News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Hackers Can Track Any Bluetooth Device Using a New Exploit

A new exploit can track any Bluetooth device using Apple's Find My network, allowing hackers to locate almost any Bluetooth-enabled device's location without its owner knowing. The attack can be done remotely in just a few minutes, and researchers have found that their method had a 90% success rate. This vulnerability could allow scammers to track devices remotely, potentially leading to identity theft or further malicious activities.

See Also

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.81

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

Spyzie Stalkerware Exposes Half a Million Android and Iphone Users Δ1.78

A little-known phone surveillance operation called Spyzie has compromised more than half a million Android devices and thousands of iPhones and iPads, according to data shared by a security researcher. Most of the affected device owners are likely unaware that their phone data has been compromised. The bug allows anyone to access the phone data, including messages, photos, and location data, exfiltrated from any device compromised by Spyzie.

Android's Find My Device Can Now Let You Track Your Friends – and I'm Not Sure if That's Cool or Creepy Δ1.76

Google has added a new people tracking feature to its Find My Device, allowing users to share their location with friends and family via the People tab. This feature is currently in beta and provides a convenient way to quickly locate loved ones, but raises concerns about digital privacy and stalking. The feature includes digital protections, such as alerts when tracking is enabled and automatic detection of unknown trackers.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.75

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

New Spyware Found to Be Snooping on Thousands of Android and Ios Users Δ1.75

A recent discovery has revealed that Spyzie, another stalkerware app similar to Cocospy and Spyic, is leaking sensitive data of millions of people without their knowledge or consent. The researcher behind the finding claims that exploiting these flaws is "quite simple" and that they haven't been addressed yet. This highlights the ongoing threat posed by spyware apps, which are often marketed as legitimate monitoring tools but operate in a grey zone.

Bluetooth 6 Arrives: Meet Its Powerful Next-Gen Features Δ1.74

Bluetooth 6.0 is the latest update to the wireless technology, bringing exciting new features that enhance user experience and performance. The new standard introduces Channel Sounding, which enables precise location of Bluetooth devices, and Isochronous Adaptation Layer (ISOAL), which optimizes data packet transmission for reduced latency. Additionally, Bluetooth Extended Advertising improves scanning efficiency and security.

Apple Faces Likely French Antitrust Fine for Privacy Tool, Sources Say Δ1.73

Apple is facing a likely antitrust fine as the French regulator prepares to rule next month on the company's privacy control tool, two people with direct knowledge of the matter said. The feature, called App Tracking Transparency (ATT), allows iPhone users to decide which apps can track user activity, but digital advertising and mobile gaming companies have complained that it has made it more expensive and difficult for brands to advertise on Apple's platforms. The French regulator charged Apple in 2023, citing concerns about the company's potential abuse of its dominant position in the market.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.73

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

Apple AirTag 4-Pack Is Now Available for $70 Δ1.73

The Apple AirTag 4-Pack is a highly reliable and affordable Bluetooth tracking solution that can be used to track keys, wallets, luggage, and more. With its ease of use, small size, and ultra-wideband connectivity protocol, the AirTag provides highly accurate tracking information, making it an ideal choice for individuals who struggle with losing their belongings. The current price of $70 for a 4-pack is significantly cheaper than the regular price of nearly $30 each.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.72

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Android's AI Is Scanning Your Phone for Scam Activity Now in Two Ways Δ1.72

Google has introduced two AI-driven features for Android devices aimed at detecting and mitigating scam activity in text messages and phone calls. The scam detection for messages analyzes ongoing conversations for suspicious behavior in real-time, while the phone call feature issues alerts during potential scam calls, enhancing user protection. Both features prioritize user privacy and are designed to combat increasingly sophisticated scams that utilize AI technologies.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.72

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Microsoft Discoveries Vulnerable Software Attack. Δ1.71

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.71

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

The Rise of Fake Spyware Apps in the Play Store Δ1.71

Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.71

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.

Eight Sleep Beds Seemingly Suffer From Serious Security Liabilities Δ1.71

High-tech Eight Sleep pods allow Elon Musk and DOGE staff to rest at work, but security flaws have been discovered, including an AWS key and remote access. Hackers could exploit the beds to infiltrate home networks and connected devices, raising concerns about personal privacy and entire home network security. The company's lack of oversight has allowed unauthorized access, potentially leading to financial losses and compromised data.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.71

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Apple to Take Legal Action Against British Government over Backdoor Request Δ1.70

Apple is now reportedly taking the British Government to court, Move comes after the UK Government reportedly asked Apple to build an encryption key. The company appealed to the Investigatory Powers Tribunal, an independent court that can investigate claims made against the Security Service. The tribunal will look into the legality of the UK government’s request, and whether or not it can be overruled.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.70

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Uk Will neither Confirm nor Deny that It’s Killing Encryption Δ1.70

The UK government's reported demand for Apple to create a "backdoor" into iCloud data to access encrypted information has sent shockwaves through the tech industry, highlighting the growing tension between national security concerns and individual data protections. The British government's ability to force major companies like Apple to install backdoors in their services raises questions about the limits of government overreach and the erosion of online privacy. As other governments take notice, the future of end-to-end encryption and personal data security hangs precariously in the balance.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.70

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.70

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Accidentally Texting with Scammers? Google's AI Is Here to Stop the Chat Cold Δ1.70

Google has introduced AI-powered features designed to enhance scam detection for both text messages and phone calls on Android devices. The new capabilities aim to identify suspicious conversations in real-time, providing users with warnings about potential scams while maintaining their privacy. As cybercriminals increasingly utilize AI to target victims, Google's proactive measures represent a significant advancement in user protection against sophisticated scams.

Consumer Reports Finds Popular Voice Cloning Tools Lack Safeguards Δ1.70

A recent study by Consumer Reports reveals that many widely used voice cloning tools do not implement adequate safeguards to prevent potential fraud and misuse. The analysis of products from six companies indicated that only two took meaningful steps to mitigate the risk of unauthorized voice cloning, with most relying on a simple user attestation for permissions. This lack of protective measures raises significant concerns about the potential for AI voice cloning technologies to facilitate impersonation scams if not properly regulated.