<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security - Latest News &amp; Updates</title>
	<atom:link href="https://www.thetechoutlook.com/category/news/technology/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thetechoutlook.com/category/news/security/</link>
	<description>Daily Tech News, Interviews, Reviews and Updates</description>
	<lastBuildDate>Mon, 06 Apr 2026 09:47:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.thetechoutlook.com/wp-content/uploads/2019/09/cropped-favicon-1-150x150.png</url>
	<title>Security - Latest News &amp; Updates</title>
	<link>https://www.thetechoutlook.com/category/news/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Delhi Police busted a major Rs 300 Crore International Cyber Fraud Syndicate; Key accused arrested</title>
		<link>https://www.thetechoutlook.com/news/security/delhi-police-busted-a-major-rs-300-crore-international-cyber-fraud-syndicate-key-accused-arrested/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 09:47:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Delhi Police]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=251274</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Hackers Use Fraudulent Windows Updates to Distribute RATs to The Russian Government Entities" decoding="async" fetchpriority="high" srcset="https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-768x432.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div>
<p>Delhi Police has busted a major international cyber fraud syndicate that involved over 2,000 complaints and scams worth over Rs 300 crore. It is reported that the police have arrested the alleged mastermind behind this syndicate and 10 others. This ongoing fraud came into light as a city resident, Sultan, filed a complaint alleging that [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/delhi-police-busted-a-major-rs-300-crore-international-cyber-fraud-syndicate-key-accused-arrested/">Delhi Police busted a major Rs 300 Crore International Cyber Fraud Syndicate; Key accused arrested</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Hackers Use Fraudulent Windows Updates to Distribute RATs to The Russian Government Entities" decoding="async" srcset="https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2022/05/Untitled-design-152-768x432.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p>Delhi Police has busted a major international cyber fraud syndicate that involved over 2,000 complaints and scams worth over Rs 300 crore. It is reported that the police have arrested the alleged mastermind behind this syndicate and 10 others.</p>
<p>This ongoing fraud came into light as a city resident, Sultan, filed a complaint alleging that he was duped of Rs 31.45 lakh after being lured into an investment scheme.</p>
<h2>What was found in the investigation?</h2>
<p>The police started an investigation, and it was found that the victim was persuaded to download a fake trading application and invest money with promises of high returns. But when he tried to withdraw the profits, the app stopped working, and the associated group became inaccessible.</p>
<p>During the investigation, police uncovered a well-organised network operating across multiple states with links to international cyber fraud syndicates, particularly in Cambodia.</p>
<p>The police said in a statement, “We have so far identified over 260 bank accounts linked to more than 100 fictitious companies used to channel the proceeds of crime. The total number of complaints linked to the syndicate stands at 2,567.”</p>
<p>According to Deputy Commissioner of Police (Crime Branch), Aditya Gautam, the key accused, Karan Kajaria, was arrested at Kolkata airport on April 3 after a Look Out Circular was issued against him. He was then brought to Delhi for further investigation.</p>
<p>Reportedly, the syndicate created fake investment platforms and messaging groups to lure victims. They used mule bank accounts arranged through intermediaries and deployed malicious apps to capture sensitive banking details, including OTPs. The money collected with this scam was routed through a complex network of bank accounts and shell companies to obscure the trail.</p>
<p>In this scam, Kajaria is said to be the main coordinator who maintained direct links with foreign-based operators and facilitated the movement of funds through cryptocurrency channels. As per the DCP, he was involved in procuring mule bank accounts and sharing sensitive details via encrypted social media platforms, while he also travelled abroad frequently, supposedly to strengthen links with overseas fraud networks.</p>
<p>It is revealed that Kajaria tried to evade his arrest by staying abroad, but technical surveillance helped investigators trace the network to Kolkata, where several bank accounts and shell entities were operating. And when Kajaria arrived at Kolkata airport, he was arrested.</p>
<p>According to the DCP, during interrogation, Kajaria has allegedly confessed to his involvement in the syndicate. Meanwhile, accounts linked to his network were associated with more than 2,500 registered complaints on the National Cybercrime Reporting Portal and the fraud of Rs 300 crore.</p>
<p>This syndicate was active for the past 4-5 years and operated across multiple states. Apart from Kajaria, 10 other accused have been arrested in the case so far. The police have also recovered 48 mobile phones, 258 SIM cards, multiple ATM cards and cheque books, 4 laptops, and several banking and KYC documents. The investigation is still ongoing to catch the other members of this syndicate.</p>
<p><a href="https://t.co/mSq44KTeKQ">Via</a>.</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/delhi-police-busted-a-major-rs-300-crore-international-cyber-fraud-syndicate-key-accused-arrested/">Delhi Police busted a major Rs 300 Crore International Cyber Fraud Syndicate; Key accused arrested</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware! Fake LPG Payment and KYC update messages with malicious links being circulated online</title>
		<link>https://www.thetechoutlook.com/news/security/beware-fake-lpg-payment-and-kyc-update-messages-with-malicious-links-being-circulated-online/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 06:33:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Web & Social Media]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Indian bank]]></category>
		<category><![CDATA[LPG]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=251176</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-150x84.jpg 150w" sizes="(max-width: 1200px) 100vw, 1200px" /></div>
<p>The rumours of an LPG shortage have been circulating in India for a long time now, increasing users&#8217; fear and concern. Well, scammers are now exploiting this fear among Indian users by circulating malicious messages and links online, posing as LPG booking and KYC update messages. There have been numerous cases reported where Indian LPG [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/beware-fake-lpg-payment-and-kyc-update-messages-with-malicious-links-being-circulated-online/">Beware! Fake LPG Payment and KYC update messages with malicious links being circulated online</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/04/LPG_scam1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>The rumours of an LPG shortage have been circulating in India for a long time now, increasing users&#8217; fear and concern. Well, scammers are now exploiting this fear among Indian users by circulating malicious messages and links online, posing as LPG booking and KYC update messages.</p>
<p>There have been numerous cases reported where Indian LPG users have been scammed by clicking on malicious links and downloading APK files disguised as LPG service updates/ LPG booking/ KYC update messages.</p>
<p>Users on X, Facebook and other social media platforms have also reported receiving bulk SMS or WhatsApp messages from suspicious sender IDs such as LPG, Indane, and LPG Fast. It also <a href="https://www.cnbctv18.com/india/scam-links-for-lpg-bookings-delhi-police-cautions-against-fraud-amid-supply-squeeze-ws-el-19869801.htm">reported</a> that the scammers have developed fake websites using the names of LPG companies.</p>
<p>Police officials in various states have <a href="https://timesofindia.indiatimes.com/city/jaipur/cops-issue-advisory-against-cyber-fraud-over-lpg-crisis/articleshow/129687077.cms">already issued warnings</a> regarding the increase in such cases. The <a href="https://twitter.com/myindianbank/status/2034608329041838403?s=48&amp;t=OS2RsrQDiIOIXojKwTalVQ">Indian Bank</a> has also urged users not to click on unknown links and share personal information. Users are advised to always verify such messages and links through official channels before proceeding with them, in order to protect their bank accounts from fraud.</p>
<p>If you have received any such suspicious message or link, then you can report it immediately to cyber fraud by dialling 1930 or visiting cybercrime.gov.in.</p>
<p>Meanwhile, authorities have already begun issuing alerts across social media platforms and have also deployed personnel in residential areas to spread awareness regarding these scams.</p>
<p>Stay alert and stay safe!!</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/beware-fake-lpg-payment-and-kyc-update-messages-with-malicious-links-being-circulated-online/">Beware! Fake LPG Payment and KYC update messages with malicious links being circulated online</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>RBI mandates two-factor authentication for all digital payments from 1st April 2026</title>
		<link>https://www.thetechoutlook.com/news/security/rbi-mandates-two-factor-authentication-for-all-digital-payments-from-1st-april-2026/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 11:23:51 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[RBI]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=250513</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Last year, the RBI issued its guidelines on the authentication mechanism framework for digital payment transaction authentication. As per the guidelines, it was stated that two-factor authentication will be made mandatory for all digital payments starting 1st April 2026. The Reserve Bank of India ( Authentication mechanisms for digital payment transactions) Directions, 2025, shall apply [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/rbi-mandates-two-factor-authentication-for-all-digital-payments-from-1st-april-2026/">RBI mandates two-factor authentication for all digital payments from 1st April 2026</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/RBI1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Last year, the RBI issued its guidelines on the authentication mechanism framework for digital payment transaction authentication. As per the guidelines, it was stated that two-factor authentication will be made mandatory for all digital payments starting 1<sup>st</sup> April 2026.</p>
<p>The <a href="https://m.rbi.org.in//Scripts/NotificationUser.aspx?Id=12898&amp;Mode=0">Reserve Bank of India ( Authentication mechanisms for digital payment transactions) Directions, 2025</a>, shall apply to all Payment System Providers and Payment System Participants (banks and non-banks). These directions will apply to all domestic digital payment transactions.</p>
<p>It is mandated that every digital payment transaction must be authenticated using at least two distinct factors like passwords, PINs, SMS-based OTPs, hardware tokens or cards, software-based authentication tokens, fingerprints or facial recognition. In practice, most users may not see a dramatic shift immediately, as OTPs and PINs are already widely used.</p>
<p>Issuers such as banks, card networks and fintechs can offer customers a preference for authentication methods in compliance with the directions. It shall be ensured that for digital payment transactions, other than card present transactions, at least one of the factors of authentication is dynamically created or proven.</p>
<p>An issuer shall ensure the robustness and integrity of the authentication mechanism before deployment. If any loss arises out of transactions effected without complying with the directions, the issuer shall compensate the customer for the loss in full without demur.</p>
<p>It is said that by 1<sup>st</sup> October 2026, card issuers shall put in place a mechanism to validate non-recurring, cross-border card not present (CNP) transactions, where an authentication request is raised by an overseas merchant or overseas acquirer. Further, a risk-based mechanism for handling all cross-border CNP transactions shall also be put in place by card issuers by 1<sup>st</sup> October 2026.</p>
<p>With rising cases of SIM-related fraud and phishing, the RBI is now pushing for alternatives for the digital safety of customers.</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/rbi-mandates-two-factor-authentication-for-all-digital-payments-from-1st-april-2026/">RBI mandates two-factor authentication for all digital payments from 1st April 2026</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Brave v1.88.130 Fixes Chromium Vulnerabilities on Desktop and Android; iOS Not Affected</title>
		<link>https://www.thetechoutlook.com/news/security/brave-v1-88-130-fixes-chromium-vulnerabilities-on-desktop-and-android-ios-not-affected/</link>
		
		<dc:creator><![CDATA[Divya Dhingra]]></dc:creator>
		<pubDate>Sat, 14 Mar 2026 06:59:19 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Brave]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=249830</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Brave has released a new browser update that fixes two Chromium vulnerabilities that were reportedly being exploited in the wild. The company shared the announcement through its official social media account, urging users to install the update as soon as possible. According to Brave, the update — version 1.88.130 — includes security fixes for two [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/brave-v1-88-130-fixes-chromium-vulnerabilities-on-desktop-and-android-ios-not-affected/">Brave v1.88.130 Fixes Chromium Vulnerabilities on Desktop and Android; iOS Not Affected</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2025/06/Brave1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Brave has released a new browser update that fixes two Chromium vulnerabilities that were reportedly being exploited in the wild. The company shared the announcement through its official social media account, urging users to install the update as soon as possible.</p>
<p>According to Brave, the update — version 1.88.130 — includes security fixes for two Chromium vulnerabilities identified as CVE-2026-3909 and CVE-2026-3910. These vulnerabilities were disclosed in the Chrome CNA database on March 12, 2026.</p>
<blockquote><p>In its post, Brave said:</p>
<p>“⚠️ Today&#8217;s browser update (v1.88.130) contains fixes for Chromium vulnerabilities found to be exploited in the wild. You may have received the automatic Brave update already. If not, you can manually update by visiting ‘About Brave’ from the browser’s menu. The Android update is waiting on Google Play Store review and should be out shortly.”</p></blockquote>
<p>The first flaw, CVE-2026-3909, is described as an out-of-bounds write issue in Skia, the graphics engine used by Chromium-based browsers. According to the description, the vulnerability affects versions of Chrome prior to 146.0.7680.75 and could allow a remote attacker to perform memory access out of bounds using a specially crafted HTML page. The issue is rated with high severity under Chromium’s security classification.</p>
<p>The second vulnerability, CVE-2026-3910, involves an inappropriate implementation in the V8 JavaScript engine. The flaw could allow a remote attacker to execute arbitrary code within the browser’s sandbox through a crafted HTML page. Like the first issue, it also carries a high severity rating.</p>
<p>Because Brave is built on the Chromium engine, the company pushed the patch through its latest browser update. Users who have automatic updates enabled may already have the fix installed, but those who have not yet received it can check manually by opening the Brave menu and selecting About Brave to trigger the update.</p>
<p>Brave also clarified that the issue does not affect the iOS version of the browser, since the iOS build does not rely on Chromium but rather the WebKit rendering engine as mandated by Apple&#8217;s App Store Policy.</p>
<p>The Android version of the update is currently awaiting review on the Google Play Store, but Brave says it should become available shortly.</p>
<p>Stay tuned for more updates!</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/brave-v1-88-130-fixes-chromium-vulnerabilities-on-desktop-and-android-ios-not-affected/">Brave v1.88.130 Fixes Chromium Vulnerabilities on Desktop and Android; iOS Not Affected</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New vulnerability has been found in Microsoft Authenticator for both iOS and Android; Could leak your sign-in codes or authentication deep links to a malicious app</title>
		<link>https://www.thetechoutlook.com/news/security/new-vulnerability-has-been-found-in-microsoft-authenticator-for-both-ios-and-android-could-leak-your-sign-in-codes-or-authentication-deep-links-to-a-malicious-app/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 08:52:07 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=249778</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Microsoft Authenticator is a mobile app that generates time-based one-time codes and handles sign-in links and QR-based logins for Microsoft and other accounts. It is widely used for multi-factor authentication on personal phones, including BYOD (Bring Your Own Device) devices. Yesterday, it was revealed that a new vulnerability was found in the app for both [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/new-vulnerability-has-been-found-in-microsoft-authenticator-for-both-ios-and-android-could-leak-your-sign-in-codes-or-authentication-deep-links-to-a-malicious-app/">New vulnerability has been found in Microsoft Authenticator for both iOS and Android; Could leak your sign-in codes or authentication deep links to a malicious app</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Microsoft_Authenticator1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Microsoft Authenticator is a mobile app that generates time-based one-time codes and handles sign-in links and QR-based logins for Microsoft and other accounts. It is widely used for multi-factor authentication on personal phones, including BYOD (Bring Your Own Device) devices.</p>
<p>Yesterday, it was <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26123">revealed</a> that a new vulnerability was found in the app for both iOS and Android (<a href="https://www.cve.org/CVERecord?id=CVE-2026-26123">CVE-2026-26123</a>) that could leak your one-time sign-in codes or authentication deep links (specifically constructed links used to open an app and complete actions like signing in) to a malicious app on the same device.</p>
<p>Android or iOS users who have installed this app on their device could be affected by this vulnerability.</p>
<h2>How could the vulnerability be exploited?</h2>
<p>For the vulnerability to be exploited, the user would first need to install a malicious app on their device and then accidentally choose that app to handle a sign-in deep link. If this happens, the malicious app receives the one-time code or sign-in information and can potentially use it to authenticate as the victim.</p>
<p>With this, the attacker could complete login flows to services that trust your Microsoft Authenticator codes, access the information and services available to the compromised account or potentially pivot to additional accounts if those are protected by codes delivered via Authenticator on the same device.</p>
<h2>Solution for this vulnerability?</h2>
<p>The fix for CVE-2026-26123 is already included in the current releases, so if you have the Microsoft Authenticator app, you are advised to update your app.</p>
<p><strong>On iOS</strong></p>
<ul>
<li>Open the App Store</li>
<li>Tap the My Account button or your photo at the top of the screen</li>
<li>Scroll down to see pending updates and release notes</li>
<li>Tap Update next to an app to update only that app, or tap Update All</li>
</ul>
<p><strong>On Android</strong></p>
<ul>
<li>Open the Google Play Store app</li>
<li>At the top right, tap the profile icon</li>
<li>Tap Manage apps &amp; device</li>
<li>Under “Updates available,” tap See details</li>
<li>Next to the app you want to update, tap Update</li>
</ul>
<p>If you are temporarily unable to update the app, avoid installing new apps that request to handle authentication links, QR-based sign-ins, or web-to-app sign-in flows. When scanning QR codes or tapping sign-in links, verify that the handler is Microsoft Authenticator or another trusted app. Also, where possible, use trusted alternative MFA options until you can apply the update.</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/new-vulnerability-has-been-found-in-microsoft-authenticator-for-both-ios-and-android-could-leak-your-sign-in-codes-or-authentication-deep-links-to-a-malicious-app/">New vulnerability has been found in Microsoft Authenticator for both iOS and Android; Could leak your sign-in codes or authentication deep links to a malicious app</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security researchers discovered a vulnerability in MediaTek-powered Android phones; Researchers broke into the CMF Phone 1 by Nothing in just 45 seconds</title>
		<link>https://www.thetechoutlook.com/news/security/security-researchers-discovered-a-vulnerability-in-mediatek-powered-android-phones-researchers-broke-into-the-cmf-phone-1-by-nothing-in-just-45-seconds/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 10:22:54 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Ledger]]></category>
		<category><![CDATA[Mediatek]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=249726</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1-.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1-.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Are you also someone who owns an Android device powered by a MediaTek chipset? If yes, then this article might be of help. Yesterday, Charles Guillemet, CTO at Ledger, revealed that Donjon, the hardware security research team run by Ledger, discovered a MediaTek vulnerability that is potentially impacting millions of Android phones. Vulnerability found in [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/security-researchers-discovered-a-vulnerability-in-mediatek-powered-android-phones-researchers-broke-into-the-cmf-phone-1-by-nothing-in-just-45-seconds/">Security researchers discovered a vulnerability in MediaTek-powered Android phones; Researchers broke into the CMF Phone 1 by Nothing in just 45 seconds</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1-.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1-.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2024/07/CMF-Phone-1--150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Are you also someone who owns an Android device powered by a MediaTek chipset? If yes, then this article might be of help.</p>
<p>Yesterday, Charles Guillemet, CTO at Ledger, <a href="https://twitter.com/P3b7_/status/2031753534107001209">revealed</a> that Donjon, the hardware security research team run by Ledger, discovered a MediaTek vulnerability that is potentially impacting millions of Android phones.</p>
<h2>Vulnerability found in MediaTek powered Android phone</h2>
<p>According to the X post, the Donjon team plugged the CMF Phone 1 by Nothing (powered by MediaTek Dimensity 7300 5G) into a laptop and breached the phone’s foundational security within 45 seconds. Without ever even booting into Android, the exploit automatically recovered the phone’s PIN, decrypted its storage, and extracted seed phrases from popular software cryptocurrency wallets.</p>
<p>It is said that the vulnerability could affect millions of Android devices with MediaTek processors that use Trustonic’s Trusted Execution Environment (TEE). Many MediaTek devices rely on TEE, a secure area inside the main processor to protect sensitive data.</p>
<p>As per Charles, this research highlights a fundamental architectural difference- general-purpose chips are built for convenience, while secure elements are built for key protection.</p>
<p>The vulnerability found in the MediaTek chipset is now public (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20435">CVE-2025-20435</a>). It is revealed that the research team has followed a strict responsible disclosure process and has informed MediaTek about this vulnerability before making it public.</p>
<p>MediaTek has confirmed providing a fix for this issue to OEMs on 5<sup>th</sup> January, 2026, which means the vulnerability should be patched in software updates. It is not known whether this vulnerability has been exploited by the attacker or its potential impact on existing devices.</p>
<p><strong>The processors that are revealed to be affected are:</strong></p>
<ul>
<li>MT2737</li>
<li>MT6739</li>
<li>MT6761</li>
<li>MT6765</li>
<li>MT6768</li>
<li>MT6781</li>
<li>MT6789</li>
<li>MT6813</li>
<li>MT6833</li>
<li>MT6853</li>
<li>MT6855</li>
<li>MT6877</li>
<li>MT6878</li>
<li>MT6879</li>
<li>MT6880</li>
<li>MT6885</li>
<li>MT6886</li>
<li>MT6890</li>
<li>MT6893</li>
<li>MT6895</li>
<li>MT6897</li>
<li>MT6983</li>
<li>MT6985</li>
<li>MT6989</li>
<li>MT6990</li>
<li>MT6993</li>
<li>MT8169</li>
<li>MT8186</li>
<li>MT8188</li>
<li>MT8370</li>
<li>MT8390</li>
<li>MT8676</li>
<li>MT8678</li>
<li>MT8696</li>
<li>MT8793</li>
</ul>
<p>The affected processors include those that are equipped in entry-level to flagship phones from Oppo, Vivo, OnePlus and Samsung.</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/security-researchers-discovered-a-vulnerability-in-mediatek-powered-android-phones-researchers-broke-into-the-cmf-phone-1-by-nothing-in-just-45-seconds/">Security researchers discovered a vulnerability in MediaTek-powered Android phones; Researchers broke into the CMF Phone 1 by Nothing in just 45 seconds</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BSNL introduces new Kavach number feature to recharge offline without sharing your phone number; Available for women subscribers</title>
		<link>https://www.thetechoutlook.com/telecom/bsnl-introduces-new-kavach-number-feature-to-recharge-offline-without-sharing-your-phone-number-available-for-women-subscribers/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 08:26:19 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Telecom]]></category>
		<category><![CDATA[BSNL]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=249626</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="BSNL - Feature Image" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>The telecom company BSNL has been introducing new offers and features for its users to make them stick to its service and also increase its user base in India. Recently, on the occasion of Women’s Day, the company introduced a new “Kavach Number” feature, which is meant to ensure the safety of women. Your phone [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/telecom/bsnl-introduces-new-kavach-number-feature-to-recharge-offline-without-sharing-your-phone-number-available-for-women-subscribers/">BSNL introduces new Kavach number feature to recharge offline without sharing your phone number; Available for women subscribers</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="BSNL - Feature Image" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/01/BSNL-Feature-Image-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>The telecom company BSNL has been introducing new offers and features for its users to make them stick to its service and also increase its user base in India. Recently, on the occasion of Women’s Day, the company introduced a new “Kavach Number” feature, which is meant to ensure the safety of women.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Your phone number is personal.<br />Keep it that way.</p>
<p>Show your Kavach number at a BSNL store and recharge without revealing your real number.</p>
<p>BSNL Kavach – Recharge with Privacy.<a href="https://twitter.com/hashtag/BSNLKavach?src=hash&amp;ref_src=twsrc%5Etfw">#BSNLKavach</a> <a href="https://twitter.com/hashtag/RechargeSecurely?src=hash&amp;ref_src=twsrc%5Etfw">#RechargeSecurely</a> <a href="https://twitter.com/hashtag/WomenSafetyMatters?src=hash&amp;ref_src=twsrc%5Etfw">#WomenSafetyMatters</a> <a href="https://twitter.com/CMDBSNL?ref_src=twsrc%5Etfw">@CMDBSNL</a> <a href="https://twitter.com/robertravi21?ref_src=twsrc%5Etfw">@robertravi21</a> <a href="https://t.co/U2ZJskiGcW">pic.twitter.com/U2ZJskiGcW</a></p>
<p>&mdash; BSNL India (@BSNLCorporate) <a href="https://twitter.com/BSNLCorporate/status/2031303819045515626?ref_src=twsrc%5Etfw">March 10, 2026</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Before coming to this new feature, let&#8217;s talk about the concern addressed with this feature. Many of us have switched to recharging our devices online, but there have still been instances where we need to go to the recharge stores to get the recharge done (especially in rural areas). But lately, there have been ongoing concerns of leakage of customer contact numbers, resulting in harassment over calls or messages.</p>
<p>To reduce the chances of such misuse, BSNL has come up with the “Kavach Number” feature that allows women subscribers to recharge their mobile numbers at physical stores without revealing their numbers to the retailer. This feature aims to help women keep their numbers private and reduce the risk of unwanted contact.</p>
<h2>What is the BSNL Kavach Number?</h2>
<p>This is a 10-digit alternate number linked to the user’s actual mobile number. Once activated, the Kavach number will be received by the user via SMS. This number can be shared at the recharge stores instead of the real phone number, and the recharge can be done for the main account.</p>
<p>It works like a shield for women’s phone numbers, reducing the risk of their personal details being exposed.</p>
<p><strong>How does it work?</strong></p>
<ul>
<li>You can activate the Kavach feature by calling customer service at 1800 180 1503 or 1500 from your BSNL number</li>
<li>After connecting with a customer care executive, you can request activation of the Kavach number</li>
<li>Once activated, you will receive the Kavach number via SMS</li>
<li>You can now share this number at recharge outlets to recharge your mobile</li>
</ul>
<p>Do note that the Kavach number expires after some time, which means you will have to generate it every time you want to recharge your SIM.</p>
<p>The post <a href="https://www.thetechoutlook.com/telecom/bsnl-introduces-new-kavach-number-feature-to-recharge-offline-without-sharing-your-phone-number-available-for-women-subscribers/">BSNL introduces new Kavach number feature to recharge offline without sharing your phone number; Available for women subscribers</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Signal Confirms Phishing Attacks Targeting Accounts of Government Officials and Journalists</title>
		<link>https://www.thetechoutlook.com/news/security/signal-confirms-phishing-attacks-targeting-accounts-of-goverment-officials-and-journalists/</link>
		
		<dc:creator><![CDATA[Divya Dhingra]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 18:01:15 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[signal app]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=249451</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Signal, which is a free messaging app focused on maximum user privacy, has confirmed that several users, including some government officials and jurnalists have been targeted in a phishing attack, which has resulted in account takeovers of some users. Here is more to it. Signal Confirms Phishing Attacks In a statement published via its official [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/signal-confirms-phishing-attacks-targeting-accounts-of-goverment-officials-and-journalists/">Signal Confirms Phishing Attacks Targeting Accounts of Government Officials and Journalists</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2024/08/Signal_app1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Signal, which is a free messaging app focused on maximum user privacy, has confirmed that several users, including some government officials and jurnalists have been targeted in a phishing attack, which has resulted in account takeovers of some users.</p>
<p>Here is more to it.</p>
<h2>Signal Confirms Phishing Attacks</h2>
<p>In a statement published via its official X handle, Signal clarified that its encryption and infrastructure have not been compromised. The attacks were carried out through sophisticated phishing campaigns, in which users were tricked into sharing account information such as SMS codes and/or Signal PINs, allowing attackers to gain access to their accounts.</p>
<p>Signal explained that attackers may impersonate a Signal support bot—which does not exist—and request users to share their SMS verification code or PIN. Sharing such information gives attackers access to your account. For those unfamiliar, Signal only requires an SMS verification code during the initial account setup. Therefore, if you receive a message asking for your SMS verification code at any other time, it is likely a scam/phishing attack.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.</p>
<p>To be clear: Signal’s encryption and infrastructure have not been…</p>
<p>&mdash; Signal (@signalapp) <a href="https://twitter.com/signalapp/status/2031038277604585785?ref_src=twsrc%5Etfw">March 9, 2026</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>The company emphasises never sharing your SMS code or PIN with anyone. Signal will never request these details except during account sign-up. In short, if you receive a message requesting your PIN, password, or SMS code, ignore it.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-249456" src="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot.jpeg" alt="Alleged Fake Signal Support Bot" width="1206" height="1468" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot.jpeg 1206w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot-246x300.jpeg 246w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot-841x1024.jpeg 841w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot-768x935.jpeg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/03/Alleged-Fake-Signal-Support-Bot-150x183.jpeg 150w" sizes="auto, (max-width: 1206px) 100vw, 1206px" /></p>
<p>Signal also mentioned that it is actively working on adding clear visual and text-based warning signs within the app to alert users to potential risks, especially phishing. This feature aims to help users identify suspicious messages and avoid sharing sensitive information.</p>
<p>Stay tuned for more updates!</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/signal-confirms-phishing-attacks-targeting-accounts-of-goverment-officials-and-journalists/">Signal Confirms Phishing Attacks Targeting Accounts of Government Officials and Journalists</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google brings Scam Detection feature to Samsung Galaxy S26 series</title>
		<link>https://www.thetechoutlook.com/news/security/google-brings-scam-detection-feature-to-samsung-galaxy-s26-series/</link>
		
		<dc:creator><![CDATA[Divya Dhingra]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 11:18:36 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=248722</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>At Samsung’s Galaxy Unpacked event, Google announced that its on-device Scam Detection feature for phone calls is expanding beyond Pixel devices. The feature, which was previously limited to the Google Phone app on Pixel smartphones, is now available in the Samsung Phone app on the Galaxy S26 series in the United States. Scam Detection is [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/google-brings-scam-detection-feature-to-samsung-galaxy-s26-series/">Google brings Scam Detection feature to Samsung Galaxy S26 series</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Android-Scam-Detection-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>At Samsung’s Galaxy Unpacked event, Google announced that its on-device Scam Detection feature for phone calls is expanding beyond Pixel devices. The feature, which was previously limited to the Google Phone app on Pixel smartphones, is now available in the Samsung Phone app on the <a href="https://www.thetechoutlook.com/new-release/gadgets-release/mobile/samsung-officially-launches-galaxy-s26-series-in-india-check-out-the-details/">Galaxy S26 series</a> in the United States.</p>
<p>Scam Detection is designed to notify users in real time if a call appears suspicious. It analyses conversation patterns commonly associated with fraud and provides audio and haptic alerts, along with an on-screen warning, if a potential scam is detected.</p>
<h2>On-device processing with Gemini</h2>
<p>On the Galaxy S26 series, Scam Detection uses Google’s Gemini Nano on-device AI model to monitor calls for speech patterns linked to scams. Google says call audio is processed ephemerally, meaning no conversation audio or transcription is recorded, stored on the device, or sent to Google or third parties. The feature is automatically turned off for numbers saved in your contacts.</p>
<p>For example, if a caller asks for payment via gift cards to complete a delivery, users will receive an alert during the call warning that it may be a scam. However, Google notes that Scam Detection is not 100% accurate and scammers frequently change tactics. Users are advised to remain cautious when answering calls from unknown numbers.</p>
<p>The company also clarified that Scam Detection on the Galaxy S26 series currently supports English in the US only. There is no confirmation yet on whether the feature will expand to other regions, languages, or older Samsung devices. Technically, recent high-end Galaxy smartphones already support the AI model required for the feature, but Google has not announced wider availability.</p>
<p>Previously, Scam Detection was available only on Pixel devices. On Pixel 6 and later models in the US, and on Pixel 9 and later devices (excluding Pixel 9a) in Australia, Canada, India, Ireland, and the UK, the feature works within the Google Phone app.</p>
<h2>Expanded protection in Google Messages</h2>
<p>Google also announced improvements to Scam Detection in Google Messages. On the latest Android flagship devices, such as Pixel 10 and the Galaxy S26 series, in the US, Canada, and the UK, the on-device Gemini model is now used for more advanced analysis of complex conversational threats.</p>
<p>According to Google, this enables better detection of subtle patterns used in job offer scams and sophisticated romance baiting scams, sometimes referred to as “pig butchering”. In these schemes, scammers build long-term relationships with victims to gain trust before promoting fraudulent investments. The updated protection in Google Messages is rolling out now in the supported regions.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-248739" src="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Gemini-powered-Scam-Detection-alerts-a-user-to-a-job-offer-scam.gif" alt="Gemini-powered Scam Detection alerts a user to a job offer scam" width="1080" height="1080" /></p>
<p>Google says it plans to bring call-based Scam Detection to more Android OEM&#8217;s in the future, but no timeline has been provided.</p>
<h2>Below are the <a href="https://support.google.com/phoneapp/answer/15654065?hl=en">steps on how to use this feature on your Pixel Smartphones</a></h2>
<h3 data-start="191" data-end="213">Turn on Scam Detection</h3>
<ol data-start="215" data-end="341">
<li data-start="215" data-end="239">
<p data-start="218" data-end="239">Open the Phone app.</p>
</li>
<li data-start="240" data-end="267">
<p data-start="243" data-end="267">Tap More (three dots).</p>
</li>
<li data-start="268" data-end="286">
<p data-start="271" data-end="286">Tap Settings.</p>
</li>
<li data-start="287" data-end="314">
<p data-start="290" data-end="314">Select Scam Detection.</p>
</li>
<li data-start="315" data-end="341">
<p data-start="318" data-end="341">Turn on Scam Detection.</p>
</li>
</ol>
<h4 data-start="343" data-end="374">Use Scam Detection during calls</h4>
<p data-start="376" data-end="565">Scam Detection runs automatically in the background for calls that may be suspected scams. If a call is identified as high risk, you will receive a notification, sound alert, and vibration.</p>
<p data-start="567" data-end="702">To inform all participants that the feature is active, an audible beep will play at the start of the call and repeat every few minutes.</p>
<p data-start="567" data-end="702"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-248738" src="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image.png" alt="Likely a scam - Feature Image" width="1236" height="648" srcset="https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image.png 1236w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image-300x157.png 300w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image-1024x537.png 1024w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image-768x403.png 768w, https://www.thetechoutlook.com/wp-content/uploads/2026/02/Likely-a-scam-Feature-Image-150x79.png 150w" sizes="auto, (max-width: 1236px) 100vw, 1236px" /></p>
<p data-start="704" data-end="742">If you receive a Scam Detection alert:</p>
<ul data-start="743" data-end="871">
<li data-start="743" data-end="783">
<p data-start="745" data-end="783">Tap Not a scam to dismiss the alert.</p>
</li>
<li data-start="784" data-end="871">
<p data-start="786" data-end="871">Tap End call in the notification or at the bottom of the call screen to end the call.</p>
</li>
</ul>
<h3 data-start="873" data-end="896">Turn off Scam Detection</h3>
<p data-start="898" data-end="925">Turn off for a single call:</p>
<ol data-start="926" data-end="1042">
<li data-start="926" data-end="986">
<p data-start="929" data-end="986">During the call, tap More (bottom right of the screen).</p>
</li>
<li data-start="987" data-end="1042">
<p data-start="990" data-end="1042">Tap Scam Detection to disable it for that call only.</p>
</li>
</ol>
<p data-start="1044" data-end="1067">Turn off for all calls:</p>
<ol data-start="1068" data-end="1178">
<li data-start="1068" data-end="1092">
<p data-start="1071" data-end="1092">Open the Phone app.</p>
</li>
<li data-start="1093" data-end="1122">
<p data-start="1096" data-end="1122">Tap More, then Settings.</p>
</li>
<li data-start="1123" data-end="1150">
<p data-start="1126" data-end="1150">Select Scam Detection.</p>
</li>
<li data-start="1151" data-end="1178">
<p data-start="1154" data-end="1178">Turn off Scam Detection.</p>
</li>
</ol>
<p>&nbsp;</p>
<p>The post <a href="https://www.thetechoutlook.com/news/security/google-brings-scam-detection-feature-to-samsung-galaxy-s26-series/">Google brings Scam Detection feature to Samsung Galaxy S26 series</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DeepSeek, Moonshot and MiniMax accused of extracting Claude’s capabilities to improve their own models</title>
		<link>https://www.thetechoutlook.com/news/apps/deepseek-moonshot-and-minimax-accused-of-extracting-claudes-capabilities-to-improve-their-own-models/</link>
		
		<dc:creator><![CDATA[Estuti Bajpai]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 05:30:30 +0000</pubDate>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[MiniMax]]></category>
		<category><![CDATA[Moonshot]]></category>
		<guid isPermaLink="false">https://www.thetechoutlook.com/?p=248530</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div>
<p>Yesterday, Anthropic officially announced that it has identified industrial-scale distillation attacks on its models by three AI laboratories- DeepSeek, Moonshot and MiniMax. The accused labs are said to have created over 24,000 fraudulent accounts and to have generated over 16 million exchanges with Claude, leveraging its capabilities to train and improve their own models. These [&#8230;]</p>
<p>The post <a href="https://www.thetechoutlook.com/news/apps/deepseek-moonshot-and-minimax-accused-of-extracting-claudes-capabilities-to-improve-their-own-models/">DeepSeek, Moonshot and MiniMax accused of extracting Claude’s capabilities to improve their own models</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="675" src="https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1.jpg 1200w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-300x169.jpg 300w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-1024x576.jpg 1024w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-768x432.jpg 768w, https://www.thetechoutlook.com/wp-content/uploads/2025/05/Claude1-150x84.jpg 150w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></div><p>Yesterday, Anthropic officially announced that it has identified industrial-scale distillation attacks on its models by three AI laboratories- DeepSeek, Moonshot and MiniMax. The accused labs are said to have created over 24,000 fraudulent accounts and to have generated over 16 million exchanges with Claude, leveraging its capabilities to train and improve their own models.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">These attacks are growing in intensity and sophistication. Addressing them will require rapid, coordinated action among industry players, policymakers, and the broader AI community.</p>
<p>Read more: <a href="https://t.co/4SVm8K3qou">https://t.co/4SVm8K3qou</a></p>
<p>&mdash; Anthropic (@AnthropicAI) <a href="https://twitter.com/AnthropicAI/status/2025997931589881921?ref_src=twsrc%5Etfw">February 23, 2026</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Wondering what distillation is? Distillation involves training a less capable model on the outputs of a stronger one. It is a widely used and legitimate training method. But this method could also be used for illicit purposes; competitors can use it to acquire powerful capabilities from other labs. Though those illicitly distilled models lack necessary safeguards, they create significant national security risks.</p>
<h3>What was found in the distillation campaigns?</h3>
<p>The three distillation campaigns used fraudulent accounts and proxy services to access Claude at scale while evading detection.</p>
<p><strong>DeepSeek</strong></p>
<p>Scale: Over 150,000 exchanges</p>
<p>Operation targeted:</p>
<ul>
<li>Reasoning capabilities across diverse tasks</li>
<li>Rubric-based grading tasks that made Claude function as a reward model for reinforcement learning</li>
<li>Creating censorship-safe alternatives to policy-sensitive queries</li>
</ul>
<p><strong>Moonshot AI</strong></p>
<p>Scale: Over 3.4 million exchanges</p>
<p>Operation targeted:</p>
<ul>
<li>Agentic reasoning and tool use</li>
<li>Coding and data analysis</li>
<li>Computer-use agent development</li>
<li>Computer vision</li>
</ul>
<p><strong>MinMax</strong></p>
<p>Scale: Over 13 million exchanges</p>
<p>Operation targeted:</p>
<ul>
<li>Agentic coding</li>
<li>Tool use and orchestration</li>
</ul>
<p>It is revealed that for national security reasons, Anthropic does not currently offer commercial access to Claude in China, or to subsidiaries of their companies located outside of the country. According to Anthropic, these labs used commercial proxy services that resell access to Claude and other frontier AI models at scale.</p>
<p>And when one account is banned, a new one takes its place. In one case, a single proxy network managed more than 20,000 fraudulent accounts simultaneously, mixing distillation traffic with unrelated customer requests to make detection harder. Once access is secured, the labs generate large volumes of carefully crafted prompts designed to extract specific capabilities from the model.</p>
<p>But when variations of that prompt arrive tens of thousands of times across hundreds of coordinated accounts, all targeting the same narrow capability, the pattern becomes clear.</p>
<h3>How is Anthropic working to stop such distillation attacks?</h3>
<ul>
<li><strong>Detections:</strong> Several classifiers and behavioural fingerprinting systems are designed to identify distillation attack patterns in API traffic. Detection tools are also built for identifying coordinated activity across large numbers of accounts.</li>
<li><strong>Intelligence sharing:</strong> Anthropic is sharing technical indicators with other AI labs, cloud providers, and relevant authorities.</li>
<li><strong>Access controls:</strong> The company has strengthened verification for educational accounts, security research programs and startup organisations- most commonly exploited pathways for setting up fraudulent accounts.</li>
<li><strong>Counter measures:</strong> The company is developing Product, API and model-level safeguards designed to reduce the efficacy of model outputs for illicit distillation, without degrading the experience for legitimate customers.</li>
</ul>
<p>These distillation campaigns are growing in intensity and sophistication, and apart from the above measures, the company has mentioned that distillation attacks at this scale require a coordinated response across the AI industry, cloud providers, and policymakers.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.thetechoutlook.com/news/apps/deepseek-moonshot-and-minimax-accused-of-extracting-claudes-capabilities-to-improve-their-own-models/">DeepSeek, Moonshot and MiniMax accused of extracting Claude’s capabilities to improve their own models</a> appeared first on <a href="https://www.thetechoutlook.com">The Tech Outlook</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
