Achive.php cyber news Archives - Page 4 of 7 - The Cyber Shark

OpenAI Acquires Jony Ive’s AI Startup io for $6.4 Billion in Major Hardware Push

OpenAI

OpenAI is acquiring Jony Ive’s AI device startup, io, for $6.4 billion in an all-equity deal, marking its major push into hardware. I’ve will lead design efforts at both OpenAI and io, while io integrates with OpenAI’s San Francisco teams. On May 21, 2025, OpenAI announced that it would acquire Jony Ive’s AI device startup, io, for roughly $6.4 billion in an all-equity transaction, solidifying the AI company’s entry into the hardware market. The company said in a statement that Ive will be taking on “deep creative and design responsibilities across OpenAI and io.”  Ive and LoveFrom, his “creative collective,” will continue to operate independently. According to OpenAI, while io will be coming in-house. Ive and OpenAI CEO Sam Altman wrote in a blog post on May 21 that Ive launched io a year ago with the help of Apple alums Scott Cannon, Tang Tan, and Evans Hankey, who temporarily filled Ive’s position at Apple after he left. In order to collaborate more closely with the research, engineering, and product teams in San Francisco, the io team—which is dedicated to creating products that inspire, empower, and enable—will now join with OpenAI, according to the post. OpenAI, which already controls 23% of the business, stated that it is paying $5 billion in the deal. Ive is “the greatest designer in the world,” according to Altman’s post on X. This is by far OpenAI’s biggest acquisition to date, and it comes weeks after the business agreed to pay $3 billion to acquire the AI-assisted coding tool Windsurf. Before that, in 2024, OpenAI paid an unknown amount to purchase the analytics database startup Rockset. To launch LoveFrom, Ive declared in 2019 that he was leaving Apple, where he had served as chief design officer for several years. In 2020, Airbnb announced that I had been advising the business on hiring and upcoming features. Last year, the New York Times revealed that LoveFrom’s designers were working on projects for Christie’s, Airbnb, and Ferrari at the time, and that the company’s clients pay it up to $200 million annually. Ive and designer Marc Newson formed LoveFrom, according to the company’s website, but it makes no mention of io or what the business does. Apple’s most recognisable products, such as the iPod, iPhone, iPad, and MacBook Air, were all designed by Ive. Additionally, he contributed to the design of Apple Park, the company’s new Cupertino headquarters, which was started in 2004 and formally opened in 2019. As competitors like Google, Anthropic, and Elon Musk’s xAI are making significant investments and frequently releasing new products, OpenAI, which was recently valued at $300 billion in a funding round spearheaded by Soft Bank, is scrambling to remain ahead of the competition in the generative AI space. Strengthening its hardware operations is one way to keep ahead of the competition. To advance its hardware objectives, OpenAI in November named the former leader of Meta’s Orion augmented reality glasses project to lead its robotics and consumer hardware initiatives. The position would “initially focus on OpenAI’s robotics work and partnerships to help bring AI into the physical world and unlock its benefits for humanity,” according to a statement made at the time by Caitlin “CK” Kalinowski. Additionally, in November, OpenAI invested $400 million at a valuation of $2.4 billion in Physical Intelligence, a robot company based in San Francisco.  Among the other investors was Amazon founder Jeff Bezos. By creating extensive AI models and algorithms to drive robots, the business aims to “bring general-purpose AI into the physical world,” according to its website.

Massive Facebook Data Leak Exposes 1.2 Billion User Records, Hacker Claims

Facebook Data

Facebook Data: A hacker claims to have leaked data from 1.2 billion Facebook users, including emails, phone numbers, and more. Researchers verified part of the sample, raising concerns about Meta’s data security and ongoing scraping issues. In response to Cyber News, Facebook’s parent company, Meta, sent a brief message along with a link to a newsroom article from four years ago titled “How we combat scraping.” “This assertion is not new. A Meta representative stated, “We revealed this years ago and have since taken action to stop such events from occurring. Meanwhile, looked into a data sample that had information on 100,000 distinct Facebook user records that the attackers had added to the post. The data seems valid based on the contents of the sample rather than the entire dataset. The team claims that the dataset consists of: User IDs Names Email addresses Usernames Phone numbers Locations Birthdays Genders Researchers advise exercising caution regarding the veracity of the attacker’s claims regarding “1.2 billion Facebook user records,” despite the fact that they are remarkable. For starters, this is only the second post the attackers have ever made that contains alleged Facebook records that were scraped. Although the quantity was substantially smaller, data purportedly collected from Facebook was also included in another attacker’s post. Researchers speculated that after publishing one post, they were able to extract further data to reach 1.2 billion entries. The social networking site would flag another case of user data being scraped in bulk if the Facebook data scrape were verified. According to the team, this calls into doubt the company’s stance on the protection of consumers’ personal information. Recurring incidents indicate a tendency toward reactive security measures as opposed to proactive ones, especially when it comes to safeguarding critical yet publicly accessible data. Millions may be vulnerable to phishing, scams, identity theft, and long-term privacy problems due to the absence of more robust protections and transparency, the researchers stated. A dataset of that size can be used in a variety of ways by threat actors since it makes it simple for hackers to automate attacks, releasing hordes of bots that target each user in the dataset with minimal human intervention. Since malicious actors are aware that the email addresses in the dataset belong to Facebook members, they can utilise one of the several Facebook phishing methods to target Facebook users. Threat actors frequently try to use APIs for malicious ends. Attackers targeted Shopify, GoDaddy, Wix, and OpenAI’s APIs earlier this year. Actors with financial motivations frequently try to misuse the same method to gain access to cryptocurrency wallets. “A pattern of reactive rather than proactive security measures is evident in repeated incidents, especially when it comes to safeguarding sensitive but publicly visible data.” Since APIs enable communication between various services, the majority of well-known services would not be possible without them. Attackers, however, manage to leverage lawful APIs for malicious ends, such as retrieving significantly more data than the software applications were designed to do. Facebook data scraping is not unheard of. For instance, Meta acknowledged last year that it had used publicly available Facebook and Instagram data to train its AI virtual assistant. In 2021, however, a different hacker shared details about more than 500 million Facebook users, including locations and phone numbers. The Irish Data Protection Commission (DPC), the European Union’s top data privacy body, fined Meta €265 million ($266 million) for the leak.

Google Experiments with Gemini AI to Help Users Get Instant App Insights on the Play Store

Gemini AI

Gemini AI: Google is testing a new AI feature on the Play Store called “Ask Play about this app,” allowing users to ask app-related questions and receive answers powered by Gemini. Currently, the feature is available to a limited number of users and only for select popular apps. In the Play Store, Google has started testing a new AI-powered feature that allows customers can ask questions about apps and get replies from Google’s Gemini. A new “Ask Play about this app” section has been showing up for some users on the information pages of specific apps, even though the functionality has not been publicised. This suggests that it is presently undergoing restricted testing. The “Ask Play about this app” option on Google: What’s new? The feature adds a new section called “Ask Play about this app” to app listing pages. A text input form and some pre-made sample queries pertinent to the particular app being examined are included. Questions like “How do I change my username?” along with “What do people like most about this app?” To get answers, users can either tap on one of the suggested questions or enter their own. Answers show up right beneath the text area, and as the sample queries change dynamically depending on past exchanges, you can ask follow-up questions. With the help of this conversational interface, consumers should find it simpler to obtain comprehensive information without having to read through app descriptions or reviews. The feature is probably driven by one of Google’s Gemini AI models, as seen by the section’s notable Gemini star emblem. Only a small number of users seem to have access to the feature thus far. Business Standard evaluated three Android smartphones, but only one of them had the “Ask Play about this app” feature.  Additionally, it only appears for a select few popular apps, such as WhatsApp, Spotify, X (formerly Twitter), Uber, and a few others.

OLX Fraud: The Hidden Threat in Online Bargains

OLX Fraud

OLX Fraud: OLX is one of the most popular websites to buy and sell used items. It is now the world’s most popular digital marketplace, with over 300 million users every month. However, fraud and scam incidents have increased along with its popularity. Cybercriminals deceive individuals into paying money by using fictitious postings and identities. The specifics of OLX scams are examined in this article, along with self-defence tips. OLX fraud: what is it? The term “OLX Fraud” describes a range of untrustworthy activities that happen on the OLX platform and related online classified sites, such as Click India and Quikr. The sale of fictitious goods like cars, bikes, furniture, and home electronics is the most prevalent scam.  This is how it usually goes: A scammer publishes a phoney advertisement offering a product at an oddly cheap cost. The advertisement makes use of photographs and descriptions that have been taken from real listings. The scammer explains the necessity to mail the items by claiming to be based in a foreign state or be a member of the army when a buyer contacts them. To start shipping, the con artist then asks for an upfront payment. The fraudster vanishes as soon as the money is transferred through internet banking or UPI. Due to the allure of a fantastic deal, many customers fall victim to these well-planned scams despite OLX’s cautions and notifications. Who Is Responsible for OLX Frauds? OLX frauds are usually committed by people or organisations using fictitious identities. They frequently: To gain trust, pretend to be army men. To seem legitimate, use stolen photos and phoney identification. Function beyond national or even global boundaries. To evade detection, these scammers frequently change their bank accounts and phone numbers. They occasionally participate in broader criminal networks that engage in a variety of cybercrimes. On the other hand, victims might be anyone from tech-savvy children to senior citizens, with an increasing number of incidents involving older people who are less knowledgeable about digital safety procedures. When Do Frauds on OLX Happen?  Although OLX frauds can occur at any time, they frequently increase during specific times: Holiday seasons, when bargains are sought after. Sales periods are at the end of the month or year. Lockdowns and pandemics, when it is less likely that physical verification will occur. Usually, the deception happens during a brief period of interaction. Scammers frequently create a sense of urgency by demanding cash and action right once. Where Do OLX Frauds Take Place? These frauds are not limited by geography. However, there is evidence that online shopping is more prevalent in urban areas. Major cities like Bengaluru, Mumbai, Delhi, Hyderabad, and Chennai are the places where cases are most commonly recorded. Internet classifieds sites like: Websites like Olx.com, Quikr.com, and Click India are commonly used by scammers, and fraud-related behaviour can migrate to social networking sites that advertise similar goods. What Leads to Fraud on OLX?  The primary reasons why OLX frauds occur so frequently are as follows: Lack of Awareness: Many consumers are unaware of how these scams operate. Simplicity of Anonymity: Scammers can easily build fake profiles. The Allure of a Bargain: Low prices inspire consumers to take quick action. Lack of Regulations: Online classified ads are not heavily regulated. Delayed Legal Action: It may be challenging to find and capture internet offenders. As cybercrimes get more sophisticated, users need to be better equipped with knowledge and defence tools. How Can OLX Fraud Be Spotted and Avoided? The following are a few warning signs and precautions: Warning Signs: Exceptionally affordable prices. The need to make an upfront payment. The seller states that they are stationed abroad or in the military. Asks for payment by QR codes, internet banking, or UPI. Refusal to allow product inspection or to meet in person.  Advice for Prevention: Always demand that the item be inspected before payment is made. Never divulge private banking information. Steer clear of transactions that call for scanning QR codes. Instead of using third-party messengers, use the OLX chat feature. Check for reviews and validate the seller’s profile. Where and How Can I Report Cyber Fraud?  Take these actions if you or someone you know has fallen victim to OLX fraud: Keep records on everything: Take screenshots of the product listing, the payment information, and the chat. Report to Cybercrime Authorities: To submit an online report, go to https://cybercrime.gov.in. For prompt assistance, dial the cybercrime helpline at 1930. Go to the police station or cybercrime cell that is closest to you. Use ISAC and T4C Assistance: Account freezing assistance is available from the Telangana Cyber Crimes Coordination Centre (T4C). To obtain immediate assistance, utilise the ISAC Cop Connect App. Real Case Example A Bengaluru man lost more than Rs. 2 lakh in an OLX QR code fraud in September 2024. The scammer pretended to be a buyer and deceived the victim into scanning a QR code to obtain money instead of sending it. Rather, money was taken out of the victim’s account. This example is a clear warning that cunning tactics can fool even tech-savvy people. About OLX: Company Overview Full Name:                Online exchange Founded:                  2006 Headquarters:          Amsterdam, Netherlands Founders:                 Alec Oxenford and Fabrice Grinda Parent Company:     Prosus (a division of Naspers) CEO (India):             Amit Kumar OLX India CIN:         U74900HR2009PTC053732 Employees:              2,500 globally Revenue:                  $2.98 billion (2022) Presence:                 Over 30 countries The Reaction of OLX to Fraud  OLX has put in place several security procedures, including: Verification of buyers and sellers. Safe chat capabilities. Reminders and cautions against paying in advance. Instruments for reporting questionable postings.  The best defence is still user vigilance despite them. If a deal seems too good

Mumbai News: Man Arrested In ₹67 Lakh Cyber Fraud Targeting Elderly Sisters; Hunt on for Mastermind

Cyber Fraud

Mumbai Police arrested Mohit Bhojraj in a ₹67 lakh cyber fraud case targeting two elderly sisters, with the mastermind Salid Mohammed Shaikh still at large. The victims were lured through a fake investment scheme on WhatsApp, promising high returns. A man from Dahisar has been taken into custody by the Mumbai Police’s South Cyber Cell about a ₹67 lakh cyber scam involving two elderly sisters. Mohit Akash Bhojraj has been recognised as the offender who was apprehended. Officials claim that Mohit maintained continuous communication with Salid Mohammed Shaikh, a well-known cyber fraudster who lives in Bengaluru, Karnataka, and is currently a sought-after suspect in the investigation. According to investigations, Mohit gave Shaikh access to 19 bank accounts, which were purportedly used to embezzle the stolen money. The cyber cell’s investigation to find the fugitive mastermind and follow the cash trail is still ongoing. The complaint claims that after investing in a financing company, the victims, two sisters living in Girgaon with their mother, were joined to a WhatsApp group in January 2025. A lady named Shruti Baheti ran the organisation and frequently shared information about profitable investment possibilities. Shruti posted conversation logs and screenshots purporting to show off earnings from prior investments in an attempt to win members’ trust. With the promise of large returns, Shruti persuaded one of the sisters to participate in a “block share deal” via direct messaging on January 21. The woman made a sizable investment after opening an account with the finance company. Following the first profits, her sister joined the organisation and invested as well. The sisters contributed a total of 67.15 lakh rupees. Their investment portfolio was reported to have increased to ₹1.88 crore shortly after. However, the transaction failed when they tried to withdraw ₹50 lakh. When asked, Shruti stated that before the money could be released, a tax payment was necessary. The sisters realized they had been duped at that point and filed a formal complaint. Mohit Bhojraj has been taken into custody by the cyber cell, which is also actively pursuing the other defendants, including the mastermind Salid Mohammed Shaikh. Investigations are still under progress.

New e-Zero FIR system will expedite the capture of cybercriminals: Amit Shah

e-Zero FIR system

Union Home Minister Amit Shah launched the e-Zero FIR system to auto-convert major cybercrime complaints into FIRs, starting with a ₹10 lakh threshold in Delhi. The initiative, led by the I4C, aims to accelerate cybercriminal tracking and will soon expand nationwide. On May 19, 2025, Union Home Minister Amit Shah announced that the Indian Cybercrime Coordination Centre (I4C) of the Ministry of Home Affairs had started the new e-Zero FIR project to catch cybercriminals faster than ever before. According to him, the new mechanism, which was introduced as a trial project for Delhi, will automatically convert cyber financial crimes reported on the National Cybercrime Reporting Portal (NCRP) and hotline number 1930 to FIRs, first surpassing the threshold of Rs 10 lakh. The effort will soon be expanded throughout the entire country, according to the minister. “To apprehend any criminal with previously unheard-of speed, the MHA’s Indian Cybercrime Coordination Centre (I4C) launched the new e-Zero FIR scheme. “The new system, which was first implemented as a pilot project for Delhi, will automatically convert cyber financial offences reported to the NCRP or 1930 to FIRs, initially exceeding the 10 lakh threshold limit. The new technology, which will speed up investigations and crack down on cybercriminals, will soon be available to the entire nation,” Shah wrote on ‘X’. The home minister said the Modi government is bolstering the cybersecurity grid to build a cyber-secure Bharat. The I4C was established by the New Delhi MHA to provide law enforcement agencies with a framework and setting for coordinating and fighting cybercrime in its entirety. It is intended that the I4C will serve as the focal point for reducing cybercrime in the nation.

Govt. Mulls Ban on Influencers Spreading Anti-National Content Post-Pahalgam Attack

social media influencers

The government may ban social media influencers and platforms spreading anti-national content after the Pahalgam attack. The IT Committee has demanded action reports from ministries by May 8 amid rising tensions and UN calls for restraint. Following the terror assault in Pahalgam on April 22, 2025, the Parliamentary Standing Committee on Information Technology has voiced grave concerns about the role of specific social media platforms and influencers. The committee pointed out that some of these organisations seem to be working against the nation’s interests and may be encouraging violence with their content. The committee has urged the Ministry of Electronics and Information Technology and the Ministry of Information and Broadcasting to act quickly and decisively in response to these findings. The Information Technology Act of 2000 and the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules of 2021 specifically seek information about the steps being considered to outlaw such platforms and accounts. Following the terror assault in Pahalgam on April 22, 2025, the Parliamentary Standing Committee on Information Technology has voiced grave concerns about the role of specific social media platforms and influencers. The committee has given the ministries until May 8, 2025, to provide a thorough report detailing the actions they have taken or plan to take to stop the spread of dangerous content. This action demonstrates the government’s will to prevent incitement and actions that could jeopardise national security from taking place on digital platforms. Section 69A of the IT Act, 2000, gives authorities the authority to ban or remove content that endangers public order, security, sovereignty, or goodwill with other countries. According to the 2021 IT Rules, platforms must designate grievance officers, remove illegal content as soon as possible, and apply due care in content management. Five extremists targeted visitors in the Baisaran Valley with the Pahalgam incident, which has greatly increased tensions in the area and drawn global criticism. Additionally, the attack has led to a rise in anti-Kashmiri and Islamophobic attitudes throughout India, with social media being a key platform for the spread of divisive messages. UN chief asks India, Pakistan to step back from the brink Concerned that India-Pakistan tensions were “at their highest in years,” UN Secretary-General António Guterres urged “maximum restraint and stepping back from the brink” on May 5, 2025. “Make no mistake: A military solution is no solution,” Guterres stated in a succinct declaration. Guterres offered both governments his “good offices” in the interest of peace. “The United Nations stands ready to support any initiative that promotes de-escalation, diplomacy, and a renewed commitment to peace,” he stated.

Madras University Cyber Forensics Course Marks 20 Years of Innovation

Madras University's

Madras University’s Cyber Forensics course, launched in 2004, has evolved into a postgraduate program producing over 750 graduates with strong industry placements. Recognized as a Centre of Excellence, it offers cutting-edge cybersecurity and digital forensics training. According to the previous department head and course founder-director R. Thilagaraj, the department developed a postgraduate diploma in cyber forensics and information security for police, courts, and business executives in 2004. Because of the positive reaction, it was changed to a postgraduate degree course the following year. Cybersecurity was still in its infancy. He remembers, “Some of the organizations we visited asked why they needed it.” When the first group graduated in 2007, employers were reluctant to hire them. According to S. Latha, the founder of the course and current director of the Centre for Cyber Forensics and Information Security, the first group of alumni is currently working for multinational banks. Up to 750 students have already received their diplomas. With a government grant of ₹1 crore, the centre was elevated as a Centre of Excellence in 2009, and she adds that it became an independent department with the then-Governor-Chancellor’s approval. The cost of tuition is ₹8,500. The course covers the most recent developments in the fields of digital forensics, information security audit, cyber criminology, and information security. Students have benefited from a course that the University of Madras‘ criminology department introduced 20 years ago. According to the previous department head and course founder-director R. Thilagaraj, the department developed a postgraduate diploma in cyber forensics and information security for police, courts, and business executives in 2004. Because of the positive reaction, it was changed to a postgraduate degree course the following year. Cybersecurity was still in its infancy. He remembers, “Some of the organisations we visited asked why they needed it.” When the first group graduated in 2007, employers were reluctant to hire them. According to Latha, the founder and coordinator of the course and current director of the Centre for Cyber Forensics and Information Security, the first group of graduates is currently working for multinational banks. Up to 750 students have already received their diplomas. With a government grant of ₹1 crore, the centre was elevated as a Centre of Excellence in 2009, and she adds that it became an independent department with the then-Governor-Chancellor’s approval. The cost of tuition is ₹8,500. The course covers the most recent developments in the fields of digital forensics, information security audit, cyber criminology, and information security. “Our alumni are placed in Google, Ernst and Young, Deloitte, HCL, Infosys, and even government agencies.” “The course offers 100% placement in corporate houses, software companies, information security auditing firms, banks, telecom industries, and financial institutions,” Ms. Latha explains. A cyber forensics lab has also been established by the department. Students conduct research in important fields of digital forensics and cybersecurity. As part of the RUSA Arumbu project, a student was recently given seed money to verify the legitimacy of AI-generated images, audio, and video. According to Ms. Latha, “a lot of students have worked in identifying ransomware attacks, phishing links, and fake profiles.” In addition to helping with placement, industry professionals who also teach classes created the syllabus. “The government should consider hiring at least a percentage of police with a master’s degree in cyber forensics and information security in the technical wing, as cybercrimes are on the rise and the majority of cases in the future are likely to be related to cybercrime,” she continues. Students who joined the program after graduating with a BCA, such as Vikram T, Farheen Fathima, and Mohamed Thalal, are now guaranteed a respectable compensation package for their campus placement. Every semester, the students work on a project, and the final dissertation they produce is based on actual business issues. According to guest faculty member C. Vishnupriya, having professionals from the industry on the team aids students in comprehending real-world issues. She adds, “They also value it when students solve problems.”

High-Tech Hoax: Fraudster Steals ₹1.10 Cr by Using a WhatsApp Profile Picture

WhatsApp

A fraudster impersonated a company chairman on WhatsApp using a fake profile picture and tricked a Chief Revenue Officer into transferring ₹1.10 crore. Authorities urge extra caution with financial requests over messaging apps and have launched an investigation under cybercrime laws. In a startling cyber fraud case, a con artist acting as the business’s chairman on WhatsApp scammed a 51-year-old Chief Revenue Officer (CRO) of a private company in Dharashiv out of over ₹1.10 crore. On April 15, a person posing as the company’s chairman sent the victim a WhatsApp message, according to police officials. The chairman’s photo was used as the profile picture, so even though the message was from an unknown number, the CRO thought it was authentic. Citing the new number as his updated contact, the sender requested that he save it. The impostor got in touch with the CRO once more two days later and asked about the balance of the company’s account. To further win his faith, the scammer pretended to be meeting with government representatives and urgently asked for ₹1.10 crore to be sent for a project-related expense. After receiving the bank account information, the CRO made the transfer since they thought it was a legitimate request. When the company’s accountant told the actual chairman about the transaction, the fraud was exposed. The chairman was shocked and explained that he had not asked for such a transfer. When the CRO discovered the fraud, he contacted the bank right away and then informed the police. Along with pertinent provisions of the Information Technology Act, such as Section 66C (identity theft) and Section 66D (cheating by personation utilising computer resources), a cheating case has been filed under Section 318 of the Bharatiya Nyaya Sanhita. To find the fraudster and retrieve the money that was sent, investigations are being conducted. The public and business professionals have once again been advised by authorities to handle financial transactions with extreme caution and to double-check requests, particularly those made over messaging platforms.