#anti-spam

[ follow ]
#cookies
Privacy technologies
fromBGR
2 hours ago

Should You Accept Or Reject Cookies From A Website? - BGR

Reject non-essential cookies to avoid data tracking and targeted ads while accepting essential cookies for website functionality.
Privacy technologies
fromBGR
2 hours ago

Should You Accept Or Reject Cookies From A Website? - BGR

Reject non-essential cookies to avoid data tracking and targeted ads while accepting essential cookies for website functionality.
Information security
fromSecurityWeek
1 day ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Privacy professionals
fromFast Company
1 day ago

How to hide your sensitive info (for real) when using ChatGPT and other AI chatbots

Chatbots can be useful for summarizing complex information, but sensitive data must be properly redacted to ensure privacy.
#generative-ai
Marketing tech
fromSFGATE
3 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
3 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
3 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
3 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
fromThe Washington Post
1 day ago

Inside a growing movement warning AI could turn on humanity

"That requires a bunch of people to go take things that folks here are figuring out and [explain them] to the rest of the world," said Jeffrey Ladish, emphasizing the need for effective communication about AI risks.
US news
#ai-chatbots
Medicine
fromwww.bbc.com
20 hours ago

Should you really trust health advice from an AI chatbot?

AI chatbots can provide tailored health advice but may also give dangerously incorrect information, impacting users' health decisions.
Privacy professionals
fromGeeky Gadgets
2 days ago

Why ChatGPT is Suddenly Collecting 70% More of Your Personal Data

Data collection by AI chatbots has surged, raising significant privacy concerns as 70% now gather user location data, up from 40% last year.
Medicine
fromwww.bbc.com
20 hours ago

Should you really trust health advice from an AI chatbot?

AI chatbots can provide tailored health advice but may also give dangerously incorrect information, impacting users' health decisions.
Privacy professionals
fromGeeky Gadgets
2 days ago

Why ChatGPT is Suddenly Collecting 70% More of Your Personal Data

Data collection by AI chatbots has surged, raising significant privacy concerns as 70% now gather user location data, up from 40% last year.
Deliverability
fromenglish.elpais.com
4 days ago

Only 13% of emails are written by people, and more than half end up in the spam folder: This isn't a technical detail; it's a structural change'

Email is increasingly dominated by automated systems, with 87% of traffic generated by them, leading to declining effectiveness and user engagement.
#reproductive-rights
UK politics
fromwww.independent.co.uk
22 hours ago

Government to host summit about keeping children safe online in age of AI

The Independent focuses on critical issues like reproductive rights and online safety, emphasizing the need for accessible journalism.
fromwww.independent.co.uk
2 days ago
EU data protection

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
UK politics
fromwww.independent.co.uk
22 hours ago

Government to host summit about keeping children safe online in age of AI

The Independent focuses on critical issues like reproductive rights and online safety, emphasizing the need for accessible journalism.
EU data protection
fromwww.independent.co.uk
2 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
EU data protection
fromSecurityWeek
2 days ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Wearables
fromEngadget
2 days ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
#ransomware
Healthcare
fromSecuritymagazine
3 days ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
Healthcare
fromSecuritymagazine
3 days ago

What "The Pitt" Gets Right About Ransomware and What Hospitals Can't Afford to Ignore

Ransomware incidents in healthcare lead to significant operational fallout, requiring extensive recovery efforts beyond just paying the ransom.
fromNature
5 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Education
fromWIRED
4 days ago

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

AI-generated deepfake nude images are impacting nearly 90 schools and over 600 students globally, causing severe emotional distress among victims.
Social media marketing
fromWIRED
4 days ago

X's Big Bot Purge Wiped Out a Lot of People's Secret Porn Feeds

X's crackdown on bots has led to the suspension of many human accounts, including those used for private content curation.
Digital life
fromwww.dw.com
5 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
#privacy
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
#malware
Information security
fromTechRepublic
2 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromTechRepublic
2 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromThe Hacker News
3 days ago

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

A new malware campaign targeting Ukrainian healthcare institutions has been identified, utilizing deceptive emails to deliver malicious payloads.
Deliverability
fromZDNET
4 days ago

This simple email trick saves me from annoying marketing spam (and it's free to do)

Using a dedicated shopping email can effectively reduce spam and clutter in your primary inbox.
Artificial intelligence
fromTechRepublic
2 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Social media marketing
fromAxios
5 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Information security
fromBusiness Matters
2 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Marketing tech
fromSan Diego Union-Tribune
2 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies to enhance their defenses against these threats.
EU data protection
fromComputerWeekly.com
3 days ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Deliverability
fromLitmus
4 days ago

How MBPs Think About Email: Google, Yahoo, & Microsoft

Mailbox providers prioritize email relevance and engagement, requiring authentication and leveraging AI to enhance user experience.
#cybersecurity
Information security
fromTechCrunch
2 days ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Privacy professionals
fromThe Hacker News
3 days ago

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

A bank's Taboola pixel redirected users to a Temu tracking endpoint without consent or security controls detecting the violation.
Information security
fromThe Hacker News
5 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
Information security
fromTechCrunch
2 days ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Privacy professionals
fromThe Hacker News
3 days ago

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

A bank's Taboola pixel redirected users to a Temu tracking endpoint without consent or security controls detecting the violation.
Information security
fromThe Hacker News
5 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
#age-verification
fromAbove the Law
2 days ago
Privacy technologies

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromAbove the Law
2 days ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Marketing tech
fromThe Cyber Express
2 days ago

Gemini Ad Safety Targets Surge In AI-Generated Scam Ads

Google's Gemini ad safety systems blocked over 8.3 billion harmful ads in 2025, focusing on early detection and combating AI-generated scams.
Privacy professionals
fromExtremeTech
3 days ago

Google, Microsoft, and Meta Ignore Your Ad Tracking Opt-Outs, Audit Reveals

Google, Microsoft, and Meta track users' browsing habits despite opt-out requests, violating privacy regulations.
Information security
fromHarvard Gazette
2 days ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromThe Verge
1 day ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
#identity-verification
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Marketing tech
fromThe Cool Down
5 days ago

AI chatbots are subtly trying to make you buy more stuff - here's how to protect yourself

AI can influence consumer purchasing decisions without their awareness, often through subtle persuasion methods.
Deliverability
fromZDNET
1 week ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
#north-korea
Information security
fromComputerWeekly.com
2 days ago

North Korean social engineering campaign targets macOS users | Computer Weekly

A North Korean campaign targeting macOS users tricked victims into executing malicious files, leading to credential and data theft.
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
fromArs Technica
5 days ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
#cybercrime
fromTechCrunch
3 days ago
Information security

European police email 75,000 people asking them to stop DDoS attacks | TechCrunch

Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Information security
fromTechCrunch
3 days ago

European police email 75,000 people asking them to stop DDoS attacks | TechCrunch

A global law enforcement operation targeted over 75,000 alleged cybercriminals using DDoS-for-hire services, resulting in arrests and domain takedowns.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
#whatsapp
Privacy technologies
fromTechRepublic
4 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy professionals
fromTechCrunch
2 weeks ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
2 weeks ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
Privacy technologies
fromTechRepublic
4 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy professionals
fromTechCrunch
2 weeks ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
2 weeks ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
Privacy professionals
from404 Media
5 days ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
#google
Privacy technologies
fromTNW | Google
4 days ago

Google will penalise sites that hijack your browser's back button

Google will classify 'back button hijacking' as spam starting June 15, 2026, penalizing sites that misuse the browser History API.
Privacy technologies
fromPCWorld
4 days ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
Privacy technologies
fromTNW | Google
4 days ago

Google will penalise sites that hijack your browser's back button

Google will classify 'back button hijacking' as spam starting June 15, 2026, penalizing sites that misuse the browser History API.
Privacy technologies
fromPCWorld
4 days ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
Information security
fromComputerWeekly.com
3 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Information security
fromSecurityWeek
4 days ago

100 Chrome Extensions Steal User Data, Create Backdoor

Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
Information security
fromArs Technica
5 days ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
Information security
fromTechCrunch
6 days ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
#email-fraud
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Marketing tech
fromComputerworld
1 month ago

Targeted advertising is also targeting malware

Malvertising has become the primary malware delivery vector globally, surpassing email and direct hacks, with AI enabling rapid distribution of adaptive malware across publishers.
Information security
fromZDNET
1 month ago

I tested NordVPN's free scam checker against a real threat in my inbox - here's how it did

NordVPN launched a free AI-powered scam checker tool that detects suspicious links, files, text, and images by identifying malicious databases and common scam patterns like scare tactics and artificial urgency.
Information security
fromTechzine Global
1 month ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromZDNET
1 month ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
fromComputerworld
2 months ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
Information security
fromSecuritymagazine
2 months ago

The Email Insider Threat Has Evolved in the Era of Generative AI

Insider threats—both malicious code operating inside endpoints and AI-enabled social engineering via email—pose the most critical, evolving risk to enterprise email security by 2026.
[ Load more ]