AI Can Crack Your Passwords Fast—6 Tips To Stay Secure

 

source: forbes.com (contributed by Steve Page)  |  image: pexels.com

 

Do you think your trusty 8-character password is safe? In the age of AI, that might be wishful thinking. Recent advances in artificial intelligence are giving hackers superpowers to crack and steal account credentials. Researchers have demonstrated that AI can accurately guess passwords just by listening to your keystrokes. By analyzing the sound of typing over Zoom, the system achieved over 90% accuracy in some cases.

And AI-driven password cracking tools can run millions of guess attempts lightning-fast, often defeating weak passwords in minutes. It is no surprise, then, that stolen or weak passwords contribute to about 80% of breaches​.

The old password model has outlived its usefulness. As cyber threats get smarter, it is time for consumers to do the same.

AI Makes Cracking Passwords Easier Than Ever

Gone are the days when a hacker had to manually try “password123” or use basic tools to brute-force your account. Now, AI algorithms can crack passwords with frightening speed and sophistication. For example, according to Security Hero, AI-powered tools like PassGAN can crack 51% of common passwords in less than a minute.

Machine learning models can also automate “credential stuffing” attacks (trying breached passwords on other sites) much faster and more intelligently. Continue reading “AI Can Crack Your Passwords Fast…”

Clickfix:  How to Infect Your PC in 3 Easy Steps

source: krebsonsecurity.com  |  image: pexels.com

 

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ClickFix,” the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. Continue reading “ClickFix: How to Infect Your PC in Three Easy Steps”

Belgium probes if Chinese hackers breached its intelligence service

source: bleepingcomputer.com (contributed by Steve Page)  |  image: pexels.com

 

​The Belgian federal prosecutor’s office is investigating whether Chinese hackers were behind a breach of the country’s State Security Service (VSSE).

Chinese state-backed attackers reportedly gained access to VSSE’s external email server between 2021 and May 2023, siphoning around 10% of all emails sent and received by the agency’s staff.

The compromised server was only used for exchanging emails with public prosecutors, government ministries, law enforcement, and other public Belgian administration bodies, as Belgian news outlet Le Soir reported on Wednesday. Continue reading “Belgium probes if Chinese hackers breached its intelligence service”

How Deep Tech Innovations Are Revolutionizing Warehousing, Energy And EV Infrastructure In 2025

source: forbes.com  |  image: pexels.com

 

Agentic AI may be the darling of 2025’s megatrends, dominating headlines with promises of transformative potential.

But beneath the noise, another revolution is brewing, one with quieter but equally profound implications for the future of industry.

In the traditionally conservative worlds of manufacturing, energy and logistics, a new wave of deep tech innovation is taking root.

While political pundits debate the implications of Trump’s proposed tariff policies, a cadre of entrepreneurs is sidestepping speculation, opting instead to tackle inefficiencies baked into the backbone of global commerce.

And the way they are going about it? Continue reading “How Deep Tech Innovations Are Revolutionizing…”

The cyber threats to watch in 2025, and other cybersecurity news to know this month

source: weforum.org  |  image: pexels.com

 

1. Global Cybersecurity Outlook 2025: Navigating complexity

The cyber threat landscape in 2025 will be shaped by increasingly sophisticated attacks, with ransomware, social engineering and AI-powered cybercrime remaining top concerns, according to the World Economic Forum’s latest Global Cybersecurity Outlook.

Data breaches continued at historic levels in 2024, with 3,158 data compromises tracked by the Identity Theft Resource Center – on par with the previous record-breaking year. However, victim notices surged 211% to 1.3 billion, but this was largely due to five mega-breaches, each triggering over 100 million notices.

The US Is Considering a TP-Link Router Ban—Should You Worry?

source: wired.com  |  image: pexels.com

 

Several government departments are investigating TP-Link routers over Chinese cyberattack fears, but the company denies links.

TP-Link is one of the most popular routermanufacturers in the US, but the company is facing a potential ban due to security concerns about its links to China. A December report from The Wall Street Journal revealed that the US Commerce, Defense, and Justice Departments are investigating TP-Link, though no evidence of deliberate wrongdoing has yet emerged.

“We are a US company,” Jeff Barney, president of TP-Link told WIRED, “We have no affiliation with TP-Link Tech, which focuses on mainland China, and we can prove our separateness.” Continue reading “The US Is Considering a TP-Link Router Ban—Should You Worry?”

ChatGPT’s Deep Research just identified 20 jobs it will replace. Is yours on the list?

source: zdnet.com (contributed by Artemus founder, Bob Wallace)  |  image: pexels.com

 

After researching 24 sources in seven minutes, ChatGPT came up with the top jobs that might be on the chopping block.

This week, OpenAI launched its Deep Research feature which can synthesize content from across the web into one detailed report in minutes leveraging a version of the company’s latest model, o3

This feature is a powerful tool for workers, as it can save them hours by completing research autonomously. But can the technology’s underlying model replace workers? Yes, suggests Deep Research. Continue reading “ChatGPT’s Deep Research just identified 20 jobs…”

X is blocking links to Signal

source: theverge.com (contributed by FAN, Steve Page)  |  image: pexels.com

Users attempting to add their Signal.me URL to posts, DMs, and bio descriptions are being met with error messages.

X users are currently unable to post links to Signal.me, which are used to quickly and securely send direct messages to Signal users. A variety of failure notifications are being reported when X users attempt to post Signal links on the platform, some of which identify the blocked message as containing spam, harmful content, or malicious activity. Continue reading “X is blocking links to Signal”

The Spy Who Exposed the Secrets of the Black Chamber, One of America’s First Code-Breaking Organizations

source: smithsonianmag.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

In 1931, Herbert O. Yardley published a tell-all book about his experiences leading a covert government agency called the Cipher Bureau

Herbert O. Yardley was being followed. He knew it, as much as he knew something was off when a beautiful woman struck up a conversation with him at an illegal speakeasy in New York City in 1929. “Her friendliness was a bit forced,” he later recalled. “It did not seem reasonable for one of her beauty and charm to possess such warmth for a bald-headed man.” The drinks flowed liberally as Yardley sipped straight whiskey, only to let it run slowly through his lips into the ginger ale cup used as his chaser. The woman removed a compact mirror from her purse and disappeared into the ladies’ room. Yardley wasted no time in searching the purse but found nothing except $15, a key and two or three handkerchiefs.

At the end of the night, after Yardley helped the stranger home in a taxi, he waited until she fell asleep, then searched her apartment. In a dresser drawer, he found a typewritten note: “Have tried to reach you all day by telephone. See mutual friend at first opportunity. Important you get us information at once.” The cryptologist covered the woman with a blanket and quietly let himself out. Once again, he’d avoided falling into a spy’s trap. Even so, his days as the head of the top-secret Black Chamberagency were numbered.

READ THE FULL STORY AND VIEW THE MANY IMAGES FROM THIS FASCINATING SMITHSONIAN ARTICLE.  CLICK HERE

We’re In for a Rude Awakening on Cybersecurity

source: city-journal.org (contributed by FAN, Steve Page)  |  image: pexels.com

America remains ill-prepared for Chinese hackers targeting critical infrastructure.

It’s a crisis that almost no one is talking about. The Chinese Communist Party is now the world’s preeminent practitioner of cyber warfare. Once notoriously loud and clumsy, the CCP’s hackers have become stealthy and sophisticated. They’re intercepting the calls and texts of our leaders and infiltrating servers at our ports, power plants, and water-treatment facilities. Yet hardly anyone seems to care. When Congress held hearings on cybersecurity late last year, only a handful of journalists bothered to cover them. Continue reading “We’re In for a Rude Awakening on Cybersecurity”