Security researchers tricked Apple Intelligence into cursing at users. It could have been a lot worseApple Intelligence, the personal AI system integrated into newer Macs, iPhones, and other iThings, can be hijacked using prompt injection, forcing the model into producing an attacker-controlled result and putting millions of users at risk, researchers have shown.…
Julia Liuson, president of Microsoft's developer division (DevDiv), will resign at the end of June, though she will continue in an advisory role.…
I've spent over a decade telling anyone who'd listen that S3 is not a filesystem, which in retrospect was a really weird way to start some conversations. So when AWS launched S3 Files on Tuesday – which lets you mount an S3 bucket as an NFS share – I did what any reasonable person would do: I spun up an EC2 instance and started trying to break it.…
UK-listed oil and gas outfit Zephyr Energy plc has admitted a cyber incident siphoned off roughly £700,000 after a single payment to a contractor was quietly redirected to an attacker-controlled account.…
The Department for Science, Innovation and Technology (DSIT) is recruiting three directors general to lead aspects of the UK government's digital work, all on pay in excess of the prime minister's salary.…
Capita has limited the online functionality of its Civil Service Pensions Scheme (CSPS) member portal after confirming an "issue" briefly exposed the personal data of public sector workers.…
The British government is spending £15 million over the next three years to improve crime mapping in England and Wales, partly to allow more targeted policing of knife crime.…
The Microsoft and ValueLicensing legal tussle will enter an appeals phase this month, attracting the attention of a multibillion-pound class action against the Windows giant.…
PWNED Welcome back to Pwned, the column where we share war stories from IT soldiers who shot themselves – or watched someone else shoot themselves – in the foot. Today's tale shows that even when you're setting up something as simple as fitness gear, there's no excuse for leaving security credentials lying around.…
Quantum computing exists in a sort of superposition with regard to cryptography – it's both a pending threat and a technology of no immediate consequence for decryption.…