Aware Force

Cambodia Finally Targets Scam Compounds Where Human Trafficking Victims Work the Phones

Many of the scam calls and messages people receive today are not coming from “willing criminals,” but from human‑trafficking victims locked in compounds and forced to defraud strangers online. Cambodia has just passed its first dedicated cybercrime law targeting these scam centers, introducing prison terms of up to 10 years and fines of up to […]

Lesson from an AI Company’s Accidental Leak: Employees’ ‘Helpful’ AI Assistant May Be a Powerful Tool for Hackers

Several AI companies are about to release a new wave of powerful systems capable of breaching computer networks, making large-scale cyberattacks easier to launch than ever before.  An accidental leak of Anthropic’s upcoming tools shows how powerful these capabilities are and how much information its desktop assistant can quietly collect from any computer on which […]

Home Wi-Fi Router Ban is Underway: Software Updates End March 1, 2027

In the U.S., security updates for foreign‑made home routers will be allowed until March 1, 2027, under a blanket FCC waiver, but no new foreign‑manufactured consumer router models can be approved for sale in the US going forward. Data from Ookla show that the hardest‑hit brands will include TP‑Link, along with contract manufacturers Arcadyan and […]

Face ID, Not Texts: The Better Way to Safeguard Logging in to Your Accounts

We’ve been telling users to move to multi-factor authentication whenever possible. Now we need to get more specific. Criminals are getting very good at tricking people into reading those codes out loud, or at quietly taking over phone numbers so the codes go straight to them instead of you. Once they have your password and […]

New WhatsApp for Windows Scam Turns One Click into the Full Takeover of a Windows PC

Attackers are now sending booby-trapped attachments over WhatsApp for Windows that can quietly give them remote control of a PC if the user opens the file. The trick relies on a simple script that abuses built‑in Windows tools, so the activity doesn’t look obviously malicious. Once it’s in, the malware tries to get admin rights, […]

Why You’ll Soon See More ‘AI‑Generated’ Tags on Photos and Videos

California is starting to roll out new rules requiring big tech companies to clearly mark when photos, videos, or texts were made by AI rather than a real person. The goal is to help people spot fake or edited content online, especially around elections, where AI‑generated “deepfakes” can mislead voters. Some of the rules require […]

Could a ‘Cyber‑9/11’ Break the Insurance Market?

Last week, the U.S. Treasury quietly asked the big question: What happens if a mega‑scale cyberattack hits critical infrastructure and the insurance industry can’t cover the bill? Today’s cyber policies are built to handle “ordinary” breaches, not a cascading outage that knocks out cloud providers, grids, or financial rails at a national scale. Treasury and […]

The Most Common AI-Generated Scams So Far This Year

Even though more of us are aware that fraudsters are using AI to rip us off, their scams are now so slick and personalized that even “smart” people are falling for them. Here are the top three AI-generated scams during the past three months: The advice for all of us “smart” consumers is to always […]

Those One-Time MFA Codes You Use to Log in to Your Bank: Crooks Have Figured Out a New Way to Steal Them

Hackers have found a sneaky way to get past multi‑factor authentication: they wait in the background while you log in, let you enter your password, and tap “Approve,” then grab a copy of that login behind the scenes so they can sign in as you on their own device. Then, the clues show up. You […]

The New Phone Number Takeover Scam

Criminals have discovered an easy way to hijack calls and texts to your mobile phone: they talk you into approving an eSIM “security” change instead of tricking your carrier. An eSIM identifies your phone on a mobile network. Once your digital SIM is transferred to the scammer, every call, text, and one‑time passcode meant for […]

Powered by RSS 2 HTML