus solution can detect and block malicious sites before you even reach them, preventing you from accidentally entering your credentials on a fraudulent page. Additionally, advanced security software can identify suspicious redirects and alert you before you fall victim to typosquatting traps.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Keep your software up to date:Regularupdates to macOS and your applications arent just about new features. Theyre critical patches that fix security vulnerabilities. Attackers are quick to exploit any weakness, so ensuring your operating system and all installed software are current minimizes the risk of a breach. Enable automatic updates where possible so youre always protected by the latest security enhancements.3. Regularly monitor your Apple ID activity: Even with strong security measures in place, its important to keep an eye on your Apple ID account for any signs of unauthorized access. Apple allows users to review their account activity, including devices logged into the account and recent changes. Regularly check your Apple ID settings to ensure that only trusted devices are connected and that no suspicious activity has occurred. If you notice anything unusual, such as login attempts from unfamiliar locations, immediately change your password and remove unauthorized devices. This proactive approach can help you catch potential breaches early and minimize damage.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Enable two-factor authentication (2FA):Strong, unique passwords for every account are essential, but theyre even more effective when combined withtwo-factor authentication. Even if attackers manage to steal your credentials through a phishing attack,2FA adds an extra barrier that makes unauthorized access significantly harder. Consider using apassword manager to generate and store complex passwords. Get more details about mybest expert-reviewed password managers of 2025 here.5. Use a recovery key for enhanced security: Apple offers an optional feature called a recovery key, which is a 28-character code that provides an extra layer of security for your Apple ID. When you enable a recovery key, Apple disables its standard account recovery process, meaning youll need this key, along with access to a trusted device or phone number, to reset your password or regain access to your account. This makes it significantly harder for attackers to take control of your account.To set up a recovery key, go toSettings > [Your Name] > Sign-in & Security > Recovery Key on your iPhone, iPad or Mac. Follow the prompts to generate and confirm your recovery key. Be sure to write it down and store it in a secure location, such as a safe or with a trusted family member. Keep in mind that losing both your recovery key and access to trusted devices can permanently lock you out of your account. However, if used responsibly, this feature gives you greater control over your accounts security.6. Enable biometric authentication: Apple devices offer advancedbiometric authentication options like Face ID and Touch ID, which provide an extra layer of security. These features make it significantly harder for attackers to gain access to your device or sensitive accounts, even if they manage to steal your credentials. Enable biometric authentication wherever possible, especially for apps and services that store personal or financial information. Since biometric data is unique to you, it adds a level of protection that passwords alone cannot provide.7. Practice safe browsing:Many attacks rely on simple user mistakes, such as mistyping a URL or clicking on suspicious links. Always verify that youre visiting legitimate websites before entering any personal information. Be skeptical of unexpected security alerts, even if they mimic Apples design. Learning to identify the subtle signs of phishing, like unusual URL structures or generic greetings, can help you avoid falling for these scams.Kurts key takeawaysApple has long sold the idea that its ecosystem is inherently safer than the alternatives, but that claim is starting to wear thin. The reality is that attackers are no longer ignoring Mac users, theyre actively targeting them, and Apples response has been anything but proactive. While Microsoft, Google and others roll out new security measures to counter evolving threats, Apple remains slow to adapt, relying on outdated assumptions about its platforms safety.CLICK HERE TO GET THE FOX NEWS APPDo you believe Apple should be more transparent about security vulnerabilities affecting its users? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare ·0 Anteile ·12 Ansichten
  • If you're planning to upgrade your electronics, you might want to buy them now - here's why
    www.zdnet.com
    President Trump's new economic plan, set to take effect on April 5, could shake up global tech manufacturing - potentially hitting consumers the hardest.
    0 Kommentare ·0 Anteile ·14 Ansichten
  • Garmin wants you to pay for AI features and enhanced software updates - is it worth it?
    www.zdnet.com
    If you want AI-powered 'Active Intelligence,' training guidance, and more, you'll have to pay for the new Connect Plus service.
    0 Kommentare ·0 Anteile ·15 Ansichten
  • 0 Kommentare ·0 Anteile ·25 Ansichten
  • How Quantum Computing Stands To Impact The Financial Services Industry
    www.forbes.com
    With quantum on the horizon in the financial services industry, doing nothing is no longer an option.
    0 Kommentare ·0 Anteile ·25 Ansichten
  • Counterfeit Android phones are hiding pre-installed malware that can infect every system process
    www.techspot.com
    In a nutshell: It should go without saying that buying a very cheap, obviously counterfeit Android handset is a bad idea. Not only will you likely run into a slew of technical problems, but it could also contain pre-installed malware that infects virtually every process carried out by the handset. Kaspersky researchers have discovered a new strain of the Triada Trojan preinstalled on thousands of new very cheap Android devices counterfeit versions of popular models. The modular remote access trojan (RAT), first identified in 2016, can steal sensitive data and crypto while performing other malicious actions.The malware is embedded in an infected phone's firmware, operating without detection and granting attackers full control over a device.The list of malicious actions the new strain of Triada can perform is an extensive one. It is able to send and delete messages in WhatsApp, Telegram, and other messaging apps to impersonate users, hijack social media accounts, replace crypto wallet addresses in apps to steal the virtual currency, and track browsing activity and even swap links.Triada can also monitor, intercept, send, and delete SMS messages, send premium SMS texts to receive paid services, download and run other programs on an infected device, and block network connections to interfere with the operation of anti-fraud systems.Dmitry Kalinin, an expert on cybersecurity at Kaspersky Lab, said the new version of Triada is likely being installed in the counterfeit phones during one of the early stages of the supply chain, so the stores selling the devices may not realize anything is amiss. There's always the chance that some vendors knew about the malware and were benefiting financially by spreading it, of course.Kalinin adds that the authors of Triada have already used the malware to transfer about $270,000 in different cryptocurrencies from victims' crypto wallets to their own, though the actual amount may be higher as the attackers also stole Monero, a cryptocurrency that cannot be traced. // Related StoriesOver 2,600 people across multiple countries encountered the new version of Triada between March 13 and 27, 2025, with most of the cases reported in Russia.Kaspersky says its mobile anti-virus software can detect Triada, though the company's products are banned in the US over its ties to Russia.
    0 Kommentare ·0 Anteile ·20 Ansichten
  • www.techspot.com
    Facepalm: When ChatGPT isn't being used to generate those viral Studio Ghibli-inspired images flooding your feeds, it can be tapped to fake receipts instead. The AI chatbot is finally decent enough at comprehending and generating text within images that crafty users realized it could produce fake receipts. These could then easily pass as legit proof of purchase to an unsuspecting set of eyes. Until recently, AI-generated images had one glaring weakness garbled or nonsensical text. Many models have managed to fix problems like messed-up hands to the point where they're not even an issue anymore. But text has remained a bit of an Achilles' heel. That's changing fast, though.For instance, following the latest update to ChatGPT's image generation on its 4o model, users can spit out receipts with near-perfect formatting, itemized lists, and even realistic-looking logos. Of course, they're still not completely flawless and can look overly crisp, have text with odd spacing, and even have math errors.However, receipts especially for smaller amounts aren't often scrutinized too heavily. A few extra tweaks in Photoshop, like adding stains, could easily fool an employer. The payoff is obvious to scammers. All they'd need to do is spend just a few minutes using ChatGPT and Photoshop, and even if the trick only works occasionally, it's still a low-effort, high-reward scheme.Right now, the most effective method might be to feed an existing receipt to ChatGPT and modify details like prices or dates. But as the tech improves, entirely fabricated receipts could become indistinguishable from real ones. // Related StoriesYou'd think that all this would ring alarm bells at OpenAI HQ, but while the company has acknowledged the risk, it isn't hitting the panic button just yet. A company spokesperson explained to TechRadar that it tracks image generation both on and off its platform, uses internal tools to verify AI-created content, and takes action when usage policy violations occur.Interestingly, OpenAI also sees an upside to this capability. Spokesperson Taya Christianson suggested to TechCrunch that fake receipts could be used for financial literacy education by teaching people how to track expenses or spot fraud in a controlled setting.Still, one has to wonder if this capability results in a net positive for society.
    0 Kommentare ·0 Anteile ·19 Ansichten
  • All Switch 2 launch games
    www.digitaltrends.com
    No matter how powerful or sleek a new video game console is, it doesnt matter if there are no good games to play on it. When the Switch 2 was revealed, we learned that it would feature backwards compatibility with the best Switch games to automatically give the library a head start. However, most of us have already played those games and are looking for a shiny new title to make the purchase feel justified. We know of a ton of upcoming Switch 2 games for the rest of 2025 and beyond, but what are the hot new games you have to pick from at launch? Nintendo launch titles are traditionally very good, so lets take a look at every launch title you can play on the Switch 2 and see how it compares.Each game is sold separately, but you can preorder the Switch 2 in a bundle with Mario Kart Worldto save a little bit of money.Recommended VideosNintendoThe Switch 2 launch lineup is quite impressive, featuring both Nintendo first-party games, third-party titles, and some older ports or remasters never seen on a Nintendo console before. There are also some Nintendo Switch 2 Edition games of existing Switch games that improve the visuals, frame rates, and sometimes even add more content.RelatedThese are all the games launching with the Switch 2 on June 5, in alphabetical orderArcade Archives 2: Ridge RacerBravely Default: Flying Fairy HD RemasterCyberpunk 2077: Ultimate EditionDeltaruneFast FusionFortniteHitman World of Assassination Signature EditionHogwarts LegacyKunitsu-Gami: Path of the GoddessMario Kart WorldNintendo Switch 2 Welcome TourNobunagas Ambition Awakening Complete EditionPuyo Puyo Tetris 2SRune Factory: Guardians of AzumaCivilization 7Split FictionStreet Fighter 6Survival KidsThe Legend of Zelda: Breath of the Wild Switch 2 EditionThe Legend of Zelda: Tears of the Kingdom Switch 2 EditionYakuza 0: Directors CutEditors Recommendations
    0 Kommentare ·0 Anteile ·22 Ansichten
  • OPPO Find X8 Ultras to include innovative camera system update
    www.digitaltrends.com
    OPPO is expected to launch new phones in its Find X8 series on Thursday, April 10. Ahead of the official announcement, its teasing the upcoming Find X8 Ultra camera specifications, which are impressive on paper.From a hardware perspective, the OPPO Find X8 Ultra will feature a five-camera system, which includes four main sensors arranged in a circular layout, along with an additional spectral image sensor. The main camera setup consists of a 1-inch Sony LYT-900 main sensor, a Sony IMX882 ultra-wide camera, a Sony IMX906 3x telephoto camera, and a Sony IMX882 6x periscope telephoto lens. This configuration will provide variable focal lengths of 15mm, 23mm, 70mm, and 135mm.Recommended VideosThe Find X8 Ultra is set to make headlines thanks to its innovative software. It will be OPPOs first phone equipped with Lumo, the companys new image engine specifically designed for portrait photography. This technology combines advanced hardware and software to enhance image quality, especially in challenging lighting conditions.RelatedA standout feature of Lumo is its Danyan original color lens technology. This technology utilizes zone-specific color temperature sensing, which helps achieve more natural skin tones, even in challenging environments like low light or complex lighting situations.Lumo imaging technology will not be exclusive to the Find X8 Ultra; it is also expected to be featured in the upcoming Find X8s and Find X8s+, both of which are scheduled for launch next week. The new technology is OPPOs latest innovation in smartphone camera technology, establishing it as a rival to mobile imaging systems from brands like Vivo, Xiaomi, and Huawei.After next week, the Find X8 series will consist of the Find X8, Find X8 Pro, Find X8s, Find X8s+, and Find X8 Ultra. OPPO typically launches its phones in China first, followed by a global rollout, and we can expect the same pattern for this upcoming series.Editors Recommendations
    0 Kommentare ·0 Anteile ·22 Ansichten
  • How I Realized AI Was Making Me Stupidand What I Do Now
    www.wsj.com
    Backers of the new tech say it will free us to be creative, but studies show that avoiding mental effort can cause your brain to atrophy.
    0 Kommentare ·0 Anteile ·15 Ansichten