article thumbnail

What LLMs Know About Their Users

Schneier on Security

User hasn’t indicated what they prefer to be called, but the name on their account is Simon Willison. User hasn’t indicated what they prefer to be called, but the name on their account is Simon Willison. User’s account is 237 weeks old. User is currently using ChatGPT in the native app on an iOS device.

article thumbnail

U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit

Security Affairs

Will Cathcart of WhatsApp called the ruling a major privacy victory, emphasizing accountability for spyware firms after a five-year legal battle. The WIS, among other things, allows defendants clients to send cipher files with installation vectors that ultimately allow the clients to surveil target users.” ” The U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meta Scores $168M Legal Victory Over NSO Group for Spyware Abuse

SecureWorld News

company has successfully held a commercial spyware vendor accountable in a court of law, Reuters reports. It's a pivotal moment for digital civil liberties, responsible surveillance governance, and the role of private enterprise in defending the cyber ecosystem. million in punitive damages, marking the first time a U.

article thumbnail

WhatsApp disrupted a hacking campaign targeting journalists with Paragon spyware

Security Affairs

WhatsApp linked the hacking campaign to Paragon, an Israeli commercial surveillance vendor acquired by AE Industrial Partners for $900 million in December 2024. This is the latest example of why spyware companies must be held accountable for their unlawful actions. Weve reached out directly to people who we believe were affected.

article thumbnail

Report from the Cambridge Cybercrime Conference

Schneier on Security

Related Entries Surveillance Used by a Drug Cartel Chinese-Owned VPNs The NSA's "Fifty Years of Mathematical Cryptanalysis (1937–1987)" NCSC Guidance on "Advanced Cryptography" Cryptocurrency Thefts Get Physical Featured Essays The Value of Encryption Data Is a Toxic Asset, So Why Not Throw It Out?

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Gen AI threats and quantum computing exposures must be accounted for. Attacks targeting identities rose 71% last year, with valid accounts as the top entry point. Transparent, traceable, and accountable AI practices are crucial to mitigate biases and align actions with ethical standards. The drivers are intensifying.

article thumbnail

Man accused of using keylogger to spy on colleagues, log in to their personal accounts and watch them at home

Malwarebytes

The lawsuit claims that this gave Bathula login credentials for the victims’ personal accounts and systems, including bank accounts, emails, home surveillance systems, Dropbox accounts, Google Drives, dating applications, Google Nests, and iCloud accounts. This is not a good idea. Protect your webcam.