More stories

  • in

    Biometrics vs. passcodes: What lawyers say if you’re worried about warrantless phone searches

    rob dobi/Getty Images Accompanying the rise in detentions and deportations by US Immigration and Customs Enforcement (ICE) and other authorities are increasingly frequent reports of smartphone searches. US authorities allegedly dig through past emails, photos, social network activity, and other content to establish grounds for apprehension or other enforcement decisions. While such intrusions as a […] More

  • in

    Tired of unsolicited nude pics? Google’s new safety feature can help – how it works

    Elyse Betters Picaro / ZDNETA new Google feature designed to prevent you from seeing unwanted nudity is rolling out to Google Messages.First announced last fall, Sensitive Content Warnings is an optional feature that blurs images with nudity before you see them and warns about the dangers of sending nude images if you’re trying to do so.Also: 6 hidden Android features every user should knowand how they make life easierGoogle calls it a “speed bump” designed to keep users safe. How Sensitive Content Warnings workIf you receive a questionable image, not only will Messages blur the image, but you’ll also see a link to resources explaining why nude images can be harmful, as well as an option to block the number. You can tap “Next” if you do want to see the image. If you’re sending an image, you’ll see a reminder about the risks, and you’ll have to click “Confirm to Continue” to prevent accidental sharing. Also: Your Android phone is getting a new security secret weapon – how it worksThe feature does not currently work on videos. Google adds that photo detection happens entirely on the device, so the company does not have access to any images. More

  • in

    New Google email scams are alarmingly convincing – how to spot them

    Kerry Wan/ZDNETA sophisticated phishing scam has been taking advantage of Google security flaws to convince people that the malicious emails and websites are legitimate.In a series of X posts spotted by Android Authority, developer Nick Johnson explained how he was targeted by a phishing attack that exploits flaws in Google’s own infrastructure. In his first post, Johnson includes a screenshot of the scam email claiming that Google had been served a subpoena requiring it to produce a copy of his Google account data.Also: Clicked on a phishing link? 7 steps to take immediately to protect your accountsThe text of the email reads correctly; that is, it uses the right terms and doesn’t contain any typos or broken English. The message itself is considered valid and signed by Google. It’s sent from no-reply@google.com, a legitimate, automated company-used address. The email itself passes the DKIM signature check, which aims to verify the authenticity of a message. No other warnings appear, so this looks completely legitimate.Clicking a Sites link in the email takes you to a support portal that looks like an actual Google page. The page is even hosted on Google Sites, a platform where people can create and run their own websites. Using such a platform adds legitimacy to the scam as people assume it’s the real deal. More

  • in

    This ChatGPT trick can reveal where your photo was taken – and it’s unsettling

    Elyse Betters Picaro / ZDNETPeople have found a new use for ChatGPT: Figuring out locations from photos. OpenAI’s latest AI models, o3 and o4-mini, can analyze images beyond just recognizing objects; they can zoom in, crop, and detect visual clues in photos to help identify places, landmarks, and even specific businesses. This capability is fascinating, but it’s also raised some privacy concerns about how easily people can use AI to reverse-engineer location data from images.Also: ChatGPT just made it easy to find and edit all the AI images you’ve ever generatedTechCrunch reported that people are uploading photos — anything from restaurant menu snapshots to casual selfies — and asking ChatGPT to guess where they were taken. The AI does this by looking at everything in the image: the type of buildings, landscape features, and even subtle hints like the architecture or the layout of a city. It then taps into its knowledge database and sometimes the internet to make an educated guess about the location. The results can be surprisingly accurate, and it’s got people talking. Some users have even tested the AI with blurry photos or images with partial objects, and the model still managed to make a guess. Also: Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plansI love playing GeoGuessr, a game where you’re dropped into a random location on Google Street View and have to guess where you are based on the surroundings. So this ChatGPT capability was super fun to test myself. I uploaded a few photos to see how ChatGPT would handle the challenge. However, as with any AI, the result was not always perfect. More

  • in

    That Google email look real? Don’t click – it might be scam. Here’s how to tell

    Aitor Diago/Getty Images A sophisticated phishing scam is taking advantage of Google security flaws to convince people that the malicious emails and website are legitimate. In a series of X posts spotted by Android Authority, developer Nick Johnson explained how he was targeted by a phishing attack that exploits flaws in Google’s own infrastructure. In […] More

  • in

    Data-stealing cyberattacks are surging – 7 ways to protect yourself and your business

    BlackJack3D/Getty Images 2024 delivered some good news and bad news in the area of cybercrime. Malware-based ransomware attacks dropped for the third year in a row. But instances of infostealer malware grew dramatically. Those findings come from IBM X-Force’s “2025 Threat Intelligence Index” released Thursday. First, let’s look at the good news. For the year, […] More

  • in

    Update your iPhone now to patch a CarPlay glitch and two serious security flaws

    Maria Diaz/ZDNETApple has rolled out its latest iPhone update, iOS 18.4.1. Though minor, you’ll want to install the update as it patches a CarPlay glitch and several dangerous security flaws.Also: The best VPN services (and how to choose the right one for you)After the release of iOS 18.4 earlier this month, many iPhone and CarPlay users started complaining of random connection problems and other hiccups. Some people reported that CarPlay would disconnect and reconnect, while others revealed that the CarPlay screen would appear blank. In its description of iOS 18.4.1, Apple said the update “addresses a rare issue that prevents wireless CarPlay connection in certain vehicles.”With that bug hopefully solved, let’s move on to the more urgent matter of security vulnerabilities. The latest update deals with two serious flaws already used in targeted attacks.Also: Just installed iOS 18.4? Changing these 3 features made my iPhone much better to useThe first flaw, CVE-2025-31200, is described as “processing an audio stream in a maliciously crafted media file may result in code execution.” That process refers to an attacker who uses Apple’s CoreAudio framework to create a media file containing malware. Any iPhone user who launches the file would trigger the malicious code, allowing the attacker to access the device.This vulnerability may have been exploited in an “extremely sophisticated attack against specific targeted individuals on iOS,” according to Apple. To squash this bug, the company fixed a memory corruption issue, a problem in which a program can modify memory to execute malicious code. More

  • in

    Why the CVE database for tracking security flaws nearly went dark – and what happens next

    fotograzia/Getty Images Over the weekend, security experts were beginning to panic. MITRE announced that the US government had not renewed funding for the Common Vulnerabilities and Exposures (CVE) database.  MITRE VP Yosry Barsoum warned that the government contract support enabling MITRE “to develop, operate, and modernize CVE” would expire on April 16. That would mean, Barsoum continued, […] More