Tag Archive for: Alarm

Microsoft and OpenAI Sound the Alarm


Generative AI, a rapidly advancing technology, is increasingly becoming a tool of choice for offensive cyber operations by U.S. rivals. Microsoft and OpenAI have sounded the alarm about this disturbing trend, highlighting its potential to create sophisticated and hard-to-detect cyber attacks that could pose significant threats to national security. Traditional cybersecurity measures may struggle to counter such AI-driven threats, underscoring the urgent need for enhanced cybersecurity measures and preparedness.

Generative AI in Offensive Cyber Operations

Microsoft and OpenAI have detected and disrupted the malicious use of AI technologies for offensive cyber operations by U.S adversaries, including Iran, North Korea, Russia, and China. The adversaries have utilized generative AI for various purposes, such as social engineering, phishing, and researching technologies related to warfare.

Generative AI is expected to enhance malicious social engineering leading to more sophisticated deepfakes and voice cloning. Critics have raised concerns about the hasty public release of large-language models and the need for increased focus on making them more secure.

The Role of Large Language Models

The use of large language models, such as OpenAI’s ChatGPT, has led to an increase in sophisticated deepfakes, voice cloning, and other malicious social engineering tactics. Cybersecurity firms have long used machine learning for defense, but offensive hackers are now also utilizing it. Microsoft, which has invested billions in OpenAI, has reported that generative AI is expected to enhance malicious social engineering.

Notably, the North Korean cyberespionage group known as Kimsuky, Iran’s Revolutionary Guard, the Russian GRU military intelligence unit known as Fancy Bear, and Chinese cyberespionage groups have all used generative AI in various ways to conduct offensive cyber operations. Critics argue that Microsoft’s creation and selling of tools to address vulnerabilities in large language models may be contributing to the problem, and that more secure foundation models should be created instead.

Microsoft and OpenAI’s Response

Microsoft and OpenAI have collaborated to publish research on…

Source…

apple: Apple sounds alarm over hacking, govt orders probe


Messages from Apple to iPhones of several Opposition lawmakers and journalists warning them that they could be potential targets of an unspecified ‘state-sponsored’ privacy attack raised a furore in India Tuesday, prompting New Delhi to order a probe of the reported bids to hack into the seemingly breach-proof mobile devices caught in the poll-season political maelstrom.

“The Government of Bharat takes its role of protecting the privacy and security of all citizens very seriously and will investigate to get to the bottom of these notifications,” electronics and IT minister Ashwini Vaishnaw said in a post on social platform X. “In light of such information and widespread speculation, we have asked Apple to join the probe with real, accurate information on the alleged state-sponsored attacks.”

Elevate Your Tech Prowess with High-Value Skill Courses

Offering College Course Website
Indian School of Business ISB Product Management Visit
IIM Kozhikode IIMK Advanced Data Science For Managers Visit
IIM Lucknow IIML Executive Programme in FinTech, Banking & Applied Risk Management Visit

Users facing such attacks are “individually targeted because of who they are or what they do”, said Apple’s alert message. The company later said in a statement that it did not attribute to a “specific state-sponsored attacker” the threat warnings sent to the iPhone-users.

Also read | ETtech Explainer: why Apple sent emails about ‘state-sponsored attacks’ to opposition leaders

MoS for electronics and IT Rajeev Chandrasekhar said that the government will investigate these threat notifications and also Apple’s claims of being secure and privacy compliant devices.

Untitled

Discover the stories of your interest

‘Can’t Provide Info on Cause’

“After today’s ‘threat notifications’ being received by many people including MPs and those in geopolitics, we expect Apple to clarify the following: If its devices are secure, why are these ‘threat notifications’ sent to people in over 150 countries? Because, Apple has repeatedly claimed their products are designed for privacy,” Chandrasekhar said on X.Since early Tuesday, Opposition leaders such as Trinamool Congress’ Mohua Moitra, Shiv Sena (Uddhav)’s

Source…

OMNI acquires Alarm Computer Technology


BRAINTREE, Ma. – OMNI Resource Management, a regional facilities services provider has acquired the Massachusetts based Alarm Computer Technology (ACT) security systems contractor.

The acquisition broadens the company’s growth in electronic security they said. OMNI stated that its part of their expansion and growth in the industry and follows another recent acquisition, Mainstream Communication Systems. “ACT’s geographical service area, large commercial client base, and long-standing commitment to quality service aligns very well with our business model. We look forward to a seamless integration and the opportunity to support the valued ACT clients,” said Chris Pratt, CEO of OMNI.

ACT was founded in 1983 by Helder Lemos and specializes in state-of-the-art video surveillance, burglar and fire alarm, and automation systems. “This decision was driven by our goal to always put our clients’ interests first. Partnering with OMNI will provide our clients with the highest level of service, and I am confident the long-term relationships we have built over the last forty years will remain strong,” said Helder Lemos, owner of ACT.

This expansion increases OMNI’s market share in the security industry and will enhance its offerings for its clients throughout the east coast.

More available at omniresourceusa.com.

Source…

Is Your Phone At Risk? Google Raises Security Alarm For Android Users


In a blogpost, Tim Willis, who is head of Google’s Project Zero, said four of the vulnerabilities ‘allows for Internet-to-baseband remote code execution”. These bugs have put the security of the android systems at risk.

Updated Mar 17, 2023 | 10:48 PM IST

The Google security researchers said skilled hackers would be able to quickly create an ‘operational exploit’ to compromise affected devices silently and remotely.

Photo : Twitter

Almost every second person is using an android phone nowadays. However, the android system is not averse to bugs and hacking. Raising a major alarm, the Google security researches have warned of 18 different bugs in Samsung Exynos chips which are utilised in many top Android smartphones.

How your phone is at risk

In a blogpost, Tim Willis , who is head of Google’s Project Zero , said four of the vulnerabilities ‘allows for Internet-to-baseband remote code execution”. These bugs have put the security of the android systems at risk.

According to tests conducted by the Project Zero lab, an attacker can remotely hack the phone at the baseband level without any user interaction thanks to these four bugs. The cyber hacker just needed to know the phone number of the victim to compromise its security.

The Google security researchers said skilled hackers would be able to quickly create an ‘operational exploit’ to compromise affected devices silently and remotely.

How Can Samsung phone users fend off cyber attacks

Google’s Project Zero head Tim Willis has said the phone users having Samsung’s Exynos chipsets in their devices can turn off Wi-Fi calling and Voice-over-LTE ( VoLTE ) in their phones to fend off cyber attacks until security updates are made available.

According to Willis, the chances of security compromise in the phones are nil when the settings are turned off.

The bug currently affects devices from Samsung, Google-Pixel 6 and Pixel 7 series, Vivo, wearables using Exynos chipset. The bugs also affects vehicles using Exynos Auto T5123 chipset.

Google said affected Pixel devices have already received updates, while other devices may get security updates as per manufacturer.

Google withheld disclosure of four vulnerabilities

According to Tim Willis, Under the…

Source…