Internet Fraud TriplesWashington Post. The Post reports that the most common complaint was auction fraud, followed by non-delivery of merchandise, credit card fraud, and phony investments.The FBI reports that it received 48,000 complaints of Internet fraud in 2002, triple the number received in 2001, according to an article in the FBI Agent Had Affair With Chinese Double AgentBoston Globe. The story reports that 59-year-old James J. Smith recruited Katrina Leung, a Republican activist in California who worked covertly for the Chinese government and who used her access to the FBI to acquire classified documents.An FBI agent who was supposed to hunt for Chinese spies carried on a long affair with a woman believed to be a Chinese double agent, according to a story in the Microsoft VM Has VulnerabilityPCWorld. The story reports that Microsoft’s Virtual Machine (VM) contains a critical vulnerability that could allow a remote attacker to gain control of affected machines.Microsoft warned of two new security vulnerabilities affecting its Microsoft Virtual Machine, Microsoft Proxy Server 2.0, and Microsoft ISA Server 2000 products, according to a story in Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe