Cyber security today is brought to you by the book, Elisa, a tale of quantum kisses, a science fiction adventure romance set in the very near future. And one that may get you thinking about what the future brings. The Kindle edition is in pre release now and the paperback sales will start on Friday, December the 13th. Fans of the show who have pre release orders and want an early review copy can contact me at editorial at technewsday. ca or you can leave a message at Elisabook.com. Chinese hackers exploit U.
Chinese state sponsored hackers known as Salt Typhoon have infiltrated the networks of major U. S. telecom providers like AT& T, Verizon, and T Mobile. The intrusion has allowed attackers to monitor calls, emails, and even sensitive law enforcement systems, underscoring the critical need for robust encryption.
Salt Typhoon's methods involved sophisticated techniques like compromising edge devices and exploiting interconnectivity between carriers. While T Mobile claims they successfully thwarted the attempts in days, their CISO in an interview claimed it was one of the most clever attacks he had ever seen in his career.
, as people turn to alternatives to encrypt their data, they will need to exercise real care in the selection. For example, a story from yesterday noted that Apple's recent adoption of RCS messaging has introduced a serious security gap that's only now getting widespread attention. When you message within ecosystems, iPhone to iPhone, or Android to Android, you're protected by encryption.
The push for stronger cybersecurity is putting a focus on hardware upgrades. Two major tech giants, Microsoft and Google are making significant moves that highlight the growing importance of hardware in securing devices.
Although Microsoft claims this provides better protection for identity, data, and the system itself, over 60 percent of Windows users worldwide are still relying on Windows 10. Meanwhile, Google is focusing on mobile security and hardware upgrades. Starting May 2025, its Enhanced Play Integrity API will require Android apps to verify hardware backed security signals, such as whether the device has received a recent security update.
But possibly by tying new hardware and software to increase security, hardware providers may be seeking to make upgrading a security issue. And while there's no doubt that these changes enhance protection, they also present a tough choice for users upgrade or face increased risks.
Hive AI's tools are designed to detect AI generated videos, images, and audio, addressing growing concerns over the use of deep fakes and disinformation campaigns and fraud. Captain Anthony Bustamante, a project manager with the Defense Innovation Unit, called the work crucial for maintaining an information advantage against synthetic media threats.
Still, the partnership shows there's a realization of the threat of AI generated deep fakes in defense, as well as business and civilian life and the need. for robust tools. Ben Zhao, a professor at the University of Chicago who has evaluated Hive's product independently says, when it comes to protecting national security against sophisticated state actors, off the shelf products are not enough. com. Contact me at editorial at technewsday. ca. I'm your host, Jim Love. Thanks for listening.