• How Do I Make A Small Space Look Bigger Without Renovating

    Living in a small space doesn’t mean you have to feel cramped or boxed in. With the right design tricks, you can make even the tiniest room feel open, airy, and inviting, no renovation required. Whether you’re in a compact apartment, a small home, or just trying to make the most of a single room, smart styling and layout choices can dramatically shift how the space looks and feels. From strategic lighting and paint colors to furniture swaps and clever storage solutions, there are plenty of easy, affordable ways to stretch your square footage visually. Ready to transform your space? Here are some practical, design-savvy ideas to make your home feel bigger without tearing down a single wall.

    1. Opt for Multi-Functional Furniture

    Image Source: House Beautiful

    In a small space, every piece of furniture should earn its keep. Look for multi-functional items: ottomans that open up for storage, beds with drawers underneath, or coffee tables that can extend or lift to become a desk. Not only do these pieces help reduce clutter, but they also free up floor space, making the room look more open. Bonus points for furniture that can be folded away when not in use. By choosing versatile pieces, you’re making the most of every inch without sacrificing style or comfort.

    2. Keep Pathways Clear

    Image Source: The Spruce

    One of the simplest yet most effective ways to make a small space feel bigger is to keep pathways and walkways clear. When furniture or clutter blocks natural movement through a room, it can make the space feel cramped and chaotic. Take a walk through your home and notice where you’re dodging corners or squeezing between pieces,those are areas to rethink. Opt for smaller furniture with slim profiles, or rearrange what you have to create an easy, natural flow. Open walkways help your eyes move freely through the room, making everything feel more spacious, breathable, and intentional. It’s all about giving yourself room to move,literally and visually.

    3. Use Glass and Lucite Furniture

    Image Source: The Spruce

    Transparent furniture made from glass or Lucitetakes up less visual space because you can see right through it. A glass coffee table or clear dining chairs can provide functionality without cluttering up the view. These pieces practically disappear into the background, which helps the room feel more open. They also add a touch of modern sophistication. When you need furniture but don’t want it to dominate the room, going clear is a clever design choice.

    4. Don’t Over-Clutter Your Space

    Image Source: House Beautiful

    In small spaces, clutter accumulates fast,and it visually shrinks your environment. The more items scattered around, the more cramped the room feels. Start by taking a critical look at what you own and asking: do I really need this here? Use storage bins, under-bed containers, or floating shelves to hide away what you don’t use daily. Keep surfaces like countertops, desks, and coffee tables as clear as possible. A minimal, clean setup allows the eye to rest and makes the space feel open and intentional. Remember: less stuff equals more space,both physically and mentally.

    5. Utilize Your Windows

    Image Source: House Beautiful

    Windows are like built-in art that can also dramatically affect how big or small your space feels. Don’t cover them with heavy drapes or clutter them with too many objects on the sill. Keep window treatments light and minimal,sheer curtains or roller blinds are perfect. If privacy isn’t a big concern, consider leaving them bare. Letting natural light flood in through your windows instantly opens up your space and makes it feel brighter and more expansive. You can also place mirrors or shiny surfaces near windows to reflect more light into the room and maximize their impact.

    6. Downsize Your Dining Table

    Image Source: House Beautiful

    A large dining table can dominate a small room, leaving little space to move or breathe. If you rarely entertain a big crowd, consider downsizing to a smaller round or drop-leaf table. These take up less visual and physical space and still offer enough room for daily meals. You can always keep a folding table or stackable chairs nearby for when guests do come over. Round tables are especially great for small spaces because they allow smoother traffic flow and eliminate awkward corners. Plus, a smaller table encourages intimacy during meals and helps the whole area feel more open and functional.

    7. Use Mirrors Strategically

    Image Source: The Tiny Cottage

    Mirrors can work magic in a small room. They reflect both natural and artificial light, which can instantly make a space feel larger and brighter. A large mirror on a wall opposite a window can double the amount of light in your room. Mirrored furniture or decor elements like trays and picture frames also help. Think about using mirrored closet doors or even creating a mirror gallery wall. It’s not just about brightness; mirrors also create a sense of depth, tricking the eye into seeing more space than there actually is.

    8. Install a Murphy Bed

    Image Source: House Beautiful

    A Murphy bedis a game-changer for anyone living in a tight space. It folds up into the wall or a cabinet when not in use, instantly transforming your bedroom into a living room, office, or workout area. This setup gives you the flexibility to have a multi-purpose room without sacrificing comfort. Modern Murphy beds often come with built-in shelves or desks, offering even more function without taking up extra space. If you want to reclaim your floor during the day and still get a good night’s sleep, this is one smart solution.

    9. Paint It White

    Image Source: House Beautiful

    Painting your walls white is one of the easiest and most effective tricks to make a space feel bigger. White reflects light, helping the room feel open, clean, and fresh. It creates a seamless look, making walls seem to recede and ceilings feel higher. You can still have fun with the space, layer in texture, subtle patterns, or neutral accessories to keep it from feeling sterile. White also acts as a blank canvas, letting your furniture and art stand out. Whether you’re decorating a studio apartment or a small home office, a fresh coat of white paint can work wonders.

    10. Prioritize Natural Light

    Image Source: The Spruce

    Natural light has an incredible ability to make any room feel more spacious and welcoming. To make the most of it, avoid blocking windows with bulky furniture or dark curtains. Consider using light-filtering shades or sheer curtains to let sunlight pour in while maintaining some privacy. Arrange mirrors or reflective surfaces like glossy tables and metallic decor to bounce the light around the room. Even placing furniture in a way that lets light flow freely can change how open your home feels. Natural light not only brightens your space but also boosts your mood, making it a double win.

    11. Maximize Shelving

    Image Source: House Beautiful

    When floor space is limited, vertical storage becomes your best ally. Floating shelves, wall-mounted units, or tall bookcases draw the eye upward, creating a sense of height and maximizing every inch. They’re perfect for books, plants, artwork, or even kitchen supplies if you’re short on cabinets. You can also install corner shelves to use often-overlooked spots. Keep them tidy and curated,group items by color, size, or theme for a visually pleasing look. Shelving helps reduce clutter on the floor and tabletops, keeping your home organized and visually open without requiring any extra square footage.

    12. Keep It Neutral

    Image Source: House Beautiful

    Neutral tones, like soft whites, light grays, warm beiges, and pale taupes,can make a space feel calm and cohesive. These colors reflect light well and reduce visual clutter, making your room appear larger. A neutral palette doesn’t mean boring; you can still play with textures, patterns, and accents within that color family. Add throw pillows, rugs, or wall art in layered neutrals for interest without overwhelming the space. When everything flows in similar tones, it creates continuity, which tricks the eye into seeing a more expansive area. It’s an effortless way to open up your home without lifting a hammer.

    13. Choose Benches, Not Chairs

    Image Source: House Beautiful

    When space is tight, traditional dining chairs or bulky accent seats can eat up more room than they’re worth. Benches, on the other hand, are a sleek, versatile alternative. They tuck neatly under tables when not in use, saving valuable floor space and keeping walkways open. In entryways, living rooms, or at the foot of a bed, a bench offers seating and can double as storage or display. Some come with built-in compartments or open space beneath for baskets. Plus, benches visually declutter the room with their simple, low-profile design.

    14. Use Vertical Spaces

    Image Source: The Spruce

    When you’re short on square footage, think vertical. Use tall bookshelves, wall-mounted shelves, and hanging storage to keep things off the floor. Vertical lines naturally draw the eye upward, which creates a feeling of height and openness. Consider mounting floating shelves for books, plants, or decorative items. Hooks and pegboards can add function without taking up space. Making use of your wall space not only maximizes storage but also frees up floor area, which visually enlarges the room.

    15. Add a Gallery Wall

    Image Source: House Beautiful

    It might seem counterintuitive, but adding a gallery wall can actually make a small space feel bigger,if done right. A curated display of art, photos, or prints draws the eye upward and outward, giving the illusion of a larger area. Stick to cohesive frames and colors to maintain a clean, intentional look. You can go symmetrical for a polished feel or get creative with an organic, freeform layout. Position the gallery higher on the wall to elongate the space visually. Just be sure not to overcrowd,balance is key. A thoughtful gallery wall adds personality without cluttering the room.

    Finishing Notes:

    Creating a spacious feel in a small home doesn’t require a sledgehammer or a major remodel, it just takes a bit of strategy and smart design. From downsizing your dining table to letting natural light pour in, each tip we’ve shared is an easy, budget-friendly way to visually open up your space.

    If you’re looking for even more inspiration, layout ideas, or style guides, be sure to explore Home Designing. It’s packed with expert advice, modern interior trends, and visual walkthroughs to help you transform your space, big or small, into something that truly feels like home.
    #how #make #small #space #look
    How Do I Make A Small Space Look Bigger Without Renovating
    Living in a small space doesn’t mean you have to feel cramped or boxed in. With the right design tricks, you can make even the tiniest room feel open, airy, and inviting, no renovation required. Whether you’re in a compact apartment, a small home, or just trying to make the most of a single room, smart styling and layout choices can dramatically shift how the space looks and feels. From strategic lighting and paint colors to furniture swaps and clever storage solutions, there are plenty of easy, affordable ways to stretch your square footage visually. Ready to transform your space? Here are some practical, design-savvy ideas to make your home feel bigger without tearing down a single wall. 1. Opt for Multi-Functional Furniture Image Source: House Beautiful In a small space, every piece of furniture should earn its keep. Look for multi-functional items: ottomans that open up for storage, beds with drawers underneath, or coffee tables that can extend or lift to become a desk. Not only do these pieces help reduce clutter, but they also free up floor space, making the room look more open. Bonus points for furniture that can be folded away when not in use. By choosing versatile pieces, you’re making the most of every inch without sacrificing style or comfort. 2. Keep Pathways Clear Image Source: The Spruce One of the simplest yet most effective ways to make a small space feel bigger is to keep pathways and walkways clear. When furniture or clutter blocks natural movement through a room, it can make the space feel cramped and chaotic. Take a walk through your home and notice where you’re dodging corners or squeezing between pieces,those are areas to rethink. Opt for smaller furniture with slim profiles, or rearrange what you have to create an easy, natural flow. Open walkways help your eyes move freely through the room, making everything feel more spacious, breathable, and intentional. It’s all about giving yourself room to move,literally and visually. 3. Use Glass and Lucite Furniture Image Source: The Spruce Transparent furniture made from glass or Lucitetakes up less visual space because you can see right through it. A glass coffee table or clear dining chairs can provide functionality without cluttering up the view. These pieces practically disappear into the background, which helps the room feel more open. They also add a touch of modern sophistication. When you need furniture but don’t want it to dominate the room, going clear is a clever design choice. 4. Don’t Over-Clutter Your Space Image Source: House Beautiful In small spaces, clutter accumulates fast,and it visually shrinks your environment. The more items scattered around, the more cramped the room feels. Start by taking a critical look at what you own and asking: do I really need this here? Use storage bins, under-bed containers, or floating shelves to hide away what you don’t use daily. Keep surfaces like countertops, desks, and coffee tables as clear as possible. A minimal, clean setup allows the eye to rest and makes the space feel open and intentional. Remember: less stuff equals more space,both physically and mentally. 5. Utilize Your Windows Image Source: House Beautiful Windows are like built-in art that can also dramatically affect how big or small your space feels. Don’t cover them with heavy drapes or clutter them with too many objects on the sill. Keep window treatments light and minimal,sheer curtains or roller blinds are perfect. If privacy isn’t a big concern, consider leaving them bare. Letting natural light flood in through your windows instantly opens up your space and makes it feel brighter and more expansive. You can also place mirrors or shiny surfaces near windows to reflect more light into the room and maximize their impact. 6. Downsize Your Dining Table Image Source: House Beautiful A large dining table can dominate a small room, leaving little space to move or breathe. If you rarely entertain a big crowd, consider downsizing to a smaller round or drop-leaf table. These take up less visual and physical space and still offer enough room for daily meals. You can always keep a folding table or stackable chairs nearby for when guests do come over. Round tables are especially great for small spaces because they allow smoother traffic flow and eliminate awkward corners. Plus, a smaller table encourages intimacy during meals and helps the whole area feel more open and functional. 7. Use Mirrors Strategically Image Source: The Tiny Cottage Mirrors can work magic in a small room. They reflect both natural and artificial light, which can instantly make a space feel larger and brighter. A large mirror on a wall opposite a window can double the amount of light in your room. Mirrored furniture or decor elements like trays and picture frames also help. Think about using mirrored closet doors or even creating a mirror gallery wall. It’s not just about brightness; mirrors also create a sense of depth, tricking the eye into seeing more space than there actually is. 8. Install a Murphy Bed Image Source: House Beautiful A Murphy bedis a game-changer for anyone living in a tight space. It folds up into the wall or a cabinet when not in use, instantly transforming your bedroom into a living room, office, or workout area. This setup gives you the flexibility to have a multi-purpose room without sacrificing comfort. Modern Murphy beds often come with built-in shelves or desks, offering even more function without taking up extra space. If you want to reclaim your floor during the day and still get a good night’s sleep, this is one smart solution. 9. Paint It White Image Source: House Beautiful Painting your walls white is one of the easiest and most effective tricks to make a space feel bigger. White reflects light, helping the room feel open, clean, and fresh. It creates a seamless look, making walls seem to recede and ceilings feel higher. You can still have fun with the space, layer in texture, subtle patterns, or neutral accessories to keep it from feeling sterile. White also acts as a blank canvas, letting your furniture and art stand out. Whether you’re decorating a studio apartment or a small home office, a fresh coat of white paint can work wonders. 10. Prioritize Natural Light Image Source: The Spruce Natural light has an incredible ability to make any room feel more spacious and welcoming. To make the most of it, avoid blocking windows with bulky furniture or dark curtains. Consider using light-filtering shades or sheer curtains to let sunlight pour in while maintaining some privacy. Arrange mirrors or reflective surfaces like glossy tables and metallic decor to bounce the light around the room. Even placing furniture in a way that lets light flow freely can change how open your home feels. Natural light not only brightens your space but also boosts your mood, making it a double win. 11. Maximize Shelving Image Source: House Beautiful When floor space is limited, vertical storage becomes your best ally. Floating shelves, wall-mounted units, or tall bookcases draw the eye upward, creating a sense of height and maximizing every inch. They’re perfect for books, plants, artwork, or even kitchen supplies if you’re short on cabinets. You can also install corner shelves to use often-overlooked spots. Keep them tidy and curated,group items by color, size, or theme for a visually pleasing look. Shelving helps reduce clutter on the floor and tabletops, keeping your home organized and visually open without requiring any extra square footage. 12. Keep It Neutral Image Source: House Beautiful Neutral tones, like soft whites, light grays, warm beiges, and pale taupes,can make a space feel calm and cohesive. These colors reflect light well and reduce visual clutter, making your room appear larger. A neutral palette doesn’t mean boring; you can still play with textures, patterns, and accents within that color family. Add throw pillows, rugs, or wall art in layered neutrals for interest without overwhelming the space. When everything flows in similar tones, it creates continuity, which tricks the eye into seeing a more expansive area. It’s an effortless way to open up your home without lifting a hammer. 13. Choose Benches, Not Chairs Image Source: House Beautiful When space is tight, traditional dining chairs or bulky accent seats can eat up more room than they’re worth. Benches, on the other hand, are a sleek, versatile alternative. They tuck neatly under tables when not in use, saving valuable floor space and keeping walkways open. In entryways, living rooms, or at the foot of a bed, a bench offers seating and can double as storage or display. Some come with built-in compartments or open space beneath for baskets. Plus, benches visually declutter the room with their simple, low-profile design. 14. Use Vertical Spaces Image Source: The Spruce When you’re short on square footage, think vertical. Use tall bookshelves, wall-mounted shelves, and hanging storage to keep things off the floor. Vertical lines naturally draw the eye upward, which creates a feeling of height and openness. Consider mounting floating shelves for books, plants, or decorative items. Hooks and pegboards can add function without taking up space. Making use of your wall space not only maximizes storage but also frees up floor area, which visually enlarges the room. 15. Add a Gallery Wall Image Source: House Beautiful It might seem counterintuitive, but adding a gallery wall can actually make a small space feel bigger,if done right. A curated display of art, photos, or prints draws the eye upward and outward, giving the illusion of a larger area. Stick to cohesive frames and colors to maintain a clean, intentional look. You can go symmetrical for a polished feel or get creative with an organic, freeform layout. Position the gallery higher on the wall to elongate the space visually. Just be sure not to overcrowd,balance is key. A thoughtful gallery wall adds personality without cluttering the room. Finishing Notes: Creating a spacious feel in a small home doesn’t require a sledgehammer or a major remodel, it just takes a bit of strategy and smart design. From downsizing your dining table to letting natural light pour in, each tip we’ve shared is an easy, budget-friendly way to visually open up your space. If you’re looking for even more inspiration, layout ideas, or style guides, be sure to explore Home Designing. It’s packed with expert advice, modern interior trends, and visual walkthroughs to help you transform your space, big or small, into something that truly feels like home. #how #make #small #space #look
    WWW.HOME-DESIGNING.COM
    How Do I Make A Small Space Look Bigger Without Renovating
    Living in a small space doesn’t mean you have to feel cramped or boxed in. With the right design tricks, you can make even the tiniest room feel open, airy, and inviting, no renovation required. Whether you’re in a compact apartment, a small home, or just trying to make the most of a single room, smart styling and layout choices can dramatically shift how the space looks and feels. From strategic lighting and paint colors to furniture swaps and clever storage solutions, there are plenty of easy, affordable ways to stretch your square footage visually. Ready to transform your space? Here are some practical, design-savvy ideas to make your home feel bigger without tearing down a single wall. 1. Opt for Multi-Functional Furniture Image Source: House Beautiful In a small space, every piece of furniture should earn its keep. Look for multi-functional items: ottomans that open up for storage, beds with drawers underneath, or coffee tables that can extend or lift to become a desk. Not only do these pieces help reduce clutter, but they also free up floor space, making the room look more open. Bonus points for furniture that can be folded away when not in use. By choosing versatile pieces, you’re making the most of every inch without sacrificing style or comfort. 2. Keep Pathways Clear Image Source: The Spruce One of the simplest yet most effective ways to make a small space feel bigger is to keep pathways and walkways clear. When furniture or clutter blocks natural movement through a room, it can make the space feel cramped and chaotic. Take a walk through your home and notice where you’re dodging corners or squeezing between pieces,those are areas to rethink. Opt for smaller furniture with slim profiles, or rearrange what you have to create an easy, natural flow. Open walkways help your eyes move freely through the room, making everything feel more spacious, breathable, and intentional. It’s all about giving yourself room to move,literally and visually. 3. Use Glass and Lucite Furniture Image Source: The Spruce Transparent furniture made from glass or Lucite (acrylic) takes up less visual space because you can see right through it. A glass coffee table or clear dining chairs can provide functionality without cluttering up the view. These pieces practically disappear into the background, which helps the room feel more open. They also add a touch of modern sophistication. When you need furniture but don’t want it to dominate the room, going clear is a clever design choice. 4. Don’t Over-Clutter Your Space Image Source: House Beautiful In small spaces, clutter accumulates fast,and it visually shrinks your environment. The more items scattered around, the more cramped the room feels. Start by taking a critical look at what you own and asking: do I really need this here? Use storage bins, under-bed containers, or floating shelves to hide away what you don’t use daily. Keep surfaces like countertops, desks, and coffee tables as clear as possible. A minimal, clean setup allows the eye to rest and makes the space feel open and intentional. Remember: less stuff equals more space,both physically and mentally. 5. Utilize Your Windows Image Source: House Beautiful Windows are like built-in art that can also dramatically affect how big or small your space feels. Don’t cover them with heavy drapes or clutter them with too many objects on the sill. Keep window treatments light and minimal,sheer curtains or roller blinds are perfect. If privacy isn’t a big concern, consider leaving them bare. Letting natural light flood in through your windows instantly opens up your space and makes it feel brighter and more expansive. You can also place mirrors or shiny surfaces near windows to reflect more light into the room and maximize their impact. 6. Downsize Your Dining Table Image Source: House Beautiful A large dining table can dominate a small room, leaving little space to move or breathe. If you rarely entertain a big crowd, consider downsizing to a smaller round or drop-leaf table. These take up less visual and physical space and still offer enough room for daily meals. You can always keep a folding table or stackable chairs nearby for when guests do come over. Round tables are especially great for small spaces because they allow smoother traffic flow and eliminate awkward corners. Plus, a smaller table encourages intimacy during meals and helps the whole area feel more open and functional. 7. Use Mirrors Strategically Image Source: The Tiny Cottage Mirrors can work magic in a small room. They reflect both natural and artificial light, which can instantly make a space feel larger and brighter. A large mirror on a wall opposite a window can double the amount of light in your room. Mirrored furniture or decor elements like trays and picture frames also help. Think about using mirrored closet doors or even creating a mirror gallery wall. It’s not just about brightness; mirrors also create a sense of depth, tricking the eye into seeing more space than there actually is. 8. Install a Murphy Bed Image Source: House Beautiful A Murphy bed (also known as a wall bed) is a game-changer for anyone living in a tight space. It folds up into the wall or a cabinet when not in use, instantly transforming your bedroom into a living room, office, or workout area. This setup gives you the flexibility to have a multi-purpose room without sacrificing comfort. Modern Murphy beds often come with built-in shelves or desks, offering even more function without taking up extra space. If you want to reclaim your floor during the day and still get a good night’s sleep, this is one smart solution. 9. Paint It White Image Source: House Beautiful Painting your walls white is one of the easiest and most effective tricks to make a space feel bigger. White reflects light, helping the room feel open, clean, and fresh. It creates a seamless look, making walls seem to recede and ceilings feel higher. You can still have fun with the space, layer in texture, subtle patterns, or neutral accessories to keep it from feeling sterile. White also acts as a blank canvas, letting your furniture and art stand out. Whether you’re decorating a studio apartment or a small home office, a fresh coat of white paint can work wonders. 10. Prioritize Natural Light Image Source: The Spruce Natural light has an incredible ability to make any room feel more spacious and welcoming. To make the most of it, avoid blocking windows with bulky furniture or dark curtains. Consider using light-filtering shades or sheer curtains to let sunlight pour in while maintaining some privacy. Arrange mirrors or reflective surfaces like glossy tables and metallic decor to bounce the light around the room. Even placing furniture in a way that lets light flow freely can change how open your home feels. Natural light not only brightens your space but also boosts your mood, making it a double win. 11. Maximize Shelving Image Source: House Beautiful When floor space is limited, vertical storage becomes your best ally. Floating shelves, wall-mounted units, or tall bookcases draw the eye upward, creating a sense of height and maximizing every inch. They’re perfect for books, plants, artwork, or even kitchen supplies if you’re short on cabinets. You can also install corner shelves to use often-overlooked spots. Keep them tidy and curated,group items by color, size, or theme for a visually pleasing look. Shelving helps reduce clutter on the floor and tabletops, keeping your home organized and visually open without requiring any extra square footage. 12. Keep It Neutral Image Source: House Beautiful Neutral tones, like soft whites, light grays, warm beiges, and pale taupes,can make a space feel calm and cohesive. These colors reflect light well and reduce visual clutter, making your room appear larger. A neutral palette doesn’t mean boring; you can still play with textures, patterns, and accents within that color family. Add throw pillows, rugs, or wall art in layered neutrals for interest without overwhelming the space. When everything flows in similar tones, it creates continuity, which tricks the eye into seeing a more expansive area. It’s an effortless way to open up your home without lifting a hammer. 13. Choose Benches, Not Chairs Image Source: House Beautiful When space is tight, traditional dining chairs or bulky accent seats can eat up more room than they’re worth. Benches, on the other hand, are a sleek, versatile alternative. They tuck neatly under tables when not in use, saving valuable floor space and keeping walkways open. In entryways, living rooms, or at the foot of a bed, a bench offers seating and can double as storage or display. Some come with built-in compartments or open space beneath for baskets. Plus, benches visually declutter the room with their simple, low-profile design. 14. Use Vertical Spaces Image Source: The Spruce When you’re short on square footage, think vertical. Use tall bookshelves, wall-mounted shelves, and hanging storage to keep things off the floor. Vertical lines naturally draw the eye upward, which creates a feeling of height and openness. Consider mounting floating shelves for books, plants, or decorative items. Hooks and pegboards can add function without taking up space. Making use of your wall space not only maximizes storage but also frees up floor area, which visually enlarges the room. 15. Add a Gallery Wall Image Source: House Beautiful It might seem counterintuitive, but adding a gallery wall can actually make a small space feel bigger,if done right. A curated display of art, photos, or prints draws the eye upward and outward, giving the illusion of a larger area. Stick to cohesive frames and colors to maintain a clean, intentional look. You can go symmetrical for a polished feel or get creative with an organic, freeform layout. Position the gallery higher on the wall to elongate the space visually. Just be sure not to overcrowd,balance is key. A thoughtful gallery wall adds personality without cluttering the room. Finishing Notes: Creating a spacious feel in a small home doesn’t require a sledgehammer or a major remodel, it just takes a bit of strategy and smart design. From downsizing your dining table to letting natural light pour in, each tip we’ve shared is an easy, budget-friendly way to visually open up your space. If you’re looking for even more inspiration, layout ideas, or style guides, be sure to explore Home Designing. It’s packed with expert advice, modern interior trends, and visual walkthroughs to help you transform your space, big or small, into something that truly feels like home.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

    Jun 06, 2025The Hacker NewsMalware / Endpoint Security

    Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealeron Apple macOS systems.
    The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum.
    "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries."
    It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code.

    The starting point of the attack is a web page that impersonates Spectrum. Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further.
    However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification."
    Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS.
    The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer.
    "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said.
    "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users."
    The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year.
    "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and proceduresto gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads."

    The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue.
    The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls.
    The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa, and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware.
    Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism.
    "While the exact email structure varies from sample to sample, these campaigns generally provide Bookingcom-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said.
    The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies.

    In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data.
    "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data."
    Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks.
    These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojanslike NetSupport RAT are some of the payloads distributed via bogus Turnstile pages.
    "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine."

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #new #atomic #macos #stealer #campaign
    New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
    Jun 06, 2025The Hacker NewsMalware / Endpoint Security Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealeron Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum. "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries." It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code. The starting point of the attack is a web page that impersonates Spectrum. Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further. However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification." Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS. The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer. "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said. "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users." The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year. "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and proceduresto gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads." The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue. The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls. The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa, and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware. Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism. "While the exact email structure varies from sample to sample, these campaigns generally provide Bookingcom-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said. The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies. In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data. "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data." Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks. These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojanslike NetSupport RAT are some of the payloads distributed via bogus Turnstile pages. "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine." Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #new #atomic #macos #stealer #campaign
    THEHACKERNEWS.COM
    New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
    Jun 06, 2025The Hacker NewsMalware / Endpoint Security Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealer (AMOS) on Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum. "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries." It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code. The starting point of the attack is a web page that impersonates Spectrum ("panel-spectrum[.]net" or "spectrum-ticket[.]net"). Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further. However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification." Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS. The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer. "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said. "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users." The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year. "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and procedures (TTPs) to gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads." The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue. The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls. The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa (EMEA), and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware. Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism. "While the exact email structure varies from sample to sample, these campaigns generally provide Booking[.]com-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said. The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies. In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data. "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data." Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks. These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojans (RATs) like NetSupport RAT are some of the payloads distributed via bogus Turnstile pages. "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine." Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    640
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach

    Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishingcampaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion.
    The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com.
    "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News.

    This approach, Google's Threat Intelligence Groupadded, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft.
    A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform.
    Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or brandingfrom its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data.
    Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365.

    Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor.
    "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said.
    UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective.
    The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app.

    "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforcecom/setup/connect page in order to add a malicious connected app," the company said.
    "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data."
    The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access.
    "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said.
    "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #google #exposes #vishing #group #unc6040
    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishingcampaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com. "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News. This approach, Google's Threat Intelligence Groupadded, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft. A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform. Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or brandingfrom its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data. Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365. Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor. "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said. UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective. The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app. "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforcecom/setup/connect page in order to add a malicious connected app," the company said. "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data." The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access. "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said. "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #google #exposes #vishing #group #unc6040
    THEHACKERNEWS.COM
    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishing (aka vishing) campaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com. "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News. This approach, Google's Threat Intelligence Group (GTIG) added, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft. A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform. Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or branding (e.g., "My Ticket Portal") from its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data. Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365. Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor. "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said. UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective. The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app. "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforce[.]com/setup/connect page in order to add a malicious connected app," the company said. "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data." The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access. "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said. "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Angry
    Sad
    314
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Spot fake online stores, avoid Facebook subscription scams

    Published
    June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles!
    Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #spot #fake #online #stores #avoid
    Spot fake online stores, avoid Facebook subscription scams
    Published June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #spot #fake #online #stores #avoid
    WWW.FOXNEWS.COM
    Spot fake online stores, avoid Facebook subscription scams
    Published June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping online (Kurt "CyberGuy" Knutsson)What you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake products (Bitdefender) (Kurt "CyberGuy" Knutsson)The scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online (Kurt "CyberGuy" Knutsson)10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Windows PCs at risk as new tool disarms built-in security

    Published
    May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PCThe tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptopFrom GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE? Windows laptop showing the home screen6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features.3. Avoid running unexpected commands: Never paste or run commandsyou don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication: Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #windows #pcs #risk #new #tool
    Windows PCs at risk as new tool disarms built-in security
    Published May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PCThe tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptopFrom GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE? Windows laptop showing the home screen6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features.3. Avoid running unexpected commands: Never paste or run commandsyou don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication: Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #windows #pcs #risk #new #tool
    WWW.FOXNEWS.COM
    Windows PCs at risk as new tool disarms built-in security
    Published May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PC (Kurt "CyberGuy" Knutsson)The tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptop (Kurt "CyberGuy" Knutsson)From GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Windows laptop showing the home screen (Kurt "CyberGuy" Knutsson)6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).3. Avoid running unexpected commands: Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication (2FA): Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • You Are Not Prepared for This Terrifying New Wave of AI-Generated Videos

    I don't mean to be alarmist, but I do think it's time to start assuming everything you see online is fake. The internet is full of content produced by real people, of course. But AI-generated media is getting so realistic, that it almost puts you at a disadvantage to presume the content you're scrolling past on your feeds is legitimate. Don't skip this article because you know what AI content looks like—the current stuff your algorithm delivers to your social media feeds is easy to spot if you know what you're looking for. But even if you can identify AI slop the second it hits your eyeballs, you need to know you're not ready for the next wave of AI-generated videos. That wave isn't just on its way—it's already here. AI content is already fooling peopleMost of us are acutely aware of the "AI video" look: This "tragic" video of a cat parent saving their kitten by throwing it out of a burning airplane is obvious AI slop to most who watch it. You probably know Trump isn't working this construction site, and you most assuredly can understand this family of cat farmers is, in fact, AI-generated.But there are the videos that aren't so obvious, especially to those of us not quite so in tune with AI, or technology in general. You might know this video of babies dancing in a circle is AI, but plenty of the people in the comments didn't. You might also be able to tell that this family of pets isn't really watching a bird investigate a toy alligator, but, again, plenty can't. And there is no end to the America's Got Talent videos that feature "realistic" yet impossible visuals—that still capture the hearts of hundreds of thousands, if not millions of people.But I'm not writing this piece today because I'm concerned about how many of these "believable" AI videos are tricking way too many people into thinking they're real. I am worried about that, but those worries pale in comparison to my new fears.So far, most of the AI videos taking over social media feeds rely mainly on their visuals and background sounds to sell their alleged authenticity. You'll notice none of the characters in any of these videos actually speak. If they do, it's immediately off-putting, with out of sync lip movements and, typically, robotic voices. It's been easier for AI creators to put the emphasis on the realism of the people and animals in their videos, and hope you're wowed enough by a baby dancing with a lion to not think, "this is bullshit, right?"Even OpenAI's Sora video model, which shocked me with its quality in February of last year, was working off of its realistic visuals. A video of woman "filming" her reflection through a train window too real for comfort, but Sora wasn't spitting out fully-rendered conversations. If you see such a scene on your feeds, you probably assume, of course, it's a real video—or at least one generated by humans.AI video is about to change completelySomething happened this week that only made me more pessimistic about the future of truth on the internet. During this week's Google I/O event, Google unveiled Veo 3, its latest AI video model. Like other competitive models out there, Veo 3 can generate highly realistic sequences, which Google showed off throughout the presentation. Sure, not great, but also, nothing really new there. But Veo 3 isn't just capable of generating video that might trick your eye into thinking its real: Veo 3 can also generate audio to go alongside the video. That includes sound effects, but also dialogue—lip-synced dialogue. In order to demonstrate Veo 3's audio/video capabilities, Google showed off a clip of an old sailor at sea. The video quality is sharp and realistic, and the words the man speaks are synced to his lip movements. Of course, knowing the video is AI, you notice quirks that give away the gamebut I am quite confident this video would fool a lot of fans of fake AGT videos.

    But even this clip wasn't what inspired my newfound fears—it was the videos that users started making once they got their hands on Veo 3. PetaPixel has a great roundup of some of the "best" Veo 3 videos people have made so far, but I'll highlight some of the ones that should scare you most. This clip shows a streamer playing Fortnite. Everything, including the game footage, was generated with Google's AI:

    This Tweet is currently unavailable. It might be loading or has been removed.

    This clip shows three concerts that never happened, featuring musicians and crowds that do not exist. The music isn't good, but that's not the point. The music, from the vocals to the instrumentals, was generated entirely by the AI, and then synced to lips, drums, guitars, and strings:

    This Tweet is currently unavailable. It might be loading or has been removed.

    But this clip is, without a doubt, the one that should sound the alarm for each and every one of us. Someone generated a fake video of a fake car show, featuring fake interviews with fake attendees. It's far from perfect, but any AI quirks are totally overshadowed by the surface-level realism here. Not only would the AI's Got Talent fans buy this, I would buy this, especially if I wasn't looking out for it:

    This Tweet is currently unavailable. It might be loading or has been removed.

    It's the visuals; it's the dialogue; it's the crowds; it's the lighting; it's the candid laughter at "mistakes;" it's the sound of the mic being "bumped" into. Congratulations on noticing the dialogue often doesn't make sense, or that the people in the background defy the laws of physics—you won't notice it when it hits mid-scroll on TikTok or Instagram. Even Veo 2, which isn't as powerful as Veo 3, now offers tools for realism, like the ability to dictate how you want the camera to move. And both models are available in Flow, Google's AI video editor of sorts. Creators now have the ability to generate highly realistic AI content that feels like it was filmed in-person, and the tech is only getting better.

    This Tweet is currently unavailable. It might be loading or has been removed.

    Google's best AI video generator tools cost a month through its new AI Ultra subscription plan. That's expensive, but not out of reach for plenty of people interested in making AI-generated content. But the per month plan, AI Pro, still comes with Veo 2 and Flow access. The rate limits are lower, but I wouldn't be shocked to see some realistic slop come out of those limitations, too. It's time to be a full-time skepticNone of this tech is perfect. I'm not here to tell you that everything Veo 3 spits out is indistinguishable from real content, or that the videos are absent any of the usual AI tells. In fact, there's clearly something up with Veo 3's training data: As 404 Media reports, the model continuously generates the same weird "dad joke" whenever you ask for a generation of a comedian performing standup. What I'm saying is, it's time to turn on your bullshit detectors and keep them active full time. When engaging with videos on the internet—especially short-form algorithmic clips—you might be safer operating under the assumption the content is fake from the jump, and require proof beyond a reasonable doubt that what you're seeing wasn't generated with a simple prompt and a budget. That feels extreme, but after what I've seen this week, I don't really see another way to engage with this content going forward.We're in scary territory now. Today, it's demos of musicians and streamers. Tomorrow, it's a politician saying something they didn't; a suspect committing the crime they're accused of; a "reporter" feeding you lies through the "news."I hope this is as good as the technology gets. I hope AI companies run out of training data to improve their models, and that governments take some action to regulate this technology. But seeing as the Republicans in the United States passed a bill that included a ban on state-enforced AI regulations for ten years, I'm pretty pessimistic on that latter point. In all likelihood, this tech is going to get better, with zero guardrails to ensure it advances safely. I'm left wondering how many of those politicians who voted yes on that bill watched an AI-generated video on their phone this week and thought nothing of it.
    #you #are #not #prepared #this
    You Are Not Prepared for This Terrifying New Wave of AI-Generated Videos
    I don't mean to be alarmist, but I do think it's time to start assuming everything you see online is fake. The internet is full of content produced by real people, of course. But AI-generated media is getting so realistic, that it almost puts you at a disadvantage to presume the content you're scrolling past on your feeds is legitimate. Don't skip this article because you know what AI content looks like—the current stuff your algorithm delivers to your social media feeds is easy to spot if you know what you're looking for. But even if you can identify AI slop the second it hits your eyeballs, you need to know you're not ready for the next wave of AI-generated videos. That wave isn't just on its way—it's already here. AI content is already fooling peopleMost of us are acutely aware of the "AI video" look: This "tragic" video of a cat parent saving their kitten by throwing it out of a burning airplane is obvious AI slop to most who watch it. You probably know Trump isn't working this construction site, and you most assuredly can understand this family of cat farmers is, in fact, AI-generated.But there are the videos that aren't so obvious, especially to those of us not quite so in tune with AI, or technology in general. You might know this video of babies dancing in a circle is AI, but plenty of the people in the comments didn't. You might also be able to tell that this family of pets isn't really watching a bird investigate a toy alligator, but, again, plenty can't. And there is no end to the America's Got Talent videos that feature "realistic" yet impossible visuals—that still capture the hearts of hundreds of thousands, if not millions of people.But I'm not writing this piece today because I'm concerned about how many of these "believable" AI videos are tricking way too many people into thinking they're real. I am worried about that, but those worries pale in comparison to my new fears.So far, most of the AI videos taking over social media feeds rely mainly on their visuals and background sounds to sell their alleged authenticity. You'll notice none of the characters in any of these videos actually speak. If they do, it's immediately off-putting, with out of sync lip movements and, typically, robotic voices. It's been easier for AI creators to put the emphasis on the realism of the people and animals in their videos, and hope you're wowed enough by a baby dancing with a lion to not think, "this is bullshit, right?"Even OpenAI's Sora video model, which shocked me with its quality in February of last year, was working off of its realistic visuals. A video of woman "filming" her reflection through a train window too real for comfort, but Sora wasn't spitting out fully-rendered conversations. If you see such a scene on your feeds, you probably assume, of course, it's a real video—or at least one generated by humans.AI video is about to change completelySomething happened this week that only made me more pessimistic about the future of truth on the internet. During this week's Google I/O event, Google unveiled Veo 3, its latest AI video model. Like other competitive models out there, Veo 3 can generate highly realistic sequences, which Google showed off throughout the presentation. Sure, not great, but also, nothing really new there. But Veo 3 isn't just capable of generating video that might trick your eye into thinking its real: Veo 3 can also generate audio to go alongside the video. That includes sound effects, but also dialogue—lip-synced dialogue. In order to demonstrate Veo 3's audio/video capabilities, Google showed off a clip of an old sailor at sea. The video quality is sharp and realistic, and the words the man speaks are synced to his lip movements. Of course, knowing the video is AI, you notice quirks that give away the gamebut I am quite confident this video would fool a lot of fans of fake AGT videos. But even this clip wasn't what inspired my newfound fears—it was the videos that users started making once they got their hands on Veo 3. PetaPixel has a great roundup of some of the "best" Veo 3 videos people have made so far, but I'll highlight some of the ones that should scare you most. This clip shows a streamer playing Fortnite. Everything, including the game footage, was generated with Google's AI: This Tweet is currently unavailable. It might be loading or has been removed. This clip shows three concerts that never happened, featuring musicians and crowds that do not exist. The music isn't good, but that's not the point. The music, from the vocals to the instrumentals, was generated entirely by the AI, and then synced to lips, drums, guitars, and strings: This Tweet is currently unavailable. It might be loading or has been removed. But this clip is, without a doubt, the one that should sound the alarm for each and every one of us. Someone generated a fake video of a fake car show, featuring fake interviews with fake attendees. It's far from perfect, but any AI quirks are totally overshadowed by the surface-level realism here. Not only would the AI's Got Talent fans buy this, I would buy this, especially if I wasn't looking out for it: This Tweet is currently unavailable. It might be loading or has been removed. It's the visuals; it's the dialogue; it's the crowds; it's the lighting; it's the candid laughter at "mistakes;" it's the sound of the mic being "bumped" into. Congratulations on noticing the dialogue often doesn't make sense, or that the people in the background defy the laws of physics—you won't notice it when it hits mid-scroll on TikTok or Instagram. Even Veo 2, which isn't as powerful as Veo 3, now offers tools for realism, like the ability to dictate how you want the camera to move. And both models are available in Flow, Google's AI video editor of sorts. Creators now have the ability to generate highly realistic AI content that feels like it was filmed in-person, and the tech is only getting better. This Tweet is currently unavailable. It might be loading or has been removed. Google's best AI video generator tools cost a month through its new AI Ultra subscription plan. That's expensive, but not out of reach for plenty of people interested in making AI-generated content. But the per month plan, AI Pro, still comes with Veo 2 and Flow access. The rate limits are lower, but I wouldn't be shocked to see some realistic slop come out of those limitations, too. It's time to be a full-time skepticNone of this tech is perfect. I'm not here to tell you that everything Veo 3 spits out is indistinguishable from real content, or that the videos are absent any of the usual AI tells. In fact, there's clearly something up with Veo 3's training data: As 404 Media reports, the model continuously generates the same weird "dad joke" whenever you ask for a generation of a comedian performing standup. What I'm saying is, it's time to turn on your bullshit detectors and keep them active full time. When engaging with videos on the internet—especially short-form algorithmic clips—you might be safer operating under the assumption the content is fake from the jump, and require proof beyond a reasonable doubt that what you're seeing wasn't generated with a simple prompt and a budget. That feels extreme, but after what I've seen this week, I don't really see another way to engage with this content going forward.We're in scary territory now. Today, it's demos of musicians and streamers. Tomorrow, it's a politician saying something they didn't; a suspect committing the crime they're accused of; a "reporter" feeding you lies through the "news."I hope this is as good as the technology gets. I hope AI companies run out of training data to improve their models, and that governments take some action to regulate this technology. But seeing as the Republicans in the United States passed a bill that included a ban on state-enforced AI regulations for ten years, I'm pretty pessimistic on that latter point. In all likelihood, this tech is going to get better, with zero guardrails to ensure it advances safely. I'm left wondering how many of those politicians who voted yes on that bill watched an AI-generated video on their phone this week and thought nothing of it. #you #are #not #prepared #this
    LIFEHACKER.COM
    You Are Not Prepared for This Terrifying New Wave of AI-Generated Videos
    I don't mean to be alarmist, but I do think it's time to start assuming everything you see online is fake. The internet is full of content produced by real people, of course (this article included). But AI-generated media is getting so realistic, that it almost puts you at a disadvantage to presume the content you're scrolling past on your feeds is legitimate. Don't skip this article because you know what AI content looks like—the current stuff your algorithm delivers to your social media feeds is easy to spot if you know what you're looking for. But even if you can identify AI slop the second it hits your eyeballs, you need to know you're not ready for the next wave of AI-generated videos. That wave isn't just on its way—it's already here. AI content is already fooling peopleMost of us are acutely aware of the "AI video" look: This "tragic" video of a cat parent saving their kitten by throwing it out of a burning airplane is obvious AI slop to most who watch it. You probably know Trump isn't working this construction site, and you most assuredly can understand this family of cat farmers is, in fact, AI-generated.But there are the videos that aren't so obvious, especially to those of us not quite so in tune with AI, or technology in general. You might know this video of babies dancing in a circle is AI, but plenty of the people in the comments didn't (assuming they aren't bots, either). You might also be able to tell that this family of pets isn't really watching a bird investigate a toy alligator, but, again, plenty can't. And there is no end to the America's Got Talent videos that feature "realistic" yet impossible visuals—that still capture the hearts of hundreds of thousands, if not millions of people. (I weep.)But I'm not writing this piece today because I'm concerned about how many of these "believable" AI videos are tricking way too many people into thinking they're real. I am worried about that, but those worries pale in comparison to my new fears.So far, most of the AI videos taking over social media feeds rely mainly on their visuals and background sounds to sell their alleged authenticity. You'll notice none of the characters in any of these videos actually speak. If they do, it's immediately off-putting, with out of sync lip movements and, typically, robotic voices. It's been easier for AI creators to put the emphasis on the realism of the people and animals in their videos, and hope you're wowed enough by a baby dancing with a lion to not think, "this is bullshit, right?"Even OpenAI's Sora video model, which shocked me with its quality in February of last year, was working off of its realistic visuals. A video of woman "filming" her reflection through a train window too real for comfort, but Sora wasn't spitting out fully-rendered conversations. If you see such a scene on your feeds, you probably assume, of course, it's a real video—or at least one generated by humans.AI video is about to change completelySomething happened this week that only made me more pessimistic about the future of truth on the internet. During this week's Google I/O event, Google unveiled Veo 3, its latest AI video model. Like other competitive models out there, Veo 3 can generate highly realistic sequences, which Google showed off throughout the presentation. Sure, not great, but also, nothing really new there. But Veo 3 isn't just capable of generating video that might trick your eye into thinking its real: Veo 3 can also generate audio to go alongside the video. That includes sound effects, but also dialogue—lip-synced dialogue. In order to demonstrate Veo 3's audio/video capabilities, Google showed off a clip of an old sailor at sea. The video quality is sharp and realistic, and the words the man speaks are synced to his lip movements. Of course, knowing the video is AI, you notice quirks that give away the game (to my eye, this looks like a high quality animation more than a live action shot) but I am quite confident this video would fool a lot of fans of fake AGT videos. But even this clip wasn't what inspired my newfound fears—it was the videos that users started making once they got their hands on Veo 3. PetaPixel has a great roundup of some of the "best" Veo 3 videos people have made so far, but I'll highlight some of the ones that should scare you most. This clip shows a streamer playing Fortnite. Everything, including the game footage, was generated with Google's AI: This Tweet is currently unavailable. It might be loading or has been removed. This clip shows three concerts that never happened, featuring musicians and crowds that do not exist. The music isn't good, but that's not the point. The music, from the vocals to the instrumentals, was generated entirely by the AI, and then synced to lips, drums, guitars, and strings: This Tweet is currently unavailable. It might be loading or has been removed. But this clip is, without a doubt, the one that should sound the alarm for each and every one of us. Someone generated a fake video of a fake car show, featuring fake interviews with fake attendees. It's far from perfect, but any AI quirks are totally overshadowed by the surface-level realism here. Not only would the AI's Got Talent fans buy this, I would buy this, especially if I wasn't looking out for it: This Tweet is currently unavailable. It might be loading or has been removed. It's the visuals; it's the dialogue; it's the crowds; it's the lighting; it's the candid laughter at "mistakes;" it's the sound of the mic being "bumped" into. Congratulations on noticing the dialogue often doesn't make sense, or that the people in the background defy the laws of physics—you won't notice it when it hits mid-scroll on TikTok or Instagram. Even Veo 2, which isn't as powerful as Veo 3, now offers tools for realism, like the ability to dictate how you want the camera to move. And both models are available in Flow, Google's AI video editor of sorts. Creators now have the ability to generate highly realistic AI content that feels like it was filmed in-person, and the tech is only getting better. This Tweet is currently unavailable. It might be loading or has been removed. Google's best AI video generator tools cost $250 a month through its new AI Ultra subscription plan. That's expensive, but not out of reach for plenty of people interested in making AI-generated content. But the $20 per month plan, AI Pro, still comes with Veo 2 and Flow access. The rate limits are lower, but I wouldn't be shocked to see some realistic slop come out of those limitations, too. It's time to be a full-time skepticNone of this tech is perfect. I'm not here to tell you that everything Veo 3 spits out is indistinguishable from real content, or that the videos are absent any of the usual AI tells. In fact, there's clearly something up with Veo 3's training data: As 404 Media reports, the model continuously generates the same weird "dad joke" whenever you ask for a generation of a comedian performing standup. What I'm saying is, it's time to turn on your bullshit detectors and keep them active full time. When engaging with videos on the internet—especially short-form algorithmic clips—you might be safer operating under the assumption the content is fake from the jump, and require proof beyond a reasonable doubt that what you're seeing wasn't generated with a simple prompt and a $250 budget. That feels extreme, but after what I've seen this week, I don't really see another way to engage with this content going forward.We're in scary territory now. Today, it's demos of musicians and streamers. Tomorrow, it's a politician saying something they didn't; a suspect committing the crime they're accused of; a "reporter" feeding you lies through the "news."I hope this is as good as the technology gets. I hope AI companies run out of training data to improve their models, and that governments take some action to regulate this technology. But seeing as the Republicans in the United States passed a bill that included a ban on state-enforced AI regulations for ten years, I'm pretty pessimistic on that latter point. In all likelihood, this tech is going to get better, with zero guardrails to ensure it advances safely. I'm left wondering how many of those politicians who voted yes on that bill watched an AI-generated video on their phone this week and thought nothing of it.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • People are tricking AI chatbots into helping commit crimes

    A universal jailbreak for bypassing AI chatbot safety features has been uncovered and is raising many concerns.
    #people #are #tricking #chatbots #into
    People are tricking AI chatbots into helping commit crimes
    A universal jailbreak for bypassing AI chatbot safety features has been uncovered and is raising many concerns. #people #are #tricking #chatbots #into
    WWW.TECHRADAR.COM
    People are tricking AI chatbots into helping commit crimes
    A universal jailbreak for bypassing AI chatbot safety features has been uncovered and is raising many concerns.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Mission: Impossible - The Final Reckoning Ending Explained - Is This Really the End of Tom Cruise's M:I Series?

    Let's make this simple: You want to know if there are any post- or mid-credits scenes in Mission: Impossible - The Final Reckoning. The answer is no, there are none.Full spoilers follow.It's been one wild, stunt-filled ride over the past 29 years, but every mission must come to an end eventually. Mission: Impossible - The Final Reckoning is apparently the final entry in this long-running series, as Tom Cruise's Ethan Hunt confronts his most daring and high-stakes mission yet.Now that The Final Reckoning is in theaters, we’re here to break down the ending to this epic blockbuster. Who lives? Who dies? Is this really the end of the road for Ethan and his team, or could the franchise return? Read on to learn more.Mission: Impossible – The Final Reckoning GalleryMission: Impossible - The Final Reckoning’s Ending ExplainedThe Mission: Impossible series has always been about the IMF racing against the clock to prevent various villains from unleashing global catastrophes, but the deck is really stacked against Ethan and his team in the eighth and final movie. While Ethan stopped Esai Morales’ Gabriel in the short term in 2023’s Mission: Impossible - Dead Reckoning Part One, there’s still the little problem of the hyper-advanced AI known as “The Entity” worming its way into every computer system across the globe. The situation is immediately dire in The Final Reckoning, with The Entity systematically taking over the nuclear stockpiles of every nation on Earth and Angela Bassett’s President Sloane forced to choose whether to unleash a preemptive strike on those nations. The Final Reckoning only further cements its dark, foreboding tone when Ving Rhames’ Luther Stickell becomes an early casualty in the conflict with Gabriel, which allows Gabriel to take possession of Luther’s Poison Pill device. Even after Ethan defies the odds and retrieves The Entity’s source code from the sunken Sevastopol submarine, he knows that the code is useless unless he can combine it with the Poison Pill. One way or another, all roads lead to Gabriel.As this conflict unfolds, The Final Reckoning introduces some fun and unexpected callbacks to previous Mission: Impossible films. For example, we learn that The Entity has its roots in the Rabbit’s Foot, the MacGuffin device from 2006’s Mission: Impossible III. Ethan’s team also reunites with former CIA analyst William Donloe, the man who almost walked in on Ethan during his tense wire-hacking mission from the original film. Meanwhile, Shea Whigham’s Jasper Briggs is revealed to be the son of Jon Voight’s Jim Phelps, the IMF leader from the original film. No wonder he seems to bear such a personal grudge toward Ethan. Ethan and Gabriel’s paths do ultimately converge in South Africa, at a digital bunker where The Entity plans to retreat before unleashing a nuclear holocaust. Ethan’s plan is to retrieve the Poison Pill and combine it with the source code module, tricking The Entity into isolating itself on a holographic drive that Hayley Atwell’s Grace can then pickpocket. Predictably, things go haywire with the arrival of CIA Director Kittridgeand his team, and Simon Pegg’s Benji is shot in the ensuing chaos. As Ethan and Gabriel battle it out aboard two dueling planes, the clock steadily ticks down to nuclear armageddon. President Sloane is forced to make her choice, and she chooses to trust Ethan and pull the US’s nuclear arsenal offline rather than allow The Entity to take control. Ethan finally outwits Gabriel, and the latter’s defiant villain speech is cut short when he bashes his head into the tail of his plane. Ethan parachutes to safety and combines the module with the Poison Pill. Grace performs the impossible feat of snatching the drive at just the right moment, trapping The Entity in its tiny prison. Once again, Ethan and the IMF have saved the world from ruin, even if few people will ever know the full truth. Even more impressive, they do so without any further casualties. Benji survives his near-fatal gunshot wound, meaning Luther is the only IMF member to die in The Final Reckoning. Ethan and his team reunite one last time in London’s Trafalgar Square, where Grace hands Ethan the briefcase containing The Entity. After exchanging solemn nods, they all go their separate ways. Thus ends their latest, and apparently last, impossible mission.PlayDoes The Final Reckoning Have a Post-Credits Scene?As mentioned above, the eighth and finalMission: Impossible movie has no mid- or post-credits scenes. You're free to leave once the credits start rolling. Though, as always, it never hurts to stick around and show some appreciation for all the cast and crew who made those death-defying stunts happen. The lack of a post-credits scene isn't necessarily that surprising, given that they've never really been a thing with this particular Hollywood franchise. Still, with this supposedly being the last entry in the series, you might think Cruise and director Christopher McQuarrie would want to give fans one last nod before sending Ethan Hunt off into the sunset. As much as this is billed as the conclusion of the series, The Final Reckoning certainly leaves the door open for more. A post-credits scene could have hinted at what’s next for the victorious Ethan. But that does raise an important question. Is this really the end? Let’s explore what we know.Is This Really the End of the Mission: Impossible Series? Paramount has definitely marketed The Final Reckoning as the conclusion to the Mission: Impossible saga. It’s right there in the name. This film is meant to cap off a 29-year journey and chronicle Ethan Hunt’s final and most desperate mission.But how final is this film, really? It certainly wraps up on a pretty open-ended note. Ethan is still alive, having somehow survived diving to loot a sunken submarine in the frigid Arctic Ocean. Luther may have perished heroically, but the rest of the IMF is alive, too. That’s honestly one of the criticisms that can be leveled at The Final Reckoning. Even in this supposedly final outing, the film seems reluctant to break too many of its toys or veer outside the standard formula. Anyone expecting to see Cruise’s iconic hero finally bite off more than he can chew and meet his end will come away disappointed.Given the way The Final Reckoning ends, there’s nothing stopping Paramount from greenlighting another sequel featuring this revamped cast, with Cruise’s Ethan being joined by Atwell’s Grace, Pegg’s Benji, Pom Klementieff’s Paris, and Greg Tarzan Davis’ Theo Degas. The studio certainly seems to be leaving that door open, whether or not they choose to walk through it.It may all come down to a question of money. The Mission: Impossible franchise has certainly raked in the cash for Paramount over the years, but these movies are also insanely expensive to produce. Stunts this epic and stars this famous don’t come cheap. Case in point: Mission: Impossible - Dead Reckoning Part One grossed an impressive million worldwide, yet the film is still considered to be a box office failure because of its massive budget. PlayThe Final Reckoning’s budget is reported to be as high as million even before marketing, meaning it needs to gross way more than its predecessor to break even. That may be too much to hope for in a summer movie season as crowded as this one. That’s to say nothing of the fact that audiences are proving ever more fickle in the age of endless streaming options.Given the astronomical cost of making Mission: Impossible movies, Paramount may be happy to close the door on the franchise and focus on the more profitable Top Gun series. The ROI simply isn’t there any longer.That said, we could see Paramount pivoting in a slightly different direction with Mission: Impossible. Perhaps Cruise’s character could become more of a supporting player, with a new generation of heroic IMF agents taking center stage. That formula certainly worked for 2022’s Top Gun: Maverick. At one point, rumors even suggested that Maverick star Glen Powell was being eyed to become the new face of the M:I franchise, though Powell himself has denied this. At the very least, we know director Christopher McQuarrie has explored the idea of further sequels beyond The Final Reckoning. But if the studio ever does greenlight them, we suspect the goal will be to pivot to smaller, cheaper spinoffs with less emphasis on Cruise. It’s not as if Cruise is getting any younger, and at some point, Ethan Hunt needs to be allowed to retire for real. How many times can one guy save the world before it’s enough? In IGN's Mission: Impossible - The Final Reckoning review, Clint Gage gave the film a 6 out of 10, writing, "While its action is reliably thrilling and a few of its most exciting sequences are sure to hold up through the years, Mission: Impossible – The Final Reckoning tries to deal with no less than the end of every living thing on the planet – and suffers because of it. The somber tone and melodramatic dialogue miss the mark of what’s made this franchise so much fun for 30 years, but the door is left open for more impossible missions and the hope that this self-serious reckoning isn’t actually final." PlayFor more on the series, check out our ranking of the Mission: Impossible movies from worst to best.Jesse is a mild-mannered staff writer for IGN. Allow him to lend a machete to your intellectual thicket byfollowing @jschedeen on BlueSky.
    #mission #impossible #final #reckoning #ending
    Mission: Impossible - The Final Reckoning Ending Explained - Is This Really the End of Tom Cruise's M:I Series?
    Let's make this simple: You want to know if there are any post- or mid-credits scenes in Mission: Impossible - The Final Reckoning. The answer is no, there are none.Full spoilers follow.It's been one wild, stunt-filled ride over the past 29 years, but every mission must come to an end eventually. Mission: Impossible - The Final Reckoning is apparently the final entry in this long-running series, as Tom Cruise's Ethan Hunt confronts his most daring and high-stakes mission yet.Now that The Final Reckoning is in theaters, we’re here to break down the ending to this epic blockbuster. Who lives? Who dies? Is this really the end of the road for Ethan and his team, or could the franchise return? Read on to learn more.Mission: Impossible – The Final Reckoning GalleryMission: Impossible - The Final Reckoning’s Ending ExplainedThe Mission: Impossible series has always been about the IMF racing against the clock to prevent various villains from unleashing global catastrophes, but the deck is really stacked against Ethan and his team in the eighth and final movie. While Ethan stopped Esai Morales’ Gabriel in the short term in 2023’s Mission: Impossible - Dead Reckoning Part One, there’s still the little problem of the hyper-advanced AI known as “The Entity” worming its way into every computer system across the globe. The situation is immediately dire in The Final Reckoning, with The Entity systematically taking over the nuclear stockpiles of every nation on Earth and Angela Bassett’s President Sloane forced to choose whether to unleash a preemptive strike on those nations. The Final Reckoning only further cements its dark, foreboding tone when Ving Rhames’ Luther Stickell becomes an early casualty in the conflict with Gabriel, which allows Gabriel to take possession of Luther’s Poison Pill device. Even after Ethan defies the odds and retrieves The Entity’s source code from the sunken Sevastopol submarine, he knows that the code is useless unless he can combine it with the Poison Pill. One way or another, all roads lead to Gabriel.As this conflict unfolds, The Final Reckoning introduces some fun and unexpected callbacks to previous Mission: Impossible films. For example, we learn that The Entity has its roots in the Rabbit’s Foot, the MacGuffin device from 2006’s Mission: Impossible III. Ethan’s team also reunites with former CIA analyst William Donloe, the man who almost walked in on Ethan during his tense wire-hacking mission from the original film. Meanwhile, Shea Whigham’s Jasper Briggs is revealed to be the son of Jon Voight’s Jim Phelps, the IMF leader from the original film. No wonder he seems to bear such a personal grudge toward Ethan. Ethan and Gabriel’s paths do ultimately converge in South Africa, at a digital bunker where The Entity plans to retreat before unleashing a nuclear holocaust. Ethan’s plan is to retrieve the Poison Pill and combine it with the source code module, tricking The Entity into isolating itself on a holographic drive that Hayley Atwell’s Grace can then pickpocket. Predictably, things go haywire with the arrival of CIA Director Kittridgeand his team, and Simon Pegg’s Benji is shot in the ensuing chaos. As Ethan and Gabriel battle it out aboard two dueling planes, the clock steadily ticks down to nuclear armageddon. President Sloane is forced to make her choice, and she chooses to trust Ethan and pull the US’s nuclear arsenal offline rather than allow The Entity to take control. Ethan finally outwits Gabriel, and the latter’s defiant villain speech is cut short when he bashes his head into the tail of his plane. Ethan parachutes to safety and combines the module with the Poison Pill. Grace performs the impossible feat of snatching the drive at just the right moment, trapping The Entity in its tiny prison. Once again, Ethan and the IMF have saved the world from ruin, even if few people will ever know the full truth. Even more impressive, they do so without any further casualties. Benji survives his near-fatal gunshot wound, meaning Luther is the only IMF member to die in The Final Reckoning. Ethan and his team reunite one last time in London’s Trafalgar Square, where Grace hands Ethan the briefcase containing The Entity. After exchanging solemn nods, they all go their separate ways. Thus ends their latest, and apparently last, impossible mission.PlayDoes The Final Reckoning Have a Post-Credits Scene?As mentioned above, the eighth and finalMission: Impossible movie has no mid- or post-credits scenes. You're free to leave once the credits start rolling. Though, as always, it never hurts to stick around and show some appreciation for all the cast and crew who made those death-defying stunts happen. The lack of a post-credits scene isn't necessarily that surprising, given that they've never really been a thing with this particular Hollywood franchise. Still, with this supposedly being the last entry in the series, you might think Cruise and director Christopher McQuarrie would want to give fans one last nod before sending Ethan Hunt off into the sunset. As much as this is billed as the conclusion of the series, The Final Reckoning certainly leaves the door open for more. A post-credits scene could have hinted at what’s next for the victorious Ethan. But that does raise an important question. Is this really the end? Let’s explore what we know.Is This Really the End of the Mission: Impossible Series? Paramount has definitely marketed The Final Reckoning as the conclusion to the Mission: Impossible saga. It’s right there in the name. This film is meant to cap off a 29-year journey and chronicle Ethan Hunt’s final and most desperate mission.But how final is this film, really? It certainly wraps up on a pretty open-ended note. Ethan is still alive, having somehow survived diving to loot a sunken submarine in the frigid Arctic Ocean. Luther may have perished heroically, but the rest of the IMF is alive, too. That’s honestly one of the criticisms that can be leveled at The Final Reckoning. Even in this supposedly final outing, the film seems reluctant to break too many of its toys or veer outside the standard formula. Anyone expecting to see Cruise’s iconic hero finally bite off more than he can chew and meet his end will come away disappointed.Given the way The Final Reckoning ends, there’s nothing stopping Paramount from greenlighting another sequel featuring this revamped cast, with Cruise’s Ethan being joined by Atwell’s Grace, Pegg’s Benji, Pom Klementieff’s Paris, and Greg Tarzan Davis’ Theo Degas. The studio certainly seems to be leaving that door open, whether or not they choose to walk through it.It may all come down to a question of money. The Mission: Impossible franchise has certainly raked in the cash for Paramount over the years, but these movies are also insanely expensive to produce. Stunts this epic and stars this famous don’t come cheap. Case in point: Mission: Impossible - Dead Reckoning Part One grossed an impressive million worldwide, yet the film is still considered to be a box office failure because of its massive budget. PlayThe Final Reckoning’s budget is reported to be as high as million even before marketing, meaning it needs to gross way more than its predecessor to break even. That may be too much to hope for in a summer movie season as crowded as this one. That’s to say nothing of the fact that audiences are proving ever more fickle in the age of endless streaming options.Given the astronomical cost of making Mission: Impossible movies, Paramount may be happy to close the door on the franchise and focus on the more profitable Top Gun series. The ROI simply isn’t there any longer.That said, we could see Paramount pivoting in a slightly different direction with Mission: Impossible. Perhaps Cruise’s character could become more of a supporting player, with a new generation of heroic IMF agents taking center stage. That formula certainly worked for 2022’s Top Gun: Maverick. At one point, rumors even suggested that Maverick star Glen Powell was being eyed to become the new face of the M:I franchise, though Powell himself has denied this. At the very least, we know director Christopher McQuarrie has explored the idea of further sequels beyond The Final Reckoning. But if the studio ever does greenlight them, we suspect the goal will be to pivot to smaller, cheaper spinoffs with less emphasis on Cruise. It’s not as if Cruise is getting any younger, and at some point, Ethan Hunt needs to be allowed to retire for real. How many times can one guy save the world before it’s enough? In IGN's Mission: Impossible - The Final Reckoning review, Clint Gage gave the film a 6 out of 10, writing, "While its action is reliably thrilling and a few of its most exciting sequences are sure to hold up through the years, Mission: Impossible – The Final Reckoning tries to deal with no less than the end of every living thing on the planet – and suffers because of it. The somber tone and melodramatic dialogue miss the mark of what’s made this franchise so much fun for 30 years, but the door is left open for more impossible missions and the hope that this self-serious reckoning isn’t actually final." PlayFor more on the series, check out our ranking of the Mission: Impossible movies from worst to best.Jesse is a mild-mannered staff writer for IGN. Allow him to lend a machete to your intellectual thicket byfollowing @jschedeen on BlueSky. #mission #impossible #final #reckoning #ending
    WWW.IGN.COM
    Mission: Impossible - The Final Reckoning Ending Explained - Is This Really the End of Tom Cruise's M:I Series?
    Let's make this simple: You want to know if there are any post- or mid-credits scenes in Mission: Impossible - The Final Reckoning. The answer is no, there are none.Full spoilers follow.It's been one wild, stunt-filled ride over the past 29 years, but every mission must come to an end eventually. Mission: Impossible - The Final Reckoning is apparently the final entry in this long-running series, as Tom Cruise's Ethan Hunt confronts his most daring and high-stakes mission yet.Now that The Final Reckoning is in theaters, we’re here to break down the ending to this epic blockbuster. Who lives? Who dies? Is this really the end of the road for Ethan and his team, or could the franchise return? Read on to learn more.Mission: Impossible – The Final Reckoning GalleryMission: Impossible - The Final Reckoning’s Ending ExplainedThe Mission: Impossible series has always been about the IMF racing against the clock to prevent various villains from unleashing global catastrophes, but the deck is really stacked against Ethan and his team in the eighth and final movie. While Ethan stopped Esai Morales’ Gabriel in the short term in 2023’s Mission: Impossible - Dead Reckoning Part One, there’s still the little problem of the hyper-advanced AI known as “The Entity” worming its way into every computer system across the globe. The situation is immediately dire in The Final Reckoning, with The Entity systematically taking over the nuclear stockpiles of every nation on Earth and Angela Bassett’s President Sloane forced to choose whether to unleash a preemptive strike on those nations. The Final Reckoning only further cements its dark, foreboding tone when Ving Rhames’ Luther Stickell becomes an early casualty in the conflict with Gabriel, which allows Gabriel to take possession of Luther’s Poison Pill device. Even after Ethan defies the odds and retrieves The Entity’s source code from the sunken Sevastopol submarine, he knows that the code is useless unless he can combine it with the Poison Pill. One way or another, all roads lead to Gabriel.As this conflict unfolds, The Final Reckoning introduces some fun and unexpected callbacks to previous Mission: Impossible films. For example, we learn that The Entity has its roots in the Rabbit’s Foot, the MacGuffin device from 2006’s Mission: Impossible III. Ethan’s team also reunites with former CIA analyst William Donloe (Rolf Saxon), the man who almost walked in on Ethan during his tense wire-hacking mission from the original film. Meanwhile, Shea Whigham’s Jasper Briggs is revealed to be the son of Jon Voight’s Jim Phelps, the IMF leader from the original film. No wonder he seems to bear such a personal grudge toward Ethan. Ethan and Gabriel’s paths do ultimately converge in South Africa, at a digital bunker where The Entity plans to retreat before unleashing a nuclear holocaust. Ethan’s plan is to retrieve the Poison Pill and combine it with the source code module, tricking The Entity into isolating itself on a holographic drive that Hayley Atwell’s Grace can then pickpocket. Predictably, things go haywire with the arrival of CIA Director Kittridge (Henry Czerny) and his team, and Simon Pegg’s Benji is shot in the ensuing chaos. As Ethan and Gabriel battle it out aboard two dueling planes, the clock steadily ticks down to nuclear armageddon. President Sloane is forced to make her choice, and she chooses to trust Ethan and pull the US’s nuclear arsenal offline rather than allow The Entity to take control. Ethan finally outwits Gabriel, and the latter’s defiant villain speech is cut short when he bashes his head into the tail of his plane. Ethan parachutes to safety and combines the module with the Poison Pill. Grace performs the impossible feat of snatching the drive at just the right moment, trapping The Entity in its tiny prison. Once again, Ethan and the IMF have saved the world from ruin, even if few people will ever know the full truth. Even more impressive, they do so without any further casualties. Benji survives his near-fatal gunshot wound, meaning Luther is the only IMF member to die in The Final Reckoning. Ethan and his team reunite one last time in London’s Trafalgar Square, where Grace hands Ethan the briefcase containing The Entity. After exchanging solemn nods, they all go their separate ways. Thus ends their latest, and apparently last, impossible mission.PlayDoes The Final Reckoning Have a Post-Credits Scene?As mentioned above, the eighth and final (for now?) Mission: Impossible movie has no mid- or post-credits scenes. You're free to leave once the credits start rolling. Though, as always, it never hurts to stick around and show some appreciation for all the cast and crew who made those death-defying stunts happen. The lack of a post-credits scene isn't necessarily that surprising, given that they've never really been a thing with this particular Hollywood franchise. Still, with this supposedly being the last entry in the series, you might think Cruise and director Christopher McQuarrie would want to give fans one last nod before sending Ethan Hunt off into the sunset. As much as this is billed as the conclusion of the series, The Final Reckoning certainly leaves the door open for more. A post-credits scene could have hinted at what’s next for the victorious Ethan. But that does raise an important question. Is this really the end? Let’s explore what we know.Is This Really the End of the Mission: Impossible Series? Paramount has definitely marketed The Final Reckoning as the conclusion to the Mission: Impossible saga. It’s right there in the name. This film is meant to cap off a 29-year journey and chronicle Ethan Hunt’s final and most desperate mission.But how final is this film, really? It certainly wraps up on a pretty open-ended note. Ethan is still alive, having somehow survived diving to loot a sunken submarine in the frigid Arctic Ocean. Luther may have perished heroically, but the rest of the IMF is alive, too (even Benji, who was touch-and-go there for a bit). That’s honestly one of the criticisms that can be leveled at The Final Reckoning. Even in this supposedly final outing, the film seems reluctant to break too many of its toys or veer outside the standard formula. Anyone expecting to see Cruise’s iconic hero finally bite off more than he can chew and meet his end will come away disappointed.Given the way The Final Reckoning ends, there’s nothing stopping Paramount from greenlighting another sequel featuring this revamped cast, with Cruise’s Ethan being joined by Atwell’s Grace, Pegg’s Benji, Pom Klementieff’s Paris, and Greg Tarzan Davis’ Theo Degas. The studio certainly seems to be leaving that door open, whether or not they choose to walk through it.It may all come down to a question of money. The Mission: Impossible franchise has certainly raked in the cash for Paramount over the years, but these movies are also insanely expensive to produce. Stunts this epic and stars this famous don’t come cheap. Case in point: Mission: Impossible - Dead Reckoning Part One grossed an impressive $571 million worldwide, yet the film is still considered to be a box office failure because of its massive budget (which was inflated by complications stemming from the COVID-19 pandemic). PlayThe Final Reckoning’s budget is reported to be as high as $400 million even before marketing, meaning it needs to gross way more than its predecessor to break even. That may be too much to hope for in a summer movie season as crowded as this one. That’s to say nothing of the fact that audiences are proving ever more fickle in the age of endless streaming options.Given the astronomical cost of making Mission: Impossible movies, Paramount may be happy to close the door on the franchise and focus on the more profitable Top Gun series. The ROI simply isn’t there any longer.That said, we could see Paramount pivoting in a slightly different direction with Mission: Impossible. Perhaps Cruise’s character could become more of a supporting player, with a new generation of heroic IMF agents taking center stage. That formula certainly worked for 2022’s Top Gun: Maverick. At one point, rumors even suggested that Maverick star Glen Powell was being eyed to become the new face of the M:I franchise, though Powell himself has denied this. At the very least, we know director Christopher McQuarrie has explored the idea of further sequels beyond The Final Reckoning. But if the studio ever does greenlight them, we suspect the goal will be to pivot to smaller, cheaper spinoffs with less emphasis on Cruise. It’s not as if Cruise is getting any younger, and at some point, Ethan Hunt needs to be allowed to retire for real. How many times can one guy save the world before it’s enough? In IGN's Mission: Impossible - The Final Reckoning review, Clint Gage gave the film a 6 out of 10, writing, "While its action is reliably thrilling and a few of its most exciting sequences are sure to hold up through the years, Mission: Impossible – The Final Reckoning tries to deal with no less than the end of every living thing on the planet – and suffers because of it. The somber tone and melodramatic dialogue miss the mark of what’s made this franchise so much fun for 30 years, but the door is left open for more impossible missions and the hope that this self-serious reckoning isn’t actually final." PlayFor more on the series, check out our ranking of the Mission: Impossible movies from worst to best.Jesse is a mild-mannered staff writer for IGN. Allow him to lend a machete to your intellectual thicket byfollowing @jschedeen on BlueSky.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • These AI-Generated TikTok Videos Are Tricking People Into Installing Malware

    In recent years, TikTok has become a prime target for scammers and cyber attackers spreading various forms of malware, and the latest shady campaign promotes instructional videos that trick users into downloading infostealers to their devices via ClickFix attacks. The scheme, identified by Trend Micro and reported by Bleeping Computer, instructs users to execute commands to activate Windows and Microsoft Office or premium features in CapCut and Spotify. One video is captioned "Boost Your Spotify Experience Instantly — Here's How!" and has nearly half a million views. These videos seem to be AI generated and, while the software they discuss is legitimate, the activation steps they outline are not, and will ultimately lead users to infect their devices with Vidar and StealC malware. TikTok's engagement algorithm makes it easy for such malicious videos to spread. In the past, cybercriminals have used TikTok's trending "Invisible Challenge" to spread WASP Stealer malware, which can steal Discord accounts, passwords, credit cards, and crypto wallets. Fake cryptocurrency giveaways posted on TikTok used deepfakes of Elon Muskto scam users into paying "activation" deposits using Bitcoin. How TikTok ClickFix attacks workClickFix is a social engineering tactic that uses fake error messages or CAPTCHA prompts to trick users into executing a command with malicious code. Users will see a pop-up notification about a technical problem with instructions to copy and run a commandto "fix" the issue. The attack most often targets Windows users, but it has been employed on macOS and Linux too. In the current TikTok campaign, the instructional videos prompt users to run a PowerShell command that installs Vidar or StealC information-stealing malware. The former can take desktop screenshots and harvest data ranging from login credentials and cookies to credit cards and crypto wallets. The latter targets web browsers and crypto wallets. Once run, the script will download a second PowerShell script allowing it to launch automatically upon device startup. It also saves in a hidden directory and deletes temporary folders so it can evade detection. How to spot malicious TikTok videosBe wary of following instructional videos you're served on TikTok. Check the source, and only engage with those that are legitimate, like from the developer itself. You should also look for signs of AI-generated content, which may be used to spread malware widely and rapidly. There's no malicious code actually embedded in or delivered by these instructional videos—the scheme is dependent on social engineering via verbal directions—making the threat technically harder to detect.
    #these #aigenerated #tiktok #videos #are
    These AI-Generated TikTok Videos Are Tricking People Into Installing Malware
    In recent years, TikTok has become a prime target for scammers and cyber attackers spreading various forms of malware, and the latest shady campaign promotes instructional videos that trick users into downloading infostealers to their devices via ClickFix attacks. The scheme, identified by Trend Micro and reported by Bleeping Computer, instructs users to execute commands to activate Windows and Microsoft Office or premium features in CapCut and Spotify. One video is captioned "Boost Your Spotify Experience Instantly — Here's How!" and has nearly half a million views. These videos seem to be AI generated and, while the software they discuss is legitimate, the activation steps they outline are not, and will ultimately lead users to infect their devices with Vidar and StealC malware. TikTok's engagement algorithm makes it easy for such malicious videos to spread. In the past, cybercriminals have used TikTok's trending "Invisible Challenge" to spread WASP Stealer malware, which can steal Discord accounts, passwords, credit cards, and crypto wallets. Fake cryptocurrency giveaways posted on TikTok used deepfakes of Elon Muskto scam users into paying "activation" deposits using Bitcoin. How TikTok ClickFix attacks workClickFix is a social engineering tactic that uses fake error messages or CAPTCHA prompts to trick users into executing a command with malicious code. Users will see a pop-up notification about a technical problem with instructions to copy and run a commandto "fix" the issue. The attack most often targets Windows users, but it has been employed on macOS and Linux too. In the current TikTok campaign, the instructional videos prompt users to run a PowerShell command that installs Vidar or StealC information-stealing malware. The former can take desktop screenshots and harvest data ranging from login credentials and cookies to credit cards and crypto wallets. The latter targets web browsers and crypto wallets. Once run, the script will download a second PowerShell script allowing it to launch automatically upon device startup. It also saves in a hidden directory and deletes temporary folders so it can evade detection. How to spot malicious TikTok videosBe wary of following instructional videos you're served on TikTok. Check the source, and only engage with those that are legitimate, like from the developer itself. You should also look for signs of AI-generated content, which may be used to spread malware widely and rapidly. There's no malicious code actually embedded in or delivered by these instructional videos—the scheme is dependent on social engineering via verbal directions—making the threat technically harder to detect. #these #aigenerated #tiktok #videos #are
    LIFEHACKER.COM
    These AI-Generated TikTok Videos Are Tricking People Into Installing Malware
    In recent years, TikTok has become a prime target for scammers and cyber attackers spreading various forms of malware, and the latest shady campaign promotes instructional videos that trick users into downloading infostealers to their devices via ClickFix attacks. The scheme, identified by Trend Micro and reported by Bleeping Computer, instructs users to execute commands to activate Windows and Microsoft Office or premium features in CapCut and Spotify. One video is captioned "Boost Your Spotify Experience Instantly — Here's How!" and has nearly half a million views. These videos seem to be AI generated and, while the software they discuss is legitimate, the activation steps they outline are not, and will ultimately lead users to infect their devices with Vidar and StealC malware. TikTok's engagement algorithm makes it easy for such malicious videos to spread. In the past, cybercriminals have used TikTok's trending "Invisible Challenge" to spread WASP Stealer malware, which can steal Discord accounts, passwords, credit cards, and crypto wallets. Fake cryptocurrency giveaways posted on TikTok used deepfakes of Elon Musk (and themes around SpaceX and Tesla) to scam users into paying "activation" deposits using Bitcoin. How TikTok ClickFix attacks workClickFix is a social engineering tactic that uses fake error messages or CAPTCHA prompts to trick users into executing a command with malicious code. Users will see a pop-up notification about a technical problem with instructions to copy and run a command (commonly a PowerShell script) to "fix" the issue. The attack most often targets Windows users, but it has been employed on macOS and Linux too. In the current TikTok campaign, the instructional videos prompt users to run a PowerShell command that installs Vidar or StealC information-stealing malware. The former can take desktop screenshots and harvest data ranging from login credentials and cookies to credit cards and crypto wallets. The latter targets web browsers and crypto wallets. Once run, the script will download a second PowerShell script allowing it to launch automatically upon device startup. It also saves in a hidden directory and deletes temporary folders so it can evade detection. How to spot malicious TikTok videosBe wary of following instructional videos you're served on TikTok (as well as unsolicited technical content in general). Check the source, and only engage with those that are legitimate, like from the developer itself. You should also look for signs of AI-generated content, which may be used to spread malware widely and rapidly. There's no malicious code actually embedded in or delivered by these instructional videos—the scheme is dependent on social engineering via verbal directions—making the threat technically harder to detect.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Meta faces increasing scrutiny over widespread scam ads

    Published
    May 22, 2025 10:00am EDT close 'CyberGuy' praises Trump admin for Take It Down Act Kurt Knutsson joins "Fox & Friends" to discuss President Donald Trump's Take It Down Act and Meta avoiding removing scam ads from its platforms.  Meta, the parent company of Facebook and Instagram, is under fire after a major report revealed that thousands of fraudulent ads have been allowed to run on its platforms. According to the Wall Street Journal, Meta accounted for nearly half of all scam complaints tied to Zelle transactions at JPMorgan Chase between mid-2023 and mid-2024. Other banks have also reported a high number of fraud cases linked to Meta's platforms.JOIN THE FREE "CYBERGUY REPORT": GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE "ULTIMATE SCAM SURVIVAL GUIDE" WHEN YOU SIGN UP! Meta logoWhy are scam ads so widespread?The problem of scam ads on Facebook has grown rapidly in recent years. Experts point to the rise of cryptocurrency schemes, AI-generated content and organized criminal groups operating from Southeast Asia. These scams range from fake investment opportunities to misleading product offers and even the sale of nonexistent puppies.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEOne example involves Edgar Guzman, a legitimate business owner in Atlanta, whose warehouse address was used by scammers in more than 4,400 Facebook and Instagram ads. These ads promised deep discounts on bulk merchandise, tricking people into sending money for products that never existed."What sucks is we have to break it to people that they've been scammed. We don't even do online sales," Guzman told reporters. Facebook login page on a laptopMeta's response: Is it enough?Meta says it's fighting back with new technology and partnerships, including facial-recognition tools and collaborations with banks and other tech companies. A spokesperson described the situation as an "epidemic of scams" and insisted that Meta is taking aggressive action, removing more than 2 million accounts linked to scam centers in several countries this year alone.However, insiders tell a different story. Current and former Meta employees say the company has been reluctant to make it harder for advertisers to buy ads, fearing it could hurt the company's bottom line. Staff reportedly tolerated between eight and 32 fraud "strikes" before banning accounts and scam enforcement was deprioritized to avoid losing ad revenue. META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM Instagram on a smartphoneThe human cost of inactionVictims of these scams often lose hundreds or even thousands of dollars. In one case, fake ads promised free spice racks from McCormick & Co. for just a small shipping fee, only to steal credit card details and rack up fraudulent charges. Another common scam involves fake puppy sales, with victims sending deposits for pets that never arrive. Some scam operations are even linked to human trafficking, with criminal groups forcing kidnapped victims to run online fraud schemes under threat of violence.Legal and ethical questions for MetaMeta maintains that it is not legally responsible for fraudulent content on its platforms, citing Section 230 of federal law, which protects tech companies from liability for user-generated content. In court filings, Meta has argued that it "does not owe a duty to users" when it comes to policing fraud. Meanwhile, a class-action lawsuit over allegedly inflated ad reach metrics is moving forward, putting even more pressure on Meta to address transparency and accountability.How to protect yourself from scam adsStaying safe online takes a little extra effort, but it's well worth it. Here are some steps you can follow to avoid falling victim to scam ads.1. Check the source and use strong antivirus software: Look for verified pages and official websites. Scammers often copy the names and logos of trusted brands, but the web address or page details may be off. Always double-check the URL for slight misspellings or extra characters and avoid clicking links in ads if you're unsure about their legitimacy.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Be skeptical of deals that seem too good to be true: If an ad offers products at an unbelievable price or promises huge returns, pause and investigate before clicking. Scammers often use flashy discounts or urgent language to lure people in quickly. Take a moment to think before you act, and remember that if something sounds impossible, it probably is. 3. Research the seller: Search for reviews and complaints about the company or individual. If you can't find any credible information, it's best to avoid the offer. A quick online search can reveal if others have reported scams or had bad experiences, and legitimate businesses usually have a track record you can verify.4. Consider using a personal data removal service: There are companies that can help remove your personal info from data brokers and people-search sites. This means less of your data floating around for scammers to find and use. While these services usually charge a fee, they can save you a lot of time and hassle compared to doing it all yourself. Over time, you might notice fewer spam calls, emails and even a lower risk of identity theft. Check out my top picks for data removal services here.5. Never share sensitive information: Don't enter your credit card or bank details on unfamiliar sites. If you're asked for personal information, double-check the legitimacy of the request. Scammers may ask for sensitive data under the guise of "verifying your identity" or processing a payment, but reputable companies will never ask for this through insecure channels.6. Keep your devices updated: Keeping your software updated adds an extra layer of protection against the latest threats. Updates often include important security patches that fix vulnerabilities hackers might try to exploit. By regularly updating your devices, you help close those security gaps and keep your personal information safer from scammers and malware. 7. Report suspicious ads: If you see a scam ad on Facebook or Instagram, report it using the platform's tools. This helps alert others and puts pressure on Meta to take action. Reporting is quick and anonymous, and it plays a crucial role in helping platforms identify patterns and remove harmful content.8. Monitor your accounts: Regularly check your bank and credit card statements for unauthorized transactions, especially after making online purchases. Early detection can help you limit the damage if your information is compromised, and most banks have fraud protection services that can assist you if you spot something suspicious.By following these steps, you can better protect yourself and your finances from online scams. Staying alert and informed is your best defense in today's digital world.Kurt's key takeawaysThe mess with scam ads on Meta's platforms shows why it's important to look out for yourself online. Meta says it's working on the problem, but many people think it's not moving fast enough. By staying careful, questioning suspicious offers and using good security tools, you can keep yourself safer. Until the platforms step up their game, protecting yourself is the smartest move you can make.CLICK HERE TO GET THE FOX NEWS APPShould Meta be doing more to protect its users from scam ads, even if it means making changes that could affect its advertising revenue? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #meta #faces #increasing #scrutiny #over
    Meta faces increasing scrutiny over widespread scam ads
    Published May 22, 2025 10:00am EDT close 'CyberGuy' praises Trump admin for Take It Down Act Kurt Knutsson joins "Fox & Friends" to discuss President Donald Trump's Take It Down Act and Meta avoiding removing scam ads from its platforms.  Meta, the parent company of Facebook and Instagram, is under fire after a major report revealed that thousands of fraudulent ads have been allowed to run on its platforms. According to the Wall Street Journal, Meta accounted for nearly half of all scam complaints tied to Zelle transactions at JPMorgan Chase between mid-2023 and mid-2024. Other banks have also reported a high number of fraud cases linked to Meta's platforms.JOIN THE FREE "CYBERGUY REPORT": GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE "ULTIMATE SCAM SURVIVAL GUIDE" WHEN YOU SIGN UP! Meta logoWhy are scam ads so widespread?The problem of scam ads on Facebook has grown rapidly in recent years. Experts point to the rise of cryptocurrency schemes, AI-generated content and organized criminal groups operating from Southeast Asia. These scams range from fake investment opportunities to misleading product offers and even the sale of nonexistent puppies.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEOne example involves Edgar Guzman, a legitimate business owner in Atlanta, whose warehouse address was used by scammers in more than 4,400 Facebook and Instagram ads. These ads promised deep discounts on bulk merchandise, tricking people into sending money for products that never existed."What sucks is we have to break it to people that they've been scammed. We don't even do online sales," Guzman told reporters. Facebook login page on a laptopMeta's response: Is it enough?Meta says it's fighting back with new technology and partnerships, including facial-recognition tools and collaborations with banks and other tech companies. A spokesperson described the situation as an "epidemic of scams" and insisted that Meta is taking aggressive action, removing more than 2 million accounts linked to scam centers in several countries this year alone.However, insiders tell a different story. Current and former Meta employees say the company has been reluctant to make it harder for advertisers to buy ads, fearing it could hurt the company's bottom line. Staff reportedly tolerated between eight and 32 fraud "strikes" before banning accounts and scam enforcement was deprioritized to avoid losing ad revenue. META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM Instagram on a smartphoneThe human cost of inactionVictims of these scams often lose hundreds or even thousands of dollars. In one case, fake ads promised free spice racks from McCormick & Co. for just a small shipping fee, only to steal credit card details and rack up fraudulent charges. Another common scam involves fake puppy sales, with victims sending deposits for pets that never arrive. Some scam operations are even linked to human trafficking, with criminal groups forcing kidnapped victims to run online fraud schemes under threat of violence.Legal and ethical questions for MetaMeta maintains that it is not legally responsible for fraudulent content on its platforms, citing Section 230 of federal law, which protects tech companies from liability for user-generated content. In court filings, Meta has argued that it "does not owe a duty to users" when it comes to policing fraud. Meanwhile, a class-action lawsuit over allegedly inflated ad reach metrics is moving forward, putting even more pressure on Meta to address transparency and accountability.How to protect yourself from scam adsStaying safe online takes a little extra effort, but it's well worth it. Here are some steps you can follow to avoid falling victim to scam ads.1. Check the source and use strong antivirus software: Look for verified pages and official websites. Scammers often copy the names and logos of trusted brands, but the web address or page details may be off. Always double-check the URL for slight misspellings or extra characters and avoid clicking links in ads if you're unsure about their legitimacy.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Be skeptical of deals that seem too good to be true: If an ad offers products at an unbelievable price or promises huge returns, pause and investigate before clicking. Scammers often use flashy discounts or urgent language to lure people in quickly. Take a moment to think before you act, and remember that if something sounds impossible, it probably is. 3. Research the seller: Search for reviews and complaints about the company or individual. If you can't find any credible information, it's best to avoid the offer. A quick online search can reveal if others have reported scams or had bad experiences, and legitimate businesses usually have a track record you can verify.4. Consider using a personal data removal service: There are companies that can help remove your personal info from data brokers and people-search sites. This means less of your data floating around for scammers to find and use. While these services usually charge a fee, they can save you a lot of time and hassle compared to doing it all yourself. Over time, you might notice fewer spam calls, emails and even a lower risk of identity theft. Check out my top picks for data removal services here.5. Never share sensitive information: Don't enter your credit card or bank details on unfamiliar sites. If you're asked for personal information, double-check the legitimacy of the request. Scammers may ask for sensitive data under the guise of "verifying your identity" or processing a payment, but reputable companies will never ask for this through insecure channels.6. Keep your devices updated: Keeping your software updated adds an extra layer of protection against the latest threats. Updates often include important security patches that fix vulnerabilities hackers might try to exploit. By regularly updating your devices, you help close those security gaps and keep your personal information safer from scammers and malware. 7. Report suspicious ads: If you see a scam ad on Facebook or Instagram, report it using the platform's tools. This helps alert others and puts pressure on Meta to take action. Reporting is quick and anonymous, and it plays a crucial role in helping platforms identify patterns and remove harmful content.8. Monitor your accounts: Regularly check your bank and credit card statements for unauthorized transactions, especially after making online purchases. Early detection can help you limit the damage if your information is compromised, and most banks have fraud protection services that can assist you if you spot something suspicious.By following these steps, you can better protect yourself and your finances from online scams. Staying alert and informed is your best defense in today's digital world.Kurt's key takeawaysThe mess with scam ads on Meta's platforms shows why it's important to look out for yourself online. Meta says it's working on the problem, but many people think it's not moving fast enough. By staying careful, questioning suspicious offers and using good security tools, you can keep yourself safer. Until the platforms step up their game, protecting yourself is the smartest move you can make.CLICK HERE TO GET THE FOX NEWS APPShould Meta be doing more to protect its users from scam ads, even if it means making changes that could affect its advertising revenue? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #meta #faces #increasing #scrutiny #over
    WWW.FOXNEWS.COM
    Meta faces increasing scrutiny over widespread scam ads
    Published May 22, 2025 10:00am EDT close 'CyberGuy' praises Trump admin for Take It Down Act Kurt Knutsson joins "Fox & Friends" to discuss President Donald Trump's Take It Down Act and Meta avoiding removing scam ads from its platforms.  Meta, the parent company of Facebook and Instagram, is under fire after a major report revealed that thousands of fraudulent ads have been allowed to run on its platforms. According to the Wall Street Journal, Meta accounted for nearly half of all scam complaints tied to Zelle transactions at JPMorgan Chase between mid-2023 and mid-2024. Other banks have also reported a high number of fraud cases linked to Meta's platforms.JOIN THE FREE "CYBERGUY REPORT": GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE "ULTIMATE SCAM SURVIVAL GUIDE" WHEN YOU SIGN UP! Meta logo (Kurt "CyberGuy" Knutsson)Why are scam ads so widespread?The problem of scam ads on Facebook has grown rapidly in recent years. Experts point to the rise of cryptocurrency schemes, AI-generated content and organized criminal groups operating from Southeast Asia. These scams range from fake investment opportunities to misleading product offers and even the sale of nonexistent puppies.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEOne example involves Edgar Guzman, a legitimate business owner in Atlanta, whose warehouse address was used by scammers in more than 4,400 Facebook and Instagram ads. These ads promised deep discounts on bulk merchandise, tricking people into sending money for products that never existed."What sucks is we have to break it to people that they've been scammed. We don't even do online sales," Guzman told reporters. Facebook login page on a laptop (Kurt "CyberGuy" Knutsson)Meta's response: Is it enough?Meta says it's fighting back with new technology and partnerships, including facial-recognition tools and collaborations with banks and other tech companies. A spokesperson described the situation as an "epidemic of scams" and insisted that Meta is taking aggressive action, removing more than 2 million accounts linked to scam centers in several countries this year alone.However, insiders tell a different story. Current and former Meta employees say the company has been reluctant to make it harder for advertisers to buy ads, fearing it could hurt the company's bottom line. Staff reportedly tolerated between eight and 32 fraud "strikes" before banning accounts and scam enforcement was deprioritized to avoid losing ad revenue. META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM Instagram on a smartphone (Kurt "CyberGuy" Knutsson)The human cost of inactionVictims of these scams often lose hundreds or even thousands of dollars. In one case, fake ads promised free spice racks from McCormick & Co. for just a small shipping fee, only to steal credit card details and rack up fraudulent charges. Another common scam involves fake puppy sales, with victims sending deposits for pets that never arrive. Some scam operations are even linked to human trafficking, with criminal groups forcing kidnapped victims to run online fraud schemes under threat of violence.Legal and ethical questions for MetaMeta maintains that it is not legally responsible for fraudulent content on its platforms, citing Section 230 of federal law, which protects tech companies from liability for user-generated content. In court filings, Meta has argued that it "does not owe a duty to users" when it comes to policing fraud. Meanwhile, a class-action lawsuit over allegedly inflated ad reach metrics is moving forward, putting even more pressure on Meta to address transparency and accountability.How to protect yourself from scam adsStaying safe online takes a little extra effort, but it's well worth it. Here are some steps you can follow to avoid falling victim to scam ads.1. Check the source and use strong antivirus software: Look for verified pages and official websites. Scammers often copy the names and logos of trusted brands, but the web address or page details may be off. Always double-check the URL for slight misspellings or extra characters and avoid clicking links in ads if you're unsure about their legitimacy.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Be skeptical of deals that seem too good to be true: If an ad offers products at an unbelievable price or promises huge returns, pause and investigate before clicking. Scammers often use flashy discounts or urgent language to lure people in quickly. Take a moment to think before you act, and remember that if something sounds impossible, it probably is. 3. Research the seller: Search for reviews and complaints about the company or individual. If you can't find any credible information, it's best to avoid the offer. A quick online search can reveal if others have reported scams or had bad experiences, and legitimate businesses usually have a track record you can verify.4. Consider using a personal data removal service: There are companies that can help remove your personal info from data brokers and people-search sites. This means less of your data floating around for scammers to find and use. While these services usually charge a fee, they can save you a lot of time and hassle compared to doing it all yourself. Over time, you might notice fewer spam calls, emails and even a lower risk of identity theft. Check out my top picks for data removal services here.5. Never share sensitive information: Don't enter your credit card or bank details on unfamiliar sites. If you're asked for personal information, double-check the legitimacy of the request. Scammers may ask for sensitive data under the guise of "verifying your identity" or processing a payment, but reputable companies will never ask for this through insecure channels.6. Keep your devices updated: Keeping your software updated adds an extra layer of protection against the latest threats. Updates often include important security patches that fix vulnerabilities hackers might try to exploit. By regularly updating your devices, you help close those security gaps and keep your personal information safer from scammers and malware. 7. Report suspicious ads: If you see a scam ad on Facebook or Instagram, report it using the platform's tools. This helps alert others and puts pressure on Meta to take action. Reporting is quick and anonymous, and it plays a crucial role in helping platforms identify patterns and remove harmful content.8. Monitor your accounts: Regularly check your bank and credit card statements for unauthorized transactions, especially after making online purchases. Early detection can help you limit the damage if your information is compromised, and most banks have fraud protection services that can assist you if you spot something suspicious.By following these steps, you can better protect yourself and your finances from online scams. Staying alert and informed is your best defense in today's digital world.Kurt's key takeawaysThe mess with scam ads on Meta's platforms shows why it's important to look out for yourself online. Meta says it's working on the problem, but many people think it's not moving fast enough. By staying careful, questioning suspicious offers and using good security tools, you can keep yourself safer. Until the platforms step up their game, protecting yourself is the smartest move you can make.CLICK HERE TO GET THE FOX NEWS APPShould Meta be doing more to protect its users from scam ads, even if it means making changes that could affect its advertising revenue? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
Arama Sonuçları
CGShares https://cgshares.com