Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Latest News

Cybercriminals Employ Display Fake Login Pages in Your Browser

  Cofense Intelligence cybersecurity researchers have discovered a new and increasingly successful technique that attackers are using to del...

All the recent news you need to know

Employee Monitoring Tool Kickidler Targeted in Ransomware Attacks

 

Cybersecurity researchers have discovered that cybercriminals are misusing a legitimate employee monitoring tool called Kickidler to execute targeted ransomware attacks. Originally developed to help businesses track productivity and ensure compliance, Kickidler offers features like real-time screen monitoring, keystroke logging, and activity tracking—functionalities that have now become attractive tools for threat actors. Security firms Varonis and Synacktiv have reported observing these attacks actively taking place. 

The attack campaign begins with malicious advertisements placed on the Google Ads network. These ads are cleverly designed to trick users searching for a legitimate utility called RVTools—a free Windows application used to connect to VMware vCenter or ESXi environments. Victims are lured into downloading a trojanized version of RVTools, which secretly installs a backdoor named SMOKEDHAM. Once SMOKEDHAM gains access to the system, attackers use it to deploy Kickidler, with a focus on targeting enterprise administrators. 

By infiltrating admin machines, the attackers can monitor keystrokes and capture sensitive data, such as credentials for off-site backups or cloud platforms. This method allows them to bypass more secure authentication systems that are often separated from Windows domains, a common defense strategy in many organizations. According to the researchers, the ransomware groups Qilin and Hunters International have been leveraging this approach to expand their reach within enterprise networks. 

These groups appear to be focusing on cloud backup systems and VMware ESXi infrastructure. Hunters International, in particular, was observed using VMware PowerCLI and WinSCP Automation tools to enable SSH access, deploy ransomware, and execute it on ESXi servers. Their payloads encrypted VMDK virtual hard disks, disrupting operations and access to virtual environments. 

One of the most concerning aspects of this campaign is how stealthily it operates. By capturing data directly from administrators’ screens and inputs, the attackers avoid using higher-risk tactics like memory dumps or privilege escalation, which are more likely to be flagged by security systems. The misuse of Kickidler demonstrates a growing trend of cybercriminals weaponizing legitimate enterprise tools to bypass traditional defenses and maintain stealth within targeted networks. 

These attacks highlight the need for increased vigilance around software downloads, especially from third-party sources, and reinforce the importance of strong endpoint protection, regular software audits, and employee awareness training. 

As cyberattacks grow more sophisticated, defenders must adapt by tightening controls, decoupling critical system access from everyday credentials, and monitoring for unusual activity—even from tools considered safe.

How to Check If a Downloaded File Is Safe to Use

 


It is no longer a secret that downloading software is becoming an integral part of everyday computing in today’s digitally based environment. It is used to enhance productivity, explore new tools, and stay connected to an ever-increasing online world, all of which are aided by downloads of software. While instant downloads have many advantages, if they are not approached with due diligence, they can also pose significant risks. 

A variety of harmful software, including malware, spyware, and adware, can be easily embedded into seemingly harmless files, potentially compromising personal information or system functionality. Given this, users need to take a cautious and informed approach before they execute any downloaded file. 

By following a few simple steps to verify a file’s safety, for example, scanning it for antivirus, and signing it with a digital signature, users can greatly reduce their vulnerability to cybersecurity risks. 

As digital threats continue to evolve, awareness and prevention remain the best defences for a constantly evolving cyber environment. While downloading files from the internet is now part of current daily lives, it is not without its risks. Cybercriminals often take advantage of this habit by disguising malicious software, like viruses, trojans, ransomware, and a wide variety of other forms of malware, as legitimate software. 

The threats are often disguised as harmless files, making it easy for the uninitiated to become victims of data loss or security breaches. This is why it is imperative to use caution when downloading any content, regardless of the source, regardless of whether the source seems trustworthy. The risk of infection can be significantly reduced by practising due diligence by scanning files using antivirus software, checking for digital signatures, and avoiding unknown or suspicious links when it comes to downloading files. 

With the ever-evolving digital threat landscape, users must take precautions about file safety, not just as a recommendation, but as a necessity. Users across the globe are increasingly concerned about the risk of downloading malicious software unintentionally from the internet. It is possible to install malicious programs on a computer system just by clicking a single careless button. 

A malicious program could compromise the integrity of the system, take sensitive data, or render a computer inoperable. As a result of SonicWall's Cyber Threat Report 2021, there were more than 5.6 billion malware attacks recorded in 2020 alone, a staggering figure that indicates how persistent this threat has become. 

A malware infection is usually caused by deceptive email attachments, compromised websites, and software downloads that appear legitimate but are laced with hidden dangers, resulting in the infection of a device. As a result, many users unknowingly expose themselves to such risks when they install a file or application that they believe is safe and secure. As a result, it highlights the importance of being vigilant and informed when it comes to navigating the digital world. Anyone who wants to protect their digital environment must understand how malware spreads, adopt proactive safety habits, and become aware of the dangers lurking within downloadable files.

For organisations to strengthen their cybersecurity protocols, it is imperative to have a thorough understanding of the hidden threats lurking within downloadable files. A fairly common infection vector is malicious email attachments that are sent as part of an email. There is a common practice among cybercriminals of using deceptive emails to distribute infected files disguised as regular documents, such as invoices, reports, or internal memos, that contain infected files. It has been shown that these attachments can unleash email-based viruses which will infiltrate entire company networks and spread quickly, leading to widespread disruption. There is also a threat vector that resides within seemingly harmless documents from Microsoft Office. 

Word or Excel documents, for example, may contain malicious macros—automated scripts embedded within them. When an unsuspecting recipient enables macros, these scripts silently execute, causing the system to be compromised with malware. These types of attacks are especially dangerous because they appear to be standard business communication when they are, in fact, very dangerous. 

Compressed files such as .zip and .rar also pose a significant threat. Often, threat actors hide harmful executable files within these archives, making it more difficult for them to be detected. Once those files are extracted and executed, they can instantly infect a device, granting unauthorized access, or causing further damage to the network infrastructure. 

Given that these threats are becoming increasingly sophisticated and subtlebusinesses must develop proactive strategies that can prevent them from becoming infected in the first place. An organization might be able to prevent malicious software from entering its organisation by implementing comprehensive employee training programs, strict file filtering policies, advanced threat detection tools, and regular updates to software. 

The prevention of malicious software begins with awareness and continues through rigorous cybersecurity practices and disciplined digital hygiene. There is a potential security risk associated with every file that user download from the internet, whether it is a file attached to an email, a multimedia file, or something that appears harmless like a screen saver. It is possible for familiar sources to unknowingly transmit compromised files, which is why vigilance is essential in every digital interaction. 

Here are a few critical practices that need to be followed to protect both personal devices and organisational networks. To greatly reduce the possibility of infection with harmful software, it is imperative to exercise digital caution and apply sound judgment by avoiding downloads from unknown or suspicious sources. Users are significantly less likely to become infected with dangerous software. When users initiate a download, they should use a reputable website that has a secure (HTTPS) connection and has a well-known domain name. 

Users can prevent fraud by checking the URL bar of the site to ensure its legitimacy. Moreover, fraudulent emails continue to be a very common vehicle for distributing malware. Links and attachments within unsolicited or unexpected messages should never be opened without verifying that the source is genuine. If users encounter suspicious pop-ups or warnings while browsing, they would be wise to close them by clicking the close (X) button in the browser rather than engaging with them. 

A second method of protecting against malware is to save files on people's devices before opening them, which will allow their antivirus software to scan them and alert them to any potential threats that may exist. In addition to verifying the file extension, reading user reviews and comments can provide valuable insights, as previous users may have already reported security issues or hidden dangers.

Media files, for example, should never be delivered in executable (.exe) format, because this indicates malicious intent. Although these practices are simple in nature, they nonetheless serve as a powerful means of avoiding the growing threat of a complex and constantly evolving digital environment. 

Importance of Robust Antivirus and Antimalware Software 


Luigi Oppido, a computer expert, emphasised the importance of installing reputable antispyware, antivirus and antispyware programs such as Norton, AVG, Malwarebytes, or Avast. These programs provide an important line of defence by actively scanning files as soon as they are downloaded, which provides a vital line of defence by identifying and blocking malicious software before it reaches users' computers. Antivirus applications are often integrated into operating systems, which should be enabled and monitored for any security alerts to make sure they do not get infected. 

Download from Trusted Sources 


It is important to note that files obtained exclusively from official websites of established companies, like Microsoft, are much less likely to have any malware attached to them. In contrast, downloading files from less well known or unreliable websites poses a higher threat. In addition to enhancing security, using official digital distribution platforms such as Microsoft Store or Apple App Store adds another layer of protection since these platforms thoroughly vet software before listing it. 

Verify Website Authenticity


As a result of cybercriminals creating spoofed websites using subtle variations in the domain names, users can often be deceived by spoofed sites (e.g., “microsoft.co” rather than “microsoft.com”). As a guide, users should look for signs of a trustworthy site, including a professional site design, a lack of excessive pop-ups or spam links, and the presence of SSL/TLS certificates, which can be recognised by the “https” and padlock icon on the browser. 

Awareness of Download Context 


A significant portion of the risk associated with downloading a file is determined by the source of the download. Files from dubious places, like torrent sites or adult content platforms, are often highly dangerous, and often contain malware or viruses. Files that resemble official software or originate from reputable companies are generally less dangerous.

Recognise Browser and System Warnings

It is important for users to heed warnings sent by modern browsers and antivirus programs when they are interested in downloading suspicious websites or potentially dangerous files. They must acknowledge these warnings and avoid proceeding with questionable downloads.

Check User Feedback and File Reputation


Reviews and comments left by users, whether on the hosting website or independent forums such as Reddit and Quora, can offer insights into the safety of a download. A positive reaction from multiple users will typically indicate a lower risk of malware infection. 

File Size Considerations


Several clues can be provided by the file size of a file. Usually, the size of a file is an indication of its legitimacy. An unusually small file may contain incomplete data or disguised malware. An unexpectedly large file may carry unwanted or harmful extras along with its intended purpose. 

Caution with Executable and Archive Files


It is common for malware to manifest itself in executable files (e.g., “.exe,” “.bat,” “.msi,” “.scr”) that were sourced from unknown locations. Hackers often use double extensions such as “.gif.exe” in order to trick consumers into executing harmful software. People using devices like laptops, computers, or mobiles must verify the source and digital signature of the executable file before opening it, since it grants an individual extensive control over the system. 

Digital Signatures and Licensing


Whenever users are running software on Windows, digital signatures and license warnings serve as indicators of authenticity. There is no guarantee that every executable is safe, no guarantee that every executable is intended to do harm. However, these factors can guide risk assessments before the installation of software is performed. 

The temptation to bypass security alerts, such as those that appear after a Windows update or warn that i file is potentially dangerous, arises whenever software is installed, and in the rush to do so, security warnings can be easily dismissed or disabled. However, these alerts serve a crucial function in protecting systems against potential threats. 

With Windows SmartScreen and other similar security mechanisms, users get more than just traditional antivirus software; they look at file reputations and behavioural patterns, which can often allow them to detect malware that conventional signature-based scanners may miss. As a precautionary measure, rather than switching off these protections, it is prudent to use such alerts as an opportunity to assess the file's safety using well-established verification methods rather than turning them off.

A major point to remember is that legitimate software rarely triggers multiple security warnings; encountering several warnings should be considered a clear red flag, indicating that the file may pose serious risks. To prevent infections and ensure the integrity of computer systems, one must maintain constant vigilance and respect these security layers.

Hackers Resurface with PowerSchool Data, Target Schools Again with New Threats

 


Hackers behind the 2024 cyberattack on PowerSchool have returned, this time going after individual schools. They're now threatening to leak private data unless schools pay them ransom.

PowerSchool is a major digital platform used in the education sector. It provides services to over 17,000 schools in more than 90 countries, helping around 50 million students. In December 2024, the platform suffered a major data breach where hackers managed to steal large amounts of sensitive information. Reports confirmed that the attackers accessed personal data of about 62 million students and 9 million staff members across more than 6,500 school districts in the US and Canada.

At that time, PowerSchool made the controversial decision to pay the attackers in hopes that the stolen data would be deleted. According to the company, it was not a decision taken lightly. They believed that paying the ransom was the best way to keep the private information from being made public. They were told by the hackers—and shown evidence — that the stolen data would be destroyed. However, it now appears that those promises were not kept.

Recently, schools have reported receiving direct messages from cybercriminals, warning them that the stolen data could be released if more ransom is not paid. These threats are based on the same data from the December breach, suggesting that the attackers never deleted it in the first place.

The stolen information includes highly personal details such as names, Social Security Numbers, home addresses, and even health-related information. This kind of data can be used to commit fraud or identity theft, which puts both students and staff at serious risk.

To reduce the chances of identity misuse, PowerSchool is offering two years of free credit and identity monitoring services to those affected. They also expressed regret for the situation and said they are working closely with law enforcement to handle the latest round of threats and prevent further damage.

This situation stresses upon the danger of trusting cybercriminals, even after a ransom is paid. It also shows how long the effects of a data breach can last, especially when sensitive personal information is involved.

India Faces Cyber Onslaught After Operation Sindoor Military Strikes

 

In the aftermath of India’s military action under Operation Sindoor, Pakistan responded not only with conventional threats but also with a wave of coordinated cyberattacks. While India’s defense systems effectively intercepted aerial threats like drones and missiles, a simultaneous digital assault unfolded, targeting the nation’s critical infrastructure and strategic systems. 

Reports from The Times of India indicate that the cyberattacks were focused on key defense public sector units (PSUs), their supporting MSMEs, and essential infrastructure including airports, ports, the Indian Railways, power grids, and major telecom providers such as BSNL. Additionally, digital financial platforms—ranging from UPI services to stock exchanges and mobile wallets—were also in the crosshairs. 

Sources suggest these cyber intrusions aimed to steal classified military data, disrupt daily life, and damage India’s global standing. Allegedly, the attackers sought intelligence on missile defense systems and military readiness. In retaliation, India reportedly struck back at Pakistani military infrastructure, although the cyber battlefield remains active. 

Cybersecurity expert and Interpol trainer Pendyala Krishna Shastry confirmed the attacks involved a range of methods: malware deployment, denial-of-service (DoS) strikes, phishing schemes, and website defacements. These tactics targeted multiple sectors, including finance, telecom, and public services, aiming to breach systems and sow confusion. 

Website tracking portal Zone-H recorded several government domain breaches. Notable targets included the websites of the National Institute of Water Sports (niws.nic.in) and nationaltrust.nic.in, both of which were defaced before being restored. The Central Coalfields Ltd (CCL) website also experienced a breach, displaying a message from a group calling itself “Mr Habib 404 – Pakistani Cyber Force,” declaring, “You thought you were safe, but we are here.” 

Although CCL’s Public Relations Officer Alok Gupta dismissed the breach as a technical issue with no data loss, cybersecurity experts warn that downplaying such incidents could weaken national digital defense. 

This escalation underscores how cyber warfare is now being integrated into broader military strategies. Experts argue that India must urgently strengthen its cyber defenses to address the growing threat. Priorities include deploying AI-based threat detection, reinforcing CERT-In and sector-specific Security Operation Centres (SOCs), enforcing strong cybersecurity practices across public systems, and expanding collaboration on global cyber intelligence. 

As state-sponsored attacks become more sophisticated and frequent, India’s ability to defend its digital frontier will be just as crucial as its military strength.

Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption


 

Technology has advanced dramatically in the last few decades, and data has been exchanged across devices, networks, and borders at a rapid pace. It is imperative to safeguard sensitive information today, as it has never been more important-or more complicated—than it is today. End-to-end encryption is among the most robust tools available for the purpose of safeguarding digital communication, and it ensures that data remains safe from its origin to its destination, regardless of where it was created. 

The benefits of encryption are undeniable when it comes to maintaining privacy and preventing unauthorised access, however, the process of effectively implementing such encryption presents both a practical and ethical challenge for both public organisations as well as private organisations. Several law enforcement agencies and public safety agencies are also experiencing a shift in their capabilities due to the emergence of artificial intelligence (AI). 

Artificial intelligence has access to technologies that support the solving of cases and improving operational efficiency to a much greater degree. AI has several benefits, including facial recognition, head detection, and intelligent evidence management systems. However, the increasing use of artificial intelligence also raises serious concerns about personal privacy, regulatory compliance, and possible data misuse.

A critical aspect of government and organisation adoption of these powerful technologies is striking a balance between harnessing the strengths of artificial intelligence and encryption while maintaining the commitment to public trust, privacy laws, and ethical standards. As a key pillar of modern data protection, end-to-end encryption (E2EE) has become a vital tool for safeguarding digital information. It ensures that only the intended sender and recipient can access the information being exchanged, providing a robust method of protecting digital communication.

It is highly effective for preventing unauthorised access to data by encrypting it at origin and decrypting it only at the destination, even by service providers or intermediaries who manage the data transfer infrastructure. By implementing this secure framework, information is protected from interception, manipulation, or surveillance during its transit, eliminating any potential for interception or manipulation.

A company that handles sensitive or confidential data, especially in the health, financial, or legal sectors, isn't just practising best practices when it comes to encrypting data in a secure manner. It is a strategic imperative that the company adopt this end-to-end encryption technology as soon as possible. By strengthening overall cybersecurity posture, cultivating client trust and ensuring regulatory compliance, these measures strengthen overall cybersecurity posture. 

As the implementation of E2EE technologies has become increasingly important to complying with stringent data privacy laws like the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and the General Data Protection Regulation (GDPR) in Europe, as well as other jurisdictional frameworks, it is increasingly important that the implementation of E2EE technologies is implemented. 

Since cyber threats are on the rise and are both frequent and sophisticated, the implementation of end-to-end encryption is an effective way to safeguard against information exposure in this digital age. With it, businesses can confidently manage digital communication, giving stakeholders peace of mind that their personal and professional data is protected throughout the entire process. While end-to-end encryption is widely regarded as a vital tool for safeguarding digital privacy, its increasing adoption by law enforcement agencies as well as child protection agencies is posing significant challenges to these agencies. 

There have been over 1 million attempts made by New Zealanders to access illegal online material over the past year alone, which range from child sexual abuse to extreme forms of explicit content like bestiality and necrophilia. During these efforts, 13 individuals were arrested for possessing, disseminating, or generating such content, according to the Department of Internal Affairs (DIA). The DIA has expressed concerns about the increasing difficulty in detecting and reacting to criminal activity that is being caused by encryption technologies. 

As the name implies, end-to-end encryption restricts the level of access to message content to just the sender and recipient, thus preventing third parties from monitoring harmful exchanges, including regulatory authorities. Several of these concerns were also expressed by Eleanor Parkes, National Director of End Child Prostitution and Trafficking (ECPAT), who warned that the widespread use of encryption could make it possible for illegal material to circulate undetected. 

Since digital platforms are increasingly focusing on privacy-enhanced technologies, striking a balance between individual rights and collective safety has become an issue not only for technical purposes but also for societal reasons  It has never been more clearly recognised how important it is to ensure users' privacy on the Internet, and standard encryption remains a cornerstone for the protection of their personal information across a wide array of digital services. 

In the banking industry, the healthcare industry, as well as private communications, encryption ensures the integrity and security of information that is being transmitted across networks. This form of technology is called end-to-end encryption (E2EE), which is a more advanced and more restrictive implementation of this technology. It enhances privacy while significantly restricting oversight at the same time. In contrast to traditional methods of encrypting information, E2EE allows only the sender and recipient of the message to access its content. 

As the service provider operating the platform has no power to view or intercept communications, it appears that this is the perfect solution in theory. However, the absence of oversight mechanisms poses serious risks in practice, especially when it comes to the protection of children. Platforms may inadvertently be used as a safe haven for the sharing of illegal material, including images of child sexual abuse, if they do not provide built-in safeguards or the ability to monitor content. Despite this, there remains the troubling paradox: the same technology that is designed to protect users' privacy can also shield criminals from detection, thus creating a troubling paradox. 

As digital platforms continue to place a high value on user privacy, it becomes increasingly important to explore balanced approaches that do not compromise the safety and well-being of vulnerable populations, especially children, that are also being safe. A robust Digital Child Exploitation Filtering System has been implemented by New Zealand's Department of Internal Affairs (DIA) to combat the spread of illegal child sexual abuse material online. This system has been designed to block access to websites that host content that contains child sexual abuse, even when they use end-to-end encryption as part of their encryption method.

Even though encrypted platforms do present inherent challenges, the system has proven to be an invaluable weapon in the fight against the exploitation of children online. In the last year alone, it enabled the execution of 60 search warrants and the seizure of 235 digital devices, which demonstrates how serious the issue is and how large it is. The DIA reports that investigators are increasingly encountering offenders with vast quantities of illegal material on their hands, which not only increases in quantity but also in intensity as they describe the harm they cause to society. 

According to Eleanor Parkes, National Director of End Child Prostitution and Trafficking (ECPAT), the widespread adoption of encryption is indicative of the public's growing concern over digital security. Her statement, however, was based on a recent study which revealed an alarming reality that revealed a far more distressing reality than most people know. Parkes said that young people, who are often engaged in completely normal online interactions, are particularly vulnerable to exploitation in this changing digital environment since child abuse material is alarmingly prevalent far beyond what people might believe. 

A prominent representative of the New Zealand government made a point of highlighting the fact that this is not an isolated or distant issue, but a deeply rooted problem that requires urgent attention and collective responsibility within the country as well as internationally. As technology continues to evolve at an exponential rate, it becomes increasingly important to be sure that, particularly in sensitive areas like child protection, both legally sound and responsible. As with all technological innovations, these tools must be implemented within a clearly defined legislative framework which prioritises privacy while enabling effective intervention within the context of an existing legislative framework.

To detect child sexual abuse material, safeguarding technologies should be used exclusively for that purpose, with the intent of identifying and eliminating content that is clearly harmful and unacceptable. Law enforcement agencies that rely on artificial intelligence-driven systems, such as biometric analysis and head recognition systems, need to follow strict legal frameworks to ensure compliance with complex legal frameworks. As the General Data Protection Regulation (GDPR) is established in the European Union, and the California Consumer Privacy Act (CCPA) is established in the United States, there is a clear understanding of how to handle, consent to, and disclose data. 

The use of biometric data is also tightly regulated, as legislation such as Illinois' Biometric Information Privacy Act (BIPA) imposes very strict limitations on how this data can be used. Increasingly, AI governance policies are being developed at both the national and regional levels, reinforcing the importance of ethical, transparent, and accountable technology use. Noncompliance not only results in legal repercussions, but it also threatens to undermine public trust, which is essential for successfully integrating AI into public safety initiatives. 

The future will require striking a delicate balance between innovation and regulation, ensuring that technology empowers protective efforts while protecting fundamental rights in the meantime. For all parties involved—policymakers, technology developers, law enforcement, as well as advocacy organisations—to address the complex interplay between safeguarding privacy and ensuring child protection, they must come together and develop innovative, forward-looking approaches. The importance of moving beyond the viewpoint of privacy and safety as opposing priorities must be underscored to foster innovations that learn from the past and build strong ethical protections into the core of their designs. 

The steps that must be taken to ensure privacy-conscious technology is developed that can detect harmful content without compromising user confidentiality, that secure and transparent reporting channels are established within encrypted platforms, and that international cooperation is enhanced to combat exploitation effectively and respect data sovereignty at the same time. Further, industry transparency must be promoted through independent oversight and accountability mechanisms to maintain public trust and validate the integrity of these protective measures. 

Regulatory frameworks and technological solutions should be adapted rapidly to safeguard vulnerable populations without sacrificing fundamental rights to keep pace with the rapid evolution of the digital landscape. As the world becomes increasingly interconnected, technology will only be able to fulfil its promise as a force for good if it is properly balanced, ethically robust, and proactive in its approach in terms of the protection of children and ensuring privacy rights for everyone.

Google to Pay Texas $1.4 Billion For Collecting Personal Data

 

The state of Texas has declared victory after reaching a $1 billion-plus settlement from Google parent firm Alphabet over charges that it illegally tracked user activity and collected private data. 

Texas Attorney General Ken Paxton announced the state's highest sanctions to date against the tech behemoth for how it manages the data that people generate when they use Google and other Alphabet services. 

“For years, Google secretly tracked people’s movements, private searches, and even their voiceprints and facial geometry through their products and services. I fought back and won,” Paxton noted in a May 9 statement announcing the settlement.

“This $1.375 billion settlement is a major win for Texans’ privacy and tells companies that they will pay for abusing our trust. I will always protect Texans by stopping Big Tech’s attempts to make a profit by selling away our rights and freedoms.”

The dispute dates back to 2022, when the Texas Attorney General's Office filed a complaint against Google and Alphabet, saying that the firm was illegally tracking activities, including Incognito searches and geolocation. The state also claimed that Google and Alphabet acquired biometric information from consumers without their knowledge or consent. 

According to Paxton's office, the Texas settlement is by far the highest individual penalty imposed on Google for alleged user privacy violations and data collecting, with the previous high being a $341 million settlement with a coalition of 41 states in a collective action. 

The AG's office declined to explain how the funds will be used. However, the state maintains a transparency webpage that details the programs it funds through penalties. The settlement is not the first time Google has encountered regulatory issues in the Lone Star State. 

The company previously agreed to pay two separate penalties of $8 million and $700 million in response to claims that it used deceptive marketing techniques and violated anti-competitive laws. 

Texas also went after other tech behemoths, securing a $1.4 billion settlement from Facebook parent firm Meta over allegations that it misused data and misled its customers about its data gathering and retention practices. 

The punitive restrictions are not uncommon in Texas, which has a long history of favouring and protecting major firms through legislation and legal policy. Larger states, such as Texas, can also have an impact on national policy and company decisions due to their population size.

Quantum Computers Might Put Satellites at Risk — Here's What That Means for Us

 



Satellites play a quiet but essential role in our everyday routines. From helping airplanes land safely to guiding us with GPS, giving us internet access, and helping during emergencies — satellites support many things we rely on. But this system could be at risk due to a new kind of technology: quantum computers.

Quantum computers are not just upgraded versions of the computers we use today. They follow a completely different set of rules, based on quantum physics. Even though they’re still in development, researchers believe that once these machines are fully ready, they will be able to solve problems regular computers can’t handle — at much faster speeds.

For example, some tasks that would take current computers millions of years could be completed in minutes by a quantum computer. While we don’t know exactly when they will become practical, scientists are making real progress in building and improving them.

These powerful machines could bring huge benefits in science, medicine, and climate research. They could help us design better medicines, understand future climate changes, or create new materials. But along with these benefits, there’s also a serious danger — they could break the codes that protect our digital systems.

Right now, things like satellite signals, online banking, and private messages are protected by encryption. These protections are based on difficult math problems that regular computers can't easily solve. But quantum computers could solve them quickly, putting private and secure data at risk.

Satellites might seem untouchable because they’re far above the Earth. But with technology becoming cheaper and more available, skilled hackers or rival nations could try to intercept their signals or send fake instructions. Attacks like these are already possible today.

That’s why experts around the world are working on a new type of digital protection, called post-quantum cryptography. These advanced systems are being developed to resist attacks from quantum computers. Some governments, like in the UK, have already set goals to switch all systems to this stronger security by 2035.

Unlike phones or laptops, satellites can’t be easily updated once they’re in space. That’s why it’s important for all new satellites to be built with quantum-safe protections from the beginning. This will also help as more satellites start working together in groups to support different services.

If we don’t act soon, future quantum computers might be able to read or change the data that satellites send. This could interrupt GPS, affect emergency responses, or even create security threats for entire countries.

To stop this from happening, scientists, engineers, governments, and global organizations must work together. The good news is that steps are already being taken. By preparing now, we can make sure our satellite systems stay secure in the quantum future.