"Such is the fallout from a surge in the manipulation of navigation signals - modern GPS warfare - that has played havoc with civilian smartphones, planes and vessels on three continents.
So-called GPS jamming and spoofing have largely been the preserve of militaries over the past two decades, used to defend sensitive sites against drone or missile attacks or mask their own activities.
But systematic interference by armed forces - particularly following Russia's full-scale invasion of Ukraine and Israel's offensive against Hamas in Gaza - has caused widespread issues for civilian populations as well. The footprint of corrupted signals has become vast."
"When individuals migrate, their data migrates with them. When people leave their countries to travel and live in different places whether as migrants, refugees, or asylum seekers, they are not only seeking physical safety, they also need to be sure that their digital identity and information will be safe.
However, if they are not careful or protected, their data could unwittingly leave a trail of their movements, potentially exposing them to various threats. Whether they are fleeing war, authoritarian regimes, or other adversaries, this data could inadvertently connect their identities to their pursuers."
"A police investigation has been launched after MPs were apparently targeted in a "spear-phishing" attack, in what security experts believe could be an attempt to compromise parliament.
A police force said it had started an inquiry after receiving a complaint from an MP who was sent a number of unsolicited messages last month."
"A big leak of data from a Chinese cybersecurity firm has revealed state security agents paying tens of thousands of pounds to harvest data on targets, including foreign governments, while hackers hoover up huge amounts of information on any person or institution who might be of interest to their prospective clients.
The cache of more than 500 leaked files from the Chinese firm I-Soon was posted on the developer website Github and is thought by cybersecurity experts to be genuine. Some of the targets discussed include Nato and the UK Foreign Office."
"The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return.
As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."
"The problem extends beyond the Pegasus project. Installed in Mexico City is one of the largest urban surveillance systems in the Americas: El Centro de Comando, Control, Cómputo, Comunicaciones y Contacto Ciudadano, better known as El C5. The network, connected to panic buttons and command centers, is spread over 1,485 kilometers with software designed to automatically detect license plates. On top of that, the number of installed cameras grew from 18 million to 65 million between 2018 and 2022, with stated plans to add at least an additional 16 million more. Despite its apparent pre-eminence, issues have arisen with the C5, from false identifications to mishandling of personal data. Technological malfunctions have also been shown to impact the outcomes of criminal cases because of the assumption of objectivity that video surveillance supposedly construes.
The sprawling C5 system is dwarfed only by the Titan, an expansive intelligence and security database, both in terms of scale and threat to civil liberties. The software is used by several Mexican state governments to combine location data with other private information, including financial, government, and telecom data, to geolocate individuals across the country in real time. Governmental officials have been criticized for the controversial use of the database to target public figures, but, more problematically, access to Titan-enabled intel can be gained through an underground market, making it a further liability.
The extent to which artificial intelligence has been incorporated into the C5 and Titan is still not clear, but the specter of surveillance remains large and is set to cause more worries with the addition of new smart technologies."
"Major technology companies signed a pact Friday to voluntarily adopt "reasonable precautions" to prevent artificial intelligence tools from being used to disrupt democratic elections around the world.
Executives from Adobe, Amazon, Google, IBM, Meta, Microsoft, OpenAI and TikTok gathered at the Munich Security Conference to announce a new framework for how they respond to AI-generated deepfakes that deliberately trick voters. Twelve other companies - including Elon Musk's X - are also signing on to the accord."
"The European Parliament secured a ban on use of real-time surveillance and biometric technologies including emotional recognition but with three exceptions, according to Breton.
It would mean police would be able to use the invasive technologies only in the event of an unexpected threat of a terrorist attack, the need to search for victims and in the prosecution of serious crime."
"While the name behind the attack might be relatively new, the criminal technique is not. Ransomware gangs render an organisation's computers inaccessible by infecting them with malicious software - malware - and then demanding a payment, typically in cryptocurrency, to unlock the files.
In recent years, however, in a process dubbed "double extortion", the majority of gangs steal data at the same time and threaten to release it online, which they hope will strengthen their negotiating hand."
"After "social engineering" efforts using personal details to target staff were uncovered, badges no longer carry last names, clean-desk policies are far more strictly enforced and the processing and communication of sensitive information is now subject to higher bars of regular mandatory training."
"The folks at Signal are taking one of the four post-quantum cryptography algorithms that have been chosen by the US National Institute of Standards and Technology to withstand attacks by quantum computers, but instead of using it to replace their existing public-key encryption system, they are layering the new algorithm on top of what they already have. "We are augmenting our existing cryptosystems," they say, "such that an attacker must break both systems in order to compute the keys protecting people's communications." And they will be rolling out this augmented system to all users in the next few months."
"Carolan, who is 18 and has just completed an art foundation course in Cardiff, decided architecture would be a safer path to follow. "It feels like it will be a more secure degree. Lots of psychology goes into architecture," he says. "You need to understand the core of what you're doing."
He is doubtful that images made by artificial intelligence will replace the art exhibited in galleries, but he worries that commercial projects previously requiring a team of artists may in the future need only one to work with AI and neaten up the final product.
"The options will probably get limited as time goes on. Personally, I'd find it a bit depressing if there wasn't a human element, but whether or not we'd notice I'm not sure. I always thought things like art would be one of the last things robots would be able to do.""
"Amazon is to pay $25m (£20m) to settle allegations that it violated children's privacy rights with its Alexa voice assistant.
The company agreed to pay the US Federal Trade Commission (FTC) after it was accused of failing to delete Alexa recordings at the request of parents.
It was found to have kept hold of sensitive data for years.
Amazon's doorbell camera unit Ring will also pay out after giving employees unrestricted access to customers' data."
"Sam Smith, of the health data privacy group MedConfidential, said: "This is an utterly appalling case. It's an individual problem that the doctor did this. But it's a systemic problem that they could do it, and that flaws in the way the NHS's data management systems work meant that any doctor can do something like this to any patient."
""Bots view, 'like,' subscribe and repost content and manipulate view counts to move content up in search results and recommendation lists," the analysis said. In some cases, Fabrika targets users with disinformation directly after gleaning their emails and phone numbers from databases. The campaign's goals include demoralising Ukrainians and exploiting divisions among western states, the document added.
Experts have downplayed the 1% claim. Alan Woodward, a professor of cybersecurity at Surrey University, said the figure sounded implausible and that sock puppet accounts - a term for accounts with fake identities - need their content to be reposted by plausible accounts such as those operated by influencers."
"Researchers at the Citizen Lab at the University of Toronto's Munk School said the spyware, which is made by an Israeli company called QuaDream, infected some victims' phones by sending an iCloud calendar invitation to mobile users from operators of the spyware, who are likely to be government clients. Victims were not notified of the calendar invitations because they were sent for events logged in the past, making them invisible to the targets of the hacking. Such attacks are known as "zero-click" because users of the mobile phone do not have to click on any malicious link or take any action in order to be infected."
"Because for all the promises of smart tech, at least a "dumb" heating system can't be taken over by a vindictive ex, and used to torment you with unbearable heat or terrible cold, when you have no idea why. A daft doorbell can't tell a stalker when you leave, or when you're home, or where you go if you use a smartwatch, too. And no stupid speaker can be used to listen in on your private conversations. These situations may sound like nightmares, but they are all real cases of smart tech-enabled domestic abuse. And the number of cases is shooting up: between 2018 and 2022, the domestic violence charity Refuge saw an increase of 258% in the number of survivors supported by their tech abuse team."