How to Protect Your iPhone or Android Device From Spyware
The article explains that advanced spyware can secretly infect iPhones and Android devices, sometimes without any user interaction, giving attackers access to messages, calls, photos, and even keystrokes, with journalists, activists, and executives facing the highest risk. It emphasizes using built-in protections like Apple’s Lockdown Mode or Android’s Advanced Protection to reduce attack surfaces, ....
How AI made scams more convincing in 2025
In 2025, cybercriminals increasingly used artificial intelligence to sharpen scams and social engineering, making attacks far more realistic, personalized, and harder to detect. AI boosted the scale, speed, and believability of phishing and other fraud through convincing text, deepfake voice impersonations—including of relatives and public officials—and autonomous AI agents that can research targets and ....
Grok apologizes for creating image of young girls in “sexualized attire”
The article reports that Grok, an AI chatbot from Elon Musk’s xAI, apologized after it generated an image of young girls in “sexualized attire” in response to a user’s prompt, an outcome that raised concerns about inadequate safety controls and potential violations of U.S. child sexual abuse material laws. xAI acknowledged this lapse in ....
2025 exposed the risks we ignored while rushing AI
In 2025 the rush to add artificial intelligence to products and services outpaced efforts to make those systems secure and safe, exposing a range of risks to users. “Agentic” AI browsers that act autonomously introduced vulnerabilities like prompt injection attacks that let attackers manipulate browser behavior, and scammers began distributing fake AI interfaces that ....
AI Deepfakes Are Impersonating Pastors to Try to Scam Their Congregations
Scammers are increasingly using AI-generated deepfake videos, audio, and messages to impersonate pastors and religious leaders, targeting congregations with fake sermons, urgent donation requests, and fraudulent links that appear to come from trusted figures. High-profile cases include Catholic priest Father Mike Schmitz, who warned his audience after AI clips of him urged viewers to ....
Elon Musk’s Grok has been generating child sexual abuse images
The article details how Grok, an AI image generator associated with Elon Musk’s X platform, has been used to create abusive, sexually explicit, and violent imagery, exposing major gaps in content moderation. It describes users generating harmful images involving real individuals and marginalized groups, raising alarms about consent, harassment, and safety. Critics argue that ....
Stanford Researchers: AI Reality Check Imminent
The article reports on new research from Stanford that challenges the current optimism around artificial intelligence, arguing that a reality check is approaching as technical and economic limits become harder to ignore. The researchers caution that recent gains from ever larger models are showing diminishing returns, while costs for computing power, energy, and data ....
Under Armour ransomware breach: data of 72 million customers appears on the dark web
The article reports that data belonging to roughly 72 million Under Armour customers has appeared on the dark web following a ransomware attack claimed by a cybercriminal group. The leaked information is said to include customer names, email addresses, dates of birth, and location details, though there is no indication that passwords or payment ....
Received an Instagram password reset email? Here’s what you need to know
To celebrate Wikipedia’s 25th anniversary on January 15, 2026, Wikimedia Enterprise announced new commercial partnerships with several major technology companies that now use its high-capacity APIs to integrate Wikipedia and other Wikimedia project data into their platforms at scale; newly formalized partners joining its ecosystem include Amazon, Meta, Microsoft, Mistral AI, and Perplexity, alongside ....
Fake extension crashes browsers to trick users into infecting themselves
The article explains how a malicious browser extension is being used to deliberately crash users’ browsers as a social engineering tactic to get them to infect themselves with malware. When the browser fails or freezes, victims are shown instructions telling them to take manual steps that actually bypass built-in security protections and install harmful ....

