Joshua Coleman

Researchers reveal critical flaw in Android allowing apps to steal sensitive data

What happened: Security researchers have RELAUNCH a 12-year-old browser-based data theft technique to target Android devices, creating a powerful new attack called Pixnapping. The method allows a malicious Android app to steal data displayed on other apps or websites, including sensitive information from Google Maps, Gmail, Signal, Venmo, and even 2FA codes from Google Authenticator,…

Read More

Former U.S. Deputy Chief of Technology Officer speaks on AI and Regulation – Massachusetts Daily Collegian

On Wednesday, October 8, the University of Massachusetts Amherst College of Social and Behavioral Sciences hosted a webinar featuring former Biden administration U.S. Deputy Chief Technology Officer Alexander Macgillivray. He spoke about his experience helping shape U.S. policy on artificial intelligence. Macgillivray’s talk, “The Past and Future of AI and Regulation: A Practitioner’s Perspective,” served…

Read More

MIT-trained brothers accused of stealing $25 million in crypto in just 12 seconds: ‘There is no government regulation’

A 12-second cryptocurrency transaction is at the center of a major federal lawsuit. As reported Former Massachusetts Institute of Technology students James and Anton Peraire-Bueno are accused of using their advanced coding and math skills to steal $25 million in Ethereum “ether” currency through what prosecutors call a “one-of-a-kind” fraud scheme, according to Business Insider….

Read More

Let’s cut through the AI hype and misconceptions! Learn how AI is actually being used in ICS/OT today, and where it is headed in the future. Clint Bodungen, Morgan Franklin Cyber & ThreatGEN

As artificial intelligence (AI) continues to make its way into industrial cybersecurity, many organizations are evaluating whether it can truly improve ICS/OT security while maintaining security and reliability. This session will explore real-world applications of AI in OT environments, highlighting both its benefits and challenges. Experts will discuss the evolving threat landscape, the role of…

Read More