Tuesday, March 31, 2026

Judge Sided With Advertisers In Twitter Lawsuit

Twitter Lawsuit
A United States federal judge has dismissed Elon Musk’s antitrust lawsuit against major advertisers, dealing a blow to X’s legal campaign over an alleged ad boycott following his takeover of Twitter.

US District Judge Jane Boyle ruled that Musk failed to establish a valid antitrust claim.

The court found no evidence that advertisers harmed consumers by pulling back spending on the platform, now known as X. Without consumer harm, Boyle said, antitrust law does not apply.

"The very nature of the alleged conspiracy does not state an antitrust claim, and the Court therefore has no qualm dismissing with prejudice," Boyle said. She further stressed, "the question underlying antitrust injury is whether consumers—not competitors—have been harmed."

Musk’s lawsuit targeted the World Federation of Advertisers and several multinational brands, including Shell, Nestle, Colgate, and Mars. X alleged they coordinated an "illegal boycott" under the umbrella of brand safety initiatives.

The court, however, sided with advertisers.

It found that companies acted within their rights to control where ads appear. Many brands had reduced spending after concerns about rising harmful content on the platform.

Advertisers had formed the Global Alliance for Responsible Media (GARM) to enforce shared standards. This initiative allowed brands to push platforms to meet content guidelines.

Platforms could join but did not control the group.

Judge Boyle noted that Musk appeared to underestimate this collective influence before acquiring Twitter.

Advertisers used coordinated pressure to demand compliance with brand safety norms.

That pressure included warnings of collective action if standards slipped.

The advertiser pullback hit X’s finances hard. At one point in 2023, revenue dropped by as much as 59 percent over a five-week period. The decline followed Musk’s overhaul of moderation systems and the disbanding of internal safety groups.

Read More

Monday, March 30, 2026

Amazon Seeks To Stop SpaceX's Orbital Data Center

SpaceX
In a surprising move, Amazon has thrown itself into the fight over SpaceX's controversial plan to launch a million data centers into Earth's orbit.

In early March 2025, Amazon lodged a complaint against the plan, urging the Federal Communications Commission (FCC) to deny SpaceX's application because SpaceX had not presented any solid details about how it would achieve its plan. Amazon argues that SpaceX's plan would take centuries and force every agency that uses low Earth orbit to schedule around a plan that may never even come to fruition.

Moreover, Amazon cites the FCC's own rules (Section 25.112) that make it clear (via Scribd) the Commission must dismiss all "applicants that, among other things, fail to provide complete information or full answers to the questions asked by the Commission's Part 25 licensing rules." That was met harshly by FCC Chairman Brendan Carr, an ally of SpaceX owner Elon Musk, as he publicly scolded Jeff Bezos' conglomerate in an X post.

Amazon Leo's complaint goes on to point out that others are opposed to the development, noting that the pollution of such systems could nullify the environmental gains won by shifting data center infrastructure northward.

Furthermore, some worry that such constellations could potentially destroy the field of astronomy. Whether SpaceX gets its orbital data center business off the ground may have a major impact on its status as the most valuable company in the world.

SpaceX's data center plan is "the first step towards becoming a Kardeshev II-level civilization," fully harnessing the Sun to propel "humanity's multi-planetary future."

According to the company's FCC proposal (via Scribd), the system's one million satellites will operate in "narrow orbital shells" spanning up to 50 kilometers wide. To fully harness the Sun's rays, the satellites must operate outside the Earth's shadow, necessitating a much higher altitude than current LEO constellations, estimated to be between 500 and 2,000 km. Data transfers will rely "nearly exclusively on high-bandwidth optical links," to transfer data to both Starlink satellites and earthbound customers.

Amazon's criticism isn't without merit. SpaceX's ambitions would require it to launch roughly 63 times more satellites than are currently in low Earth orbit. Google's executive Travis Beals of Google confirmed it will take roughly 10,000 satellites to match the capacity of one gigawatt data campus (via WSJ).

Many were already skeptical of Starlink's 40,000 satellite initiative. SpaceX's FCC proposal does little to explain how it will meet this currently unattainable launch capacity, requiring the company to dramatically escalate its launch rates from once every few days to every few hours.

Further complicating the issue is the likely size of SpaceX's LEO data centers. Experts believe that low-Earth orbit data centers' added hardware will make them much larger than any previous SpaceX satellite (via Sky & Telescope). This will require SpaceX to rely on its troubled Starship rocket, whose viral explosions have delayed NASA's Artemis lunar mission by two years and counting.

To date, the partnership is aiming for a 2028 launch date that many experts are treating with heavy skepticism.

Read More

Friday, March 27, 2026

Jury Rules Against Meta In Child Exploitation Case

Meta
A jury has found Meta Platforms liable in a major child safety case, ruling that the company failed to adequately protect young users on its platforms and misled the public about associated risks.

The verdict, delivered in New Mexico, orders Meta to pay US$ 375 million in damages.

The case stems from a lawsuit filed by New Mexico Attorney General’s Office, which accused Meta of creating conditions that allowed child predators to operate on platforms like Facebook and Instagram.

Jurors concluded that the company engaged in unfair and deceptive trade practices and acted in ways deemed unconscionable under state law.

The trial included evidence from an undercover investigation in which officials created fake accounts posing as minors.

These accounts reportedly received sexually explicit content and solicitations, leading to arrests in some cases. Prosecutors argued that Meta failed to implement adequate safeguards to prevent such interactions.

Meta denied the allegations and said it plans to appeal the ruling.

"We respectfully disagree with the verdict and will appeal," CNN quoted a company spokesperson as saying.

The decision adds to growing legal pressure on social media companies over how their platforms are designed and how effectively they protect vulnerable users.

During the trial, prosecutors argued that Meta’s systems, particularly its recommendation algorithms, could inadvertently connect predators with minors.

Meta, however, maintained that it has invested heavily in safety measures. A spokesperson told CNN, "We work hard to keep people safe on our platforms and are clear about the challenges of identifying and removing bad actors or harmful content."

The case also raised concerns about encrypted messaging features, which prosecutors argued could make it harder for law enforcement to detect harmful activity. Meta has indicated it may roll back certain encryption features on Instagram.

Testimony from former employees suggested that internal concerns about safety were not fully addressed.

New Mexico Attorney General Raúl Torrez said in a statement to CNBC, "The jury’s verdict is a historic victory for every child and family who has paid the price for Meta’s choice to put profits over kids’ safety."

The New Mexico case is part of a broader wave of litigation targeting major tech platforms.

Similar lawsuits across the United States are examining whether social media companies have knowingly designed addictive or harmful features, particularly for younger users.

Legal experts say these cases could reshape how platforms are regulated, especially if courts begin holding companies accountable not just for content, but for design decisions that influence user behavior.

Read More

Wednesday, March 25, 2026

Fake Google Page Can Be A Spyware

Google Malware
There is a new phishing scam is tricking people into installing malware by pretending to be a Google security check. The page looks convincing and tells users that their Google account needs additional protection. It walks them through a simple setup process that appears to strengthen their security and protect their devices.

If users follow those steps, they may end up installing what looks like a harmless security tool. In reality, security researchers say the page installs a malicious web app that can spy on their device. It can steal login verification codes, watch what users copy and paste, track their location and quietly send internet traffic through their browser.

The most troubling part is that nothing is technically hacked. Instead of exploiting a software flaw, attackers simply trick users into granting the permissions they need. Once that happens, their own browser can start working for them without anybody realizing it.

Security researchers at Malwarebytes, a cybersecurity company, recently discovered a phishing website that pretends to be part of Google's account protection system. The site uses the domain google-prism[.]com and presents what looks like a legitimate security page asking users to complete a short verification process.

Visitors are told they should complete a four-step setup to improve their account protection. The page explains that these steps will help secure Google account and protect devices from threats. During the process, the site asks users to approve several permissions and install what it claims is a security tool.

The tool it installs is actually a Progressive Web App. This type of application runs through the browser but behaves like a regular app on any computer. It opens in its own window, can send notifications and can run tasks in the background.

Once installed, the malicious web app can collect contacts, read information users copy to their clipboard, track GPS location data and attempt to capture one-time login codes sent to their phone. These codes are commonly used when they sign in to accounts that use two-factor authentication.

The fake security page may also offer an Android companion app described as a "critical security update." Researchers found that this app requests 33 permissions, including access to text messages, call logs, contacts, microphone recordings and accessibility features.

Those permissions give attackers the ability to read messages, capture keystrokes, monitor notifications and maintain control over parts of the device. Even if the Android app is never installed, the web app alone can still collect sensitive information and quietly run activity through the browser.

The scam works because it looks like something anybody would normally trust. Many people expect security alerts from the services they use, especially when it comes to protecting email or cloud accounts. Attackers take advantage of that trust by presenting the fake page as a helpful security feature.

When users approve the permissions and install the web app, they are essentially giving the attackers access to certain parts of their device. One of the main things they try to capture is one-time passwords. These are the short codes users receive when logging in to accounts that require two-factor authentication.

If attackers manage to capture those codes while also knowing the password, they may be able to break into their accounts. That could include email, financial services or cryptocurrency wallets, depending on which accounts they use. The malware also watches what users copy and paste. Many people copy cryptocurrency wallet addresses before sending digital currency, and those addresses can be valuable to criminals. The malicious app can collect that information and send it back to the attackers.

Another feature allows attackers to route internet requests through the browser. This means they can run online activity through the device so it appears to come from ythe users home network. The app can also send notifications that look like security alerts or system warnings. When users click those notifications, the app opens again and gains another opportunity to capture information such as login codes or clipboard data.

Read More

Sunday, March 22, 2026

KadNap Malware Hijacked 14k Devices

KadNap
Recently, there is a new type of malware going around, and it has so far infected over 14,000 devices, according to new reports from the Black Lotus Labs team at Lumen.

The malware, which is being called KadNap, primarily appears to target Asus-branded routers, though other edge devices have also been affected. And so far, the team estimates that at least 60 percent of the victims of the attacks driven by KadNap have been located within the United States — with a smaller percentage being detected in Russia, the United Kingdom, Brazil, France, and a few other countries throughout the world.

What is especially troubling about KadNap is the fact that once a device is infected, it essentially allows the threat actors to market the devices as part of a proxy service called Doppelgänger.

Once part of the service, it can then be utilized in completely anonymous DDoS attacks, which allow bad actors to hide behind thousands of devices that don't belong to them. Hiding malware within everyday apps has become a well-known way to distribute infected files.

The security researchers who discovered the malware say that this service is essentially a rebrand of a previous proxy service called Faceless, which has previously been associated with another type of malware known as TheMoon, which has been going around since 2014.

Based on information pulled from the website for the service, the researchers note that Doppelgänger has been launched since May or June of 2025. Malware like this is one reason the FBI has warned Americans to replace certain routers.

As our world continues to move toward acceptance of more connected devices, the threat of malware like KadNap is only growing. That's because, as we rely more on the Internet of Things (IoT), threat actors are finding new ways to exploit those devices.

Additionally, Lumen says that edge devices like the routers targeted by KadNap are also susceptible to other malware, which makes it difficult to tell exactly which malware is driving the car, so to speak. And, as the malware creators become smarter and more advanced, they're finding ways to even hide their network traffic within the legitimate peer-to-peer traffic.

The only reason Black Lotus Labs was able to discover the KadNap malware is that it detected over 10,000 Asus devices that were all corresponding with a very particular server set. From here, their investigation uncovered that a file had been used to download a malicious shell script from those servers. This file, the researchers note, is what "sets the stage" for KadNap to incorporate the victim into the P2P network." Further, because it utilizes a proxy the way it does, the researchers believe the intention behind the threat is very clear. They want to avoid any type of detection and make it as difficult as possible for people to defend against the threat.

Thankfully, as of the posting of its report, Lumen notes that it has proactively begun blocking network traffic from Doppelgänger, with plans to share the compromising indicators in public feeds so that others can help disrupt the threat that KadNap poses. Google recently started taking down another huge proxy system like this, so it's promising to see another under fire, too.

Read More