Security Technology

What OpenAI Did When ChatGPT Users Lost Touch With Reality

›
In tweaking its chatbot to appeal to more people, OpenAI made it riskier for some of them. Now the company has made its chatbot safer. Will ...

How OpenAI’s Changes Sent Some Users Spiraling

›
OpenAI adjusted ChatGPT’s settings, which left some users spiraling, according to our reporting. Kashmir Hill, who reports on technology and...

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

›
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian informatio...

Cryptology Group Held an Election, but Can’t Decrypt the Results

›
A global group of researchers was unable to read the vote tally, after an official lost one of three secret code keys needed to unlock a hyp...

The Fate of Google’s Ad Tech Monopoly Is Now in a Judge’s Hands

›
A judge queried lawyers about whether a breakup made sense during closing arguments on how to fix the tech giant’s dominance in online adver...

INSS começa a exigir biometria para novos pedidos de benefício

›
Em julho, o presidente Luiz Inácio Lula da Silva (PT) assinou um decreto que determinou a exigência de  biometria  para novos pedidos de be...

CrowdStrike demite funcionário que teria passado informações para hackers

›
A CrowdStrike confirmou a demissão de um funcionário que teria repassado capturas de tela internas ao grupo Scattered Lapsus$ Hunters. O e...

Invasão em apps conectados ao Salesforce afeta mais de 200 empresas

›
Um ataque hacker de grande escala expôs dados de mais de 200 empresas que utilizam serviços do Salesforce , segundo o Google. O episódio ge...

US Border Patrol Is Spying on Millions of American Drivers

›
Plus: The SEC lets SolarWinds off the hook, Microsoft stops a historic DDoS attack, and FBI documents reveal the agency spied on an immigrat...

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

›
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager ...

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

›
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and...

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

›
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonatio...

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

›
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple...

We Asked Roblox’s C.E.O. About Child Safety. It Got Tense.

›
This week the company announced that it would require users to undergo an A.I.-powered age estimation process in order to chat with others o...

Trump Elevates Once-Fringe Meme Makers to the Mainstream

›
Right-wing users have tapped A.I. tools to promote President Trump’s agenda. He took notice. Fonte: Leia a matéria original

The A.I. Boom Has Found Another Gear. Why Can’t People Shake Their Worries?

›
It is a time of superlatives in the tech industry, with historic profits, stock prices and deal prices. It’s enough to make some people very...

4 People Indicted in Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China

›
A federal prosecutor alleged that one defendant boasted that his father “had engaged in similar business for the Chinese Communist Party.” F...

This Hacker Conference Installed a Literal Anti-Virus Monitoring System

›
At New Zealand's Kawaiican cybersecurity convention, organizers hacked together a way for attendees to track CO2 levels throughout the v...

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

›
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's targeting Windows users. Active since mid-2...

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

›
Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) fra...
‹
›
Home
View web version
Powered by Blogger.