logo
#

Latest news with #JakeMoore

This Morning fans blast 'creepy' new presenter after disastrous ITV debut - but can YOU spot why?
This Morning fans blast 'creepy' new presenter after disastrous ITV debut - but can YOU spot why?

Daily Mail​

time13-05-2025

  • Entertainment
  • Daily Mail​

This Morning fans blast 'creepy' new presenter after disastrous ITV debut - but can YOU spot why?

This Morning fans blasted a 'creepy' new presenter after their disastrous debut on Tuesday - but can you spot why? ITV hosts Cat Deeley, 48, and Ben Shephard, 50, sat down with Jake Moore, a cyber-security expert on the latest instalment of the daytime show. At one point, the trio were joined by a new face, Julia, who wasn't like any usual TV presenter. Julia was an AI presenter, created by Jake using 'straightforward and simple' software, Ben explained. Before she was due to appear on the show, Julia crashed and had to be rebooted. When she did join for an interview, Cat asked the bot: 'What is AI?' Julia gave a comprehensive response and said: 'AI or artificial intelligence refers to the similarity of human intelligence in machines that are designed to think and learn like people.' She described how it 'encompasses various technology' and is a 'fascinating field with endless possibilities'. Cat then asked: 'Julia, we haven't told you what to say, have we?' The AI replied: 'No you haven't, I'm here to provide information and assistance bases on your queries.' The conversation continued and Julia explained why AI exists, amongst other things. However, the bot didn't make it to the end of the segment and crashed again. 'Unfortunately Julia glitched again, I think she got tired,' Ben quipped. Some viewers were wary of the AI presenter and even called her 'creepy' on social media. Some viewers were wary of the AI presenter and even called her 'creepy' on social media Many posted on X: 'This is just Grok with a face. #thismorning.'; 'Creepy AI on #ThisMorning.'; 'Not a fan of AI #ThisMorning.'; 'Creepy!!!! #thismorning.'; 'Now this is why I don't trust AI #thismorning.' Earlier on in the show, two stars of Channel 4 's new series, Virgin Island, d efended the use of 'sex surrogates'. Jason, 25, and Taylor, 29, appeared on the iconic sofa to chat to Cat and Ben about their experience at the retreat. The two are part of the group of 12 virgins of the brand new show, which premiered on Monday night, who travelled to an Island in Croatia to explore their sexuality with help from co-founders of the Somatica Institute and the Somatica method Dr Danielle Harel and Celeste Hirschman. The first episode saw the contributors open up about their feelings and why they haven't been able to be intimate with anyone, and one star called Zac, 28, managed to get up close and personal with one of the sex surrogates called Kat. Ben admitted that he was fascinated with the surrogates and asked them to explain the dynamics. Jason explained: 'I didn't have a surrogate. But the surrogates, Kat and Andre, are there for the more hands on, the nitty gritty. The physicality of it. 'You'll definitely see what happens with that...' Ben asked: If you are prepared and confident enough to go forward with something more physical... they are there to enable you to do that?' Jason replied: 'Yes. They are there to guide you through it and help you do it.' Ben pointed out: 'And help you so you know what you're doing... you can feel safe, you can feel confident. 'That's an extraordinary job, isn't it?' Taylor explained: 'It's better than if you're in a situation where you're going home and going to have to do this with a stranger, they are in a place where they are able to guide you through it, keep you safe, keep you calm, take you in a really therapeutic place. 'It's not like hooking up with somebody on a night out. It's therapy. 'It's all about taking you through the steps of intimacy and getting you there.' This Morning airs on ITV1 from 10am to 12.30pm on weekdays and is available to stream on ITVX.

Urgent warning over 'Hi Mum' WhatsApp scam: Fraudsters are using AI to mimic children's voices to steal millions of pounds from unsuspecting parents
Urgent warning over 'Hi Mum' WhatsApp scam: Fraudsters are using AI to mimic children's voices to steal millions of pounds from unsuspecting parents

Daily Mail​

time05-05-2025

  • Daily Mail​

Urgent warning over 'Hi Mum' WhatsApp scam: Fraudsters are using AI to mimic children's voices to steal millions of pounds from unsuspecting parents

For millions of people, WhatsApp is a vital connection to friends and family around the world. But cybersecurity experts have issued a fresh warning over an insidious scam which has already duped users out of almost half a million pounds since the start of 2025. In the so-called 'Hi Mum' scam, criminals impersonate a family member to trick their victims into sending them money. Now, fraudsters are even using AI voice impersonation technology to dupe their victims. The scam begins by sending a WhatsApp message saying 'Hi Mum' or 'Hi Dad' as the sender claims they have lost their phone and have been locked out of their bank account. Having won their target's trust, the scammer then asks the person to transfer them some money to help cover rent or buy a new phone. To make things even more realistic, the scammers may use AI to generate voice messages that impersonate the voice of their victim's child. Jake Moore, global cybersecurity advisor at ESET, told MailOnline: 'With such software, fraudsters can copy any voice found online and then they target their family members with voice notes that are convincing enough to make them fall for the scam.' Although it is known as the 'Hi Mum' scam, this phishing tactic doesn't always involve posing as children. By using publicly available information on social media, scammers learn enough about their target's family to choose the best person to impersonate. In some cases, scammers might claim to be a close personal friend of the target or even their parents. Research conducted by Santander found that scams pretending to be someone's son were the most successful, followed by daughters, and then mothers. The scam usually begins with a text from an unknown number claiming to be someone close to the recipient. The sender might claim that they have lost their phone and are using a friend's phone for the time being, which is why their number isn't familiar. If the target does reply, the fraudster will try to enter into a conversation about generic details they might have been able to learn from social media. Once they have their target's confidence, the scammer will suddenly claim that they urgently need financial help. In the 'Hi Mum' scam, criminals send a message pretending to be a family member or close personal friend. Once they have gained the target's trust, the scammer will claim they urgently need money The sender will insist that their normal bank account cannot be accessed for some reason, and demand that the money be sent to an unfamiliar account. To ensure their targets don't take the time to think, the scammer will push them to act straight away by creating a compelling story. Mr Moore says: 'Scammers are increasingly getting better at manipulating people into doing as they ask as the story can often sound convincing and legitimate.' While it might be easy to ignore a fake text, scammers are now using cutting-edge AI technology to create extremely convincing voice messages tailored for their victims. 'Scammers are also starting to take advantage of impressive generative AI technology where cloning any voice is now simple - even in a matter of moments,' says Mr Moore. Using recordings of someone's voice taken from social media or other sources, it is easy to make a convincing duplicate. Mr Moore says that he was even able to convince his own mother that an AI-generated recording of his voice was the real thing. Worryingly, these techniques are now becoming increasingly common. A clear sign of the scam is that the sender will ask for the money to be sent to an unfamiliar bank account rather than one associated with the person they are impersonating Chris Ainsley, head of fraud risk management at Santander, says: 'These scams are evolving at breakneck speed. 'We're hearing of instances where AI voice impersonation technology is being used to create WhatsApp and SMS voice notes, making the scam seem ever more realistic.' Since the start of 2025, Santander says that 506 of these scams have already tricked WhatsApp users out of £490,606 ($651,230). In April alone, 135 successful scams cost WhatsApp users £127,417 ($169,133). If you do get a text from a friend or relative, it is important that you take the proper precautions to ensure you are sending it to the right person. Mr Moore says: 'It goes without saying but never send money to any new account without doing your due diligence - even if the narrative sounds plausible. 'If you ever receive a suspicious message claiming to be a loved one requesting sensitive or financial information, call the person they are claiming to be on the number you already have stored in your phone first.' Likewise, due to the increasing risk of AI fakes, Mr Moore recommends creating a 'code word' within your family for emergencies to prove you are speaking to the right person. Mr Moore says you should ensure this is 'not obvious or something that could be found on social media too'. A spokesperson for WhatsApp told MailOnline: 'We want to make WhatsApp the safest place for private, personal communication, which is why we protect your personal conversations with end-to-end encryption. 'However, just like regular SMS or phone calls, anyone who has your phone number may attempt to contact you.' If you receive a message on WhatsApp from someone not in your contacts, you will get a notification in the message. This will let you know if you have group chats in common with the number or if they are texting from a different country. You also won't be able to open any links from a number that isn't in your contacts since these could contain malware or connect you to further scams. If you do believe the message is a scam, you can report it via the WhatsApp app by forwarding the message to the number 7726, which goes to the telephone network providers. In the case that you have transferred money or given out your details, call your bank immediately as they may be able to stop the transaction. CHOOSING A SECURE PASSWORD According to internet security provider Norton, 'the shorter and less complex your password is, the quicker it can be for the program to come up with the correct combination of characters. The longer and more complex your password is, the less likely the attacker will use the brute force method, because of the lengthy amount of time it will take for the program to figure it out. 'Instead, they'll use a method called a dictionary attack, where the program will cycle through a predefined list of common words that are used in passwords.' Here are some steps to follow when creating a new password: DO: Use a combination of numbers, symbols, uppercase and lowercase letters Ensure that the password is at least eight characters long Use abbreviated phrases for passwords Change your passwords regularly Log out of websites and devices after you have finished using them DO NOT:

Hackers may ‘try their luck' with other retailers after M&S breach, experts say
Hackers may ‘try their luck' with other retailers after M&S breach, experts say

Irish Examiner

time03-05-2025

  • Business
  • Irish Examiner

Hackers may ‘try their luck' with other retailers after M&S breach, experts say

Cybercriminals are becoming 'increasingly opportunistic' and willing to 'try their luck' with cyber attacks on firms in the same sector, experts have said after Harrods confirmed it was the latest retailer to be targeted. The luxury London department store said it had restricted internet access across its sites on Thursday as a precautionary measure following an attempt to gain unauthorised access to its systems. It follows a serious ransomware attack on Marks & Spencer that has forced the company to suspend online orders and halt all recruitment, and the UK-based Co-op has also confirmed it was the target of an attempted breach, and it too has shut down some of its IT systems as a precaution. It's typical for similar companies in the same sector to become secondary targets after a huge cyber attack Jake Moore, global cybersecurity adviser at Eset, said other retailers being targeted in the wake of the M&S breach was 'typical', as hacking groups are often inspired to 'try their luck' by using the same type of ransomware elsewhere. 'It's typical for similar companies in the same sector to become secondary targets after a huge cyber attack,' he said. 'As the strain of ransomware called DragonForce can simply be purchased on the dark web in a model called 'ransomware-as-a-service', other hacking groups are also able to attempt their luck on similar businesses and start demanding ransoms where possible. 'It is often a precautionary measure to shut down parts of a system after a major cyber attack to mitigate any threats and prevent similar breaches. 'However, attacks involving the DragonForce ransomware most commonly start by targeting known vulnerabilities such as attacking systems that have not been kept up to date with the latest security patches, so businesses need to be extra vigilant and improve how quickly they update their networks.' Cybersecurity expert Cody Barrow, chief executive of EclecticIQ, said the flurry of attacks showed cybercriminals are becoming bolder. What's deeply concerning is generative AI is accelerating the threat landscape 'Coming on the heels of recent breaches at Co-op and M&S, it highlights an alarming trend: attackers are becoming increasingly opportunistic, exploiting weaknesses across complex, highly interconnected supply chains,' he said, warning that artificial intelligence was also making it easier for lower-skilled hackers to put together sophisticated attacks. 'What's deeply concerning is generative AI is accelerating the threat landscape. 'Sophisticated phishing campaigns, deepfake social engineering, and adaptive malware are now within reach of even low-skilled attackers. 'This widespread access to advanced attack tools is driving up attack volume, speed, and complexity.' According to reports, a hacking group known as Scattered Spider is said to be behind the M&S attack, although this has not been confirmed. It also remains unclear if the three attacks are linked. It's a lesson again in the growing difficulty large organisations have in securing against threats in their supply chain, particularly as those threats grow in volume and sophistication Toby Lewis, head of threat analysis at cybersecurity firm Darktrace, said the attacks could be linked by a common piece of technology used by all three firms that has a vulnerability, or that Co-op and Harrods had stepped up their own security response in the wake of the M&S breach. 'Details of the cyber attack at Harrods are still low and we shouldn't rule out that the three incidents impacting M&S, Co-operative and Harrods are coincidence,' he said. 'However, with the information publicly available we can see two other likely scenarios: either a common supplier or technology used by all three retailers has been breached and used as an entry point to big-name retailers, or the scale of the M&S incident has prompted security teams to relook at their logs and act on activity they wouldn't have previously judged a risk. 'It's a lesson again in the growing difficulty large organisations have in securing against threats in their supply chain, particularly as those threats grow in volume and sophistication.'

M&S: Scattered Spider online cyber attack explained
M&S: Scattered Spider online cyber attack explained

Scotsman

time02-05-2025

  • Business
  • Scotsman

M&S: Scattered Spider online cyber attack explained

Watch more of our videos on and on Freeview 262 or Freely 565 Visit Shots! now Retailers are scrambling to recover after a wave of cyberattacks left shoppers in limbo 🛑 Sign up to our daily newsletter Sign up Thank you for signing up! Did you know with a Digital Subscription to Edinburgh News, you can get unlimited access to the website including our premium content, as well as benefiting from fewer ads, loyalty rewards and much more. Learn More Sorry, there seem to be some issues. Please try again later. Submitting... Cyberattack on Marks & Spencer has disrupted orders, payments, and recruitment since Easter Ransomware suspected, with hacking group Scattered Spider and the DragonForce tool linked to the breach Customers face suspended online orders and rising concerns over potential data exposure M&S recruitment halted, straining staff and service during a key retail period Similar attacks hit Harrods and Co-op, pointing to a broader cybersecurity crisis in UK retail In recent weeks, a cyber attack on Marks & Spencer has laid bare the vulnerabilities at the heart of the UK retail sector - and the consequences for shoppers, staff, and businesses are continuing to unfold. What began as a disruption over the Easter weekend has since ballooned into a nationwide issue, affecting everything from how customers place orders to how M&S recruits new staff. Advertisement Hide Ad Advertisement Hide Ad And with similar attacks reported at Harrods and the Co-op, experts warn this is not an isolated event, but part of a wider, deeply troubling trend. (Photo: Dan Kitwood/Getty Imag | Getty Images What happened? The first signs of trouble at M&S emerged during the Easter weekend, when customers began experiencing issues with click-and-collect orders and contactless payments. As the scale of the incident became clear, M&S shut down significant portions of its online infrastructure in response to what it described as a 'cyber incident.' This turned out to be a serious ransomware attack, widely believed - though not officially confirmed - to be the work of a hacking group known as Scattered Spider. Advertisement Hide Ad Advertisement Hide Ad The attack was so disruptive that M&S suspended all online orders and pulled job listings from its website, effectively halting recruitment. Cybersecurity experts believe that M&S fell victim to a ransomware-as-a-service attack - where criminal groups can purchase or rent powerful ransomware tools online. One such strain, called DragonForce, has been cited as a potential weapon used in the attack. This strain specifically targets outdated systems and known software vulnerabilities, meaning any business with lapses in its security protocols becomes a ripe target. Advertisement Hide Ad Advertisement Hide Ad According to Jake Moore of ESET, once a company like M&S is hit, it often triggers a domino effect across the sector. 'It's typical for similar companies in the same sector to become secondary targets after a huge cyber attack,' he says. 'Other hacking groups are also able to attempt their luck on similar businesses and start demanding ransoms where possible.' Sure enough, Harrods and the Co-op reported cyber incidents shortly after M&S. Harrods restricted internet access at its locations after detecting unauthorised access attempts, while Co-op shut down parts of its IT infrastructure following a suspected breach. Though the full details of these incidents remain unclear, cybersecurity professionals believe the attacks could be linked either through shared vulnerabilities in software or a common third-party supplier. Advertisement Hide Ad Advertisement Hide Ad What does it mean for shoppers? For M&S customers, the most immediate consequence is the suspension of all online orders, and whether you're looking to buy a spring outfit, stock up on homeware, or order your groceries online, you'll now have to visit a physical store. For those hoping to take advantage of bank holiday sales or browse from the comfort of home, this disruption has meant a sudden return to old-school shopping habits. Beyond the inconvenience, there's also growing anxiety over data security. While M&S has not confirmed any customer data breaches, the nature of ransomware attacks often involves the theft or encryption of sensitive information. Until full transparency is provided, a cloud of uncertainty will hang over the company's digital operations. Advertisement Hide Ad Advertisement Hide Ad What does it mean for staff? Customers also face a more indirect impact: fewer staff in stores and slower customer service. With recruitment halted, M&S is missing out on hiring for potentially hundreds of roles, putting more pressure on existing employees and potentially limiting the quality of in-store service during a busy season. While M&S has promised to restore services 'as quickly as possible,' the effects of the attack will likely linger for months. Customers may be more hesitant to use digital services, staff may face increased pressure as stores absorb the demands of online shoppers, and the business itself could suffer reputational damage, losing loyal customers to more resilient competitors. Advertisement Hide Ad Advertisement Hide Ad What does it mean for businesses? For M&S and other retailers, the incident has underscored the fragility of modern retail systems, and with businesses relying on interconnected online platforms, even a small breach can spiral into a full-blown operational crisis. Toby Lewis of cybersecurity firm Darktrace points out that one weak link - whether in a software system or a third-party vendor - can compromise entire operations. 'It's a lesson again in the growing difficulty large organisations have in securing against threats in their supply chain,' he says. Cody Barrow, CEO of EclecticIQ, adds that cybercriminals are becoming bolder, using tools enhanced by artificial intelligence to carry out more frequent and more sophisticated attacks. Advertisement Hide Ad Advertisement Hide Ad 'Sophisticated phishing campaigns, deepfake social engineering, and adaptive malware are now within reach of even low-skilled attackers,' he says. The implication is clear: without rapid investment in cybersecurity, no retailer is truly safe. Are you job-hunting? To view thousands of roles available right now, visit the JobsToday website.

M&S: Scattered Spider online cyber attack explained
M&S: Scattered Spider online cyber attack explained

Scotsman

time02-05-2025

  • Business
  • Scotsman

M&S: Scattered Spider online cyber attack explained

Retailers are scrambling to recover after a wave of cyberattacks left shoppers in limbo 🛑 Sign up to our Scotsman Money newsletter, covering all you need to know to help manage your money. Sign up Thank you for signing up! Did you know with a Digital Subscription to The Scotsman, you can get unlimited access to the website including our premium content, as well as benefiting from fewer ads, loyalty rewards and much more. Learn More Sorry, there seem to be some issues. Please try again later. Submitting... Cyberattack on Marks & Spencer has disrupted orders, payments, and recruitment since Easter Ransomware suspected, with hacking group Scattered Spider and the DragonForce tool linked to the breach Customers face suspended online orders and rising concerns over potential data exposure M&S recruitment halted, straining staff and service during a key retail period Similar attacks hit Harrods and Co-op, pointing to a broader cybersecurity crisis in UK retail In recent weeks, a cyber attack on Marks & Spencer has laid bare the vulnerabilities at the heart of the UK retail sector - and the consequences for shoppers, staff, and businesses are continuing to unfold. What began as a disruption over the Easter weekend has since ballooned into a nationwide issue, affecting everything from how customers place orders to how M&S recruits new staff. Advertisement Hide Ad Advertisement Hide Ad And with similar attacks reported at Harrods and the Co-op, experts warn this is not an isolated event, but part of a wider, deeply troubling trend. (Photo: Dan Kitwood/Getty Imag | Getty Images What happened? The first signs of trouble at M&S emerged during the Easter weekend, when customers began experiencing issues with click-and-collect orders and contactless payments. As the scale of the incident became clear, M&S shut down significant portions of its online infrastructure in response to what it described as a 'cyber incident.' This turned out to be a serious ransomware attack, widely believed - though not officially confirmed - to be the work of a hacking group known as Scattered Spider. Advertisement Hide Ad Advertisement Hide Ad The attack was so disruptive that M&S suspended all online orders and pulled job listings from its website, effectively halting recruitment. Cybersecurity experts believe that M&S fell victim to a ransomware-as-a-service attack - where criminal groups can purchase or rent powerful ransomware tools online. One such strain, called DragonForce, has been cited as a potential weapon used in the attack. This strain specifically targets outdated systems and known software vulnerabilities, meaning any business with lapses in its security protocols becomes a ripe target. Advertisement Hide Ad Advertisement Hide Ad According to Jake Moore of ESET, once a company like M&S is hit, it often triggers a domino effect across the sector. 'It's typical for similar companies in the same sector to become secondary targets after a huge cyber attack,' he says. 'Other hacking groups are also able to attempt their luck on similar businesses and start demanding ransoms where possible.' Sure enough, Harrods and the Co-op reported cyber incidents shortly after M&S. Harrods restricted internet access at its locations after detecting unauthorised access attempts, while Co-op shut down parts of its IT infrastructure following a suspected breach. Though the full details of these incidents remain unclear, cybersecurity professionals believe the attacks could be linked either through shared vulnerabilities in software or a common third-party supplier. Advertisement Hide Ad Advertisement Hide Ad What does it mean for shoppers? For M&S customers, the most immediate consequence is the suspension of all online orders, and whether you're looking to buy a spring outfit, stock up on homeware, or order your groceries online, you'll now have to visit a physical store. For those hoping to take advantage of bank holiday sales or browse from the comfort of home, this disruption has meant a sudden return to old-school shopping habits. Beyond the inconvenience, there's also growing anxiety over data security. While M&S has not confirmed any customer data breaches, the nature of ransomware attacks often involves the theft or encryption of sensitive information. Until full transparency is provided, a cloud of uncertainty will hang over the company's digital operations. Advertisement Hide Ad Advertisement Hide Ad What does it mean for staff? Customers also face a more indirect impact: fewer staff in stores and slower customer service. With recruitment halted, M&S is missing out on hiring for potentially hundreds of roles, putting more pressure on existing employees and potentially limiting the quality of in-store service during a busy season. While M&S has promised to restore services 'as quickly as possible,' the effects of the attack will likely linger for months. Customers may be more hesitant to use digital services, staff may face increased pressure as stores absorb the demands of online shoppers, and the business itself could suffer reputational damage, losing loyal customers to more resilient competitors. Advertisement Hide Ad Advertisement Hide Ad What does it mean for businesses? For M&S and other retailers, the incident has underscored the fragility of modern retail systems, and with businesses relying on interconnected online platforms, even a small breach can spiral into a full-blown operational crisis. Toby Lewis of cybersecurity firm Darktrace points out that one weak link - whether in a software system or a third-party vendor - can compromise entire operations. 'It's a lesson again in the growing difficulty large organisations have in securing against threats in their supply chain,' he says. Cody Barrow, CEO of EclecticIQ, adds that cybercriminals are becoming bolder, using tools enhanced by artificial intelligence to carry out more frequent and more sophisticated attacks. Advertisement Hide Ad Advertisement Hide Ad 'Sophisticated phishing campaigns, deepfake social engineering, and adaptive malware are now within reach of even low-skilled attackers,' he says. The implication is clear: without rapid investment in cybersecurity, no retailer is truly safe.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store