• Quotes
  • Shortcuts
The Executive's Internet
Sat, Dec 13th
icon
GoogleAmazonWikipedia


spacerspacer

 

 TECHNOLOGY NEWS
Setup News Ticker
   TECHNOLOGY NEWS
Searching for 'These Will'. (Return)

CNET NewsDec 13, 2025
Walking Counts as Exercise. These Strategies Will Make It a More Effective Workout
Experts break down how to make walking a better workout or if you should be doing more.

Mac RumorsDec 12, 2025
iOS 26.4 and iOS 27 Features Revealed in New Leak
Macworld's Filipe Espósito today revealed a handful of features that Apple is allegedly planning for iOS 26.4, iOS 27, and even iOS 28.


EngadgetDec 10, 2025
Hackers tricked ChatGPT, Grok and Google into helping them install malware
Ever since reporting earlier this year on how easy it is to trick an agentic browser, I've been following the intersections between modern AI and old-school scams. Now, there's a new convergence on the horizon: hackers are apparently using AI prompts to seed Google search results with dangerous commands. When executed by unknowing users, these commands prompt computers to give the hackers the access they need to install malware.

The warning comes by way of a recent report from detection-and-response firm Huntress. Here's how it works. First, the threat actor has a conversation with an AI assistant about a common search term, during which they prompt the AI to suggest pasting a certain command into a computer's terminal. They make the chat publicly visible and pay to boost it on Google. From then on, whenever someone searches for the term, the malicious instructions will show up high on the first page of results.

Huntress ran tests on both ChatGPT and Grok after discovering that a Mac-targeting data exfiltration attack called AMOS had originated from a simple Google search. The user of the infected device had searched "clear disk space on Mac," clicked a sponsored ChatGPT link and — lacking the training to see that the advice was hostile — executed the command. This let the attackers install the AMOS malware. The testers discovered that both chatbots replicated the attack vector.

As Huntress points out, the evil genius of this attack is that it bypasses almost all the traditional red flags we've been taught to look for. The victim doesn't have to download a file, install a suspicious executable or even click a shady link. The only things they have to trust are

  • CEOExpress
  • c/o CommunityScape | 200 Anderson Avenue
    Rochester, NY 14607
  • Contact
  • As an Amazon Associate
    CEOExpress earns from
    qualifying purchases.

©1999-2025 CEOExpress Company LLC