Cyberattacks are changing. In the past, hackers would lock your files and show a big message asking for money. Now, a new type of attack is becoming more common. It’s called “quiet ransomware,” and it can steal your private information without you even knowing.
Last year, a small bakery in the United States noticed that their billing machine was charging customers a penny less. It seemed like a tiny error. But weeks later, they got a strange message. Hackers claimed they had copied the bakery’s private recipes, financial documents, and even camera footage. The criminals demanded a large payment or they would share everything online. The bakery was shocked— they had no idea their systems had been hacked.
What Is Quiet Ransomware?
This kind of attack is sneaky. Instead of locking your data, the hackers quietly watch your system. They take important information and wait. Then, they ask for money and threaten to release the stolen data if you don’t pay.
How These Attacks Happen
1. The hackers find a weak point, usually in an internet-connected device like a smart camera or printer.
2. They get inside your system and look through your files— emails, client details, company plans, etc.
3. They make secret copies of this information.
4. Later, they contact you, demanding money to keep the data private.
Why Criminals Use This Method
1. It’s harder to detect, since your system keeps working normally.
2. Many companies prefer to quietly pay, instead of risking their reputation.
3. Devices like smart TVs, security cameras, or smartwatches are rarely updated or checked, making them easy to break into.
Real Incidents
One hospital had its smart air conditioning system hacked. Through it, criminals stole ten years of patient records. The hospital paid a huge amount to avoid legal trouble.
In another case, a smart fitness watch used by a company leader was hacked. This gave the attackers access to emails that contained sensitive information about the business.
How You Can Stay Safe
1. Keep smart devices on a different network than your main systems.
2. Turn off features like remote access or cloud backups if they are not needed.
3. Use security tools that limit what each device can do or connect to.
Today, hackers don’t always make noise. Sometimes they hide, watch, and strike later. Anyone using smart devices should be careful. A simple gadget like a smart light or thermostat could be the reason your private data gets stolen. Staying alert and securing all devices is more important than ever.
In 2025 alone, three VPN apps have had over a million downloads on Google Play and Apple’s App Store, suggesting these aren’t small-time apps, Sensor Tower reports. They are advertised as “private browsing” tools, but the VPNs provide the companies with complete user data of their online activity. This is alarming because China’s national security laws mandate that companies give user data if the government demands it.
The intricate web of ownership structures raises important questions; the apps are run by Singapore-based Innovative Connecting, owned by Lemon Seed, a Cayman Islands firm. Qihoo acquired Lemon Seed for $69.9 million in 2020. The company claimed to sell the business months late, but FT reports the China-based team making the applications were still under Qihoo’s umbrella for years. According to FT, a developer said, “You could say that we’re part of them, and you could say we’re not. It’s complicated.”
Google said it strives to follow sanctions and remove violators when found. Apple has removed two apps- Snap VPN and Thunder VPN- after FT contacted the business, claiming it follows strict rules on VPN data-sharing.
What Google and Apple face is more than public outage. Investors prioritise data privacy, and regulatory threat has increased, mainly with growing concerns around U.S tech firms’ links to China. If the U.S government gets involved, it can result in stricter rules, fines, and even more app removals. If this happens, shareholders won’t be happy.
According to FT, “Innovative Connecting said the content of the article was not accurate and declined to comment further. Guangzhou Lianchuang declined to comment. Qihoo and Chen Ningyi did not respond to requests for comment.”
A popular trend is taking over social media, where users are sharing cartoon-like pictures of themselves inspired by the art style of Studio Ghibli. These fun, animated portraits are often created using tools powered by artificial intelligence, like ChatGPT-4o. From Instagram to Facebook, users are posting these images excitedly. Big entrepreneurs and celebrities have partaken in this global trend, Sam Altman and Elon Musk to name a few.
But behind the charm of these AI filters lies a serious concern— your face is being collected and stored, often without your full understanding or consent.
What’s Really Happening When You Upload Your Face?
Each time someone uploads a photo or gives camera access to an app, they may be unknowingly allowing tech companies to capture their facial features. These features become part of a digital profile that can be stored, analyzed, and even sold. Unlike a password that you can change, your facial data is permanent. Once it’s out there, it’s out for good.
Many people don’t realize how often their face is scanned— whether it’s to unlock their phone, tag friends in photos, or try out AI tools that turn selfies into artwork. Even images of children and family members are being uploaded, putting their privacy at risk too.
Real-World Cases Show the Dangers
In one well-known case, a company named Clearview AI was accused of collecting billions of images from social platforms and other websites without asking permission. These were then used to create a massive database for law enforcement and private use.
In another incident, an Australian tech company called Outabox suffered a breach in May 2024. Over a million people had their facial scans and identity documents leaked. The stolen data was used for fraud, impersonation, and other crimes.
Retail stores using facial recognition to prevent theft have also become targets of cyberattacks. Once stolen, this kind of data is often sold on hidden parts of the internet, where it can be used to create fake identities or manipulate videos.
The Market for Facial Recognition Is Booming
Experts say the facial recognition industry will be worth over $14 billion by 2031. As demand grows, concerns about how companies use our faces for training AI tools without transparency are also increasing. Some websites can even track down a person’s online profile using just a picture.
How to Protect Yourself
To keep your face and personal data safe, it’s best to avoid viral image trends that ask you to upload clear photos. Turn off unnecessary camera permissions, don’t share high-resolution selfies, and choose passwords or PINs over face unlock for your devices.
These simple steps can help you avoid falling into the trap of giving away something as personal as your identity. Before sharing an AI-edited selfie, take a moment to think— are a few likes worth risking your privacy? Rather respect art and the artists who spend years perfecting their craft and maybe consider commissioning a portrait if you're that enthusiastic about it.
Google has recently confirmed that a technical problem caused the loss of user data from Google Maps Timeline, leaving some users unable to recover their saved location history. The issue has frustrated many, especially those who relied on Timeline to track their past movements.
What Happened to Google Maps Timeline Data?
For the past few weeks, many Google Maps users noticed that their Timeline data had suddenly disappeared. Some users, who had been saving their location history for years, reported that every single recorded trip was gone. Even after trying to reload or recover the data, nothing appeared.
Initially, Google remained silent about the issue, providing no confirmation or explanation. However, the company has now sent an email to affected users, explaining that a technical error caused the deletion of Timeline data for some people. Unfortunately, those who did not have an encrypted backup enabled will not be able to restore their lost records.
Can the Lost Data Be Recovered?
Google has advised users who have encrypted backups enabled to try restoring their Timeline data. To do this, users need to open the latest version of Google Maps, go to the Timeline section, and look for a cloud icon. By selecting the option to import backup data, there is a chance of retrieving lost history.
However, users without backups have no way to recover their data. Google did not provide a direct apology but acknowledged that the situation was frustrating for those who relied on Timeline to recall their past visits.
Why Does This Matter?
Many Google Maps users have expressed their disappointment, with some stating that years of stored memories have been lost. Some people use Timeline as a digital journal, tracking places they have visited over the years. The data loss serves as a reminder of how important it is to regularly back up personal data, as even large tech companies can experience unexpected issues that lead to data deletion.
Some users have raised concerns about Google’s reliability, wondering if this could happen to other services like Gmail or Google Photos in the future. Many also struggled to receive direct support from Google, making it difficult to get clear answers or solutions.
How to Protect Your Data in the Future
To avoid losing important data in cases like this, users should take the following steps:
Enable backups: If you use Google Maps Timeline, make sure encrypted backups are turned on to prevent complete data loss in the future.
Save data externally: Consider keeping important records in a separate cloud service or local storage.
Be aware of notifications: When Google sends alerts about changes to its services, take immediate action to protect your data.
While Google has assured users that they are working to prevent similar problems in the future, this incident highlights the importance of taking control of one’s own digital history. Users should not fully rely on tech companies to safeguard their personal data without additional protective measures.
The rise of digital currencies has made transferring money faster and easier. But with this convenience comes a serious challenge — the increasing misuse of anonymous payment systems by cybercriminals.
Recently, hackers linked to North Korea managed to steal $1.5 billion worth of cryptocurrency from the ByBit exchange. Reports suggest they have already moved $300 million of this stolen money. Experts believe this might be the largest financial theft ever recorded.
Investigators also claim North Korea has stolen over $6 billion in digital assets since 2017. Much of this money may be funding the country’s weapons programs, including missile development.
Why Anonymous Payments Raise Concerns
Privacy in digital payments is important. People want to protect their financial details from being exposed. However, the same privacy also allows criminals to hide their illegal activities.
This creates a tough situation. Should society allow complete anonymity and risk giving criminals a free pass? Or should we increase surveillance and risk violating personal privacy? There’s no simple answer to this problem.
While protecting privacy is important, ignoring the risks of anonymous transactions could lead to serious issues like money laundering, fraud, and funding of illegal activities.
Searching for a Middle Ground
Currently, authorities use certain rules to keep a check on these risks. Financial platforms are required to follow Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations. These rules help identify users during large transactions or when converting crypto to regular money.
At the same time, smaller peer-to-peer transactions remain private. This system tries to balance both sides — protecting ordinary people’s privacy while also giving law enforcement some control to catch criminals.
The Role of Central Bank Digital Currencies (CBDCs)
As digital currencies grow, central banks around the world are exploring the idea of their own digital money. Some experts believe that central banks are better at protecting people’s data because they don’t seek profit from it.
One idea is that central banks could store payment data in a secure system that benefits everyone, while still protecting individual privacy. This way, data could be shared only when necessary and with strict rules.
What People Think About Payment Privacy
Surveys show that many people are concerned about who handles their payment data. For example, research in Australia found that people were willing to pay extra to have their payment information handled by the central bank instead of private companies.
Even if government agencies could still access the data, people felt safer trusting the central bank. This shows that protecting privacy is important to users.
Cash vs Digital Money: The Privacy Debate
Many people still prefer cash because it offers privacy. Paying with cash leaves no digital trail, which is why some see it as the safest option for private transactions.
However, using large amounts of cash is not easy or safe. Criminals who depend on cash face difficulties in storing and moving it without being caught.
Digital currencies could copy cash’s privacy benefits, but without proper rules, they risk becoming tools for crime.
The future of digital payments depends on finding the right balance between privacy and security. People deserve protection from unnecessary surveillance, but there must also be systems in place to stop misuse.
As technology grows, governments and financial institutions must work together to create safer, fairer systems that protect everyone — without giving criminals a place to hide.
Apple is set to make a major improvement in how people using iPhones and Android devices communicate. Soon, text messages exchanged between these two platforms will be protected with end-to-end encryption, offering better privacy and security.
For years, secure messaging was only possible when two iPhone users texted each other through Apple’s exclusive iMessage service. However, when messages were sent from an iPhone to an Android phone, they used the outdated SMS system, which had very limited features and no encryption. This often left users worried about the safety of their conversations.
This change comes as Apple plans to adopt a new standard called Rich Communication Services, commonly known as RCS. RCS is a modern form of messaging that supports sharing pictures, videos, and other media in better quality than SMS. It also allows users to see when their messages have been read or when the other person is typing. Most importantly, the updated version of RCS will now include end-to-end encryption, which means that only the sender and receiver will be able to view the content of their messages.
An official update confirmed that Apple will roll out this new encrypted messaging feature across its devices, including iPhones, iPads, Macs, and Apple Watches, through future software updates.
What Does This Mean for Users?
This development is expected to improve the messaging experience for millions of users worldwide. It means that when an iPhone user sends a message to an Android user, the conversation will be much safer. The messages will be protected, ensuring that no one else can access them while they are being delivered.
For a long time, people who used different devices faced issues like poor media quality and lack of security when messaging each other. With this change, users on both platforms will enjoy better features without worrying about the safety of their private conversations.
Another important part of this update is that users will no longer have to depend on older messaging systems that offer no protection for their chats. Encrypted RCS messaging will make it easier for people to share not just text, but also photos, videos, and other files securely.
A Step Towards Better Privacy
Apple has always focused on user privacy, and this move further strengthens that image. Enabling encryption for messages sent between iPhones and Android devices means users can now rely on their default messaging apps for secure communication.
This change also reflects the growing importance of digital privacy as more people depend on their smartphones for daily conversations. By adding this level of protection, Apple is ensuring that users have better control over their personal information.
The upcoming encrypted RCS messaging feature is a significant step forward. It promises to offer better privacy and a smoother messaging experience for both iPhone and Android users. Once this update is live, users can communicate more securely without needing to worry about their messages being accessed by anyone else.