Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ – The Verge

The AG claims that Temu collects far more data than necessary to run a shopping app, including sensitive or personally identifiable information.

Your phone’s secret network activity: 10 times worse than DNS logs reveal | Cybernews

Many data brokers may use that data for behavior profiling, analytics, and advertising, and it may also be sold to third parties. Commercial spyware, such as Pegasus, used to track journalists, political dissidents, and others, could be delivered via ad networks or other legitimate infrastructure your apps rely on.

Why are cyberattacks increasingly targeting health care?

Why hospitals? It’s likely because of the massive databases of sensitive personal information they operate, and the importance of daily operations running smoothly.

Ransomware attacks targeting hospitals, putting lives at risk

Cyberattacks have played havoc with the bottom lines of companies all over the world. They’re also starting to kill people.

11 Must-Do Security Steps Before Heading Out on Your Next Vacation – CNET

Your vacation is coming up, and you already have a hundred things to do. Good news — today’s smart devices and home security make it easier than ever to prep your home for a trip and check on it while you’re away. Video doorbells can watch for packages, home security cameras can send alerts about human figures, even smart lights can help out, all without relying on neighbors you may not know well.

Disruptions at Many Car Dealerships Continue as CDK Hack Worsens – SecurityWeek

Dealerships use CDK products to sell cars and car parts, as well as for a wide range of other operations, and the cyberattack has caused significant disruptions for many companies. While some have resorted to pen and paper, others said they were forced to halt most of their operations. 

New York Post: Cyber experts warn of new Chrome, Microsoft money stealing malware

Often, a pretend update prompt will pop up on Google Chrome through a “compromised website” with a clipboard message to “copy the code” provided. It then instructs personal computer owners to open PowerShell — a Microsoft program for scripts — and self-paste in the malware.

Hackers are hijacking Windows Search to hit victims with malware | TechRadar

The attack starts with a phishing email pretending to be an invoice, or something similar. It carries a .ZIP archive of an HTML file, and thus successfully bypasses antivirus and email security programs that overlook compressed contents.

VLC Media Player Vulnerabilities Allow Remote Code Execution

This vulnerability could lead to a denial-of-service (DoS) condition on the affected device due to exceeded storage space or arbitrary data.

My family was scammed out of a $15K Carnival Cruise — here’s how I’m fighting to get it back

https://nypost.com/2024/06/13/lifestyle/my-family-was-scammed-out-of-a-15k-carnival-cruise-heres-how-im-fighting-to-get-it-back/