Not quite. 184 million passwords, with a twist:
“The problem? The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.”
www.techradar.com/pro/security...
Not quite. 184 million passwords, with a twist:
“The problem? The file was unencrypted. No password protection. No security. Just a plain text file with millions of sensitive pieces of data.”
www.techradar.com/pro/security...
“As director of national intelligence, Gabbard oversees US intelligence community… incl the CIA and NSA…By statute, she is the principal adviser to POTUS and National Security Council… charged with maintaining security of much of the most sensitive information in the government”
“As director of national intelligence, Gabbard oversees US intelligence community… incl the CIA and NSA…By statute, she is the principal adviser to POTUS and National Security Council… charged with maintaining security of much of the most sensitive information in the government”
This makes sense in the current situation, but is so creepy. And too clean burner phones are suspicious. You must act like an agent during Cold War and create a parallel identity: some social networks, work contacts, photos, apps. But NOT your actual phone number visible.
This makes sense in the current situation, but is so creepy. And too clean burner phones are suspicious. You must act like an agent during Cold War and create a parallel identity: some social networks, work contacts, photos, apps. But NOT your actual phone number visible.
Pages popping up to guide people how to “delete your data”.
Is that even possible? The top privacy promises are just exceptions. Data has been shared and if bankrupt or sold, info may be "accessed, sold or transferred"
www.sciencealert.com/millions-of-...
Pages popping up to guide people how to “delete your data”.
Is that even possible? The top privacy promises are just exceptions. Data has been shared and if bankrupt or sold, info may be "accessed, sold or transferred"
www.sciencealert.com/millions-of-...
But also, it seems very sensitive personal data has been widely and easily accessible.
But also, it seems very sensitive personal data has been widely and easily accessible.
It’s worse.
Check this paper by six researchers on AI agents being capable of scheming
“Not only do all foundations model lie in order to achieve their goals, they are actively exfiltrating themselves” Bart Willem Schermer comment
arxiv.org/pdf/2412.04984
It’s worse.
Check this paper by six researchers on AI agents being capable of scheming
“Not only do all foundations model lie in order to achieve their goals, they are actively exfiltrating themselves” Bart Willem Schermer comment
arxiv.org/pdf/2412.04984
Public consultation is open until end of February. Are these guidelines for pseudonymisation practical for you?
www.edpb.europa.eu/news/news/20...
Public consultation is open until end of February. Are these guidelines for pseudonymisation practical for you?
www.edpb.europa.eu/news/news/20...
insight.scmagazineuk.com/dora-arrives...
#CyberSecurity
insight.scmagazineuk.com/dora-arrives...
#CyberSecurity
There’s usually no need whatsoever to know train passengers’ gender.
My 2 cents: If, and only if eg you would offer a carriage for women only, that could be necessary.
curia.europa.eu/jcms/upload/...
There’s usually no need whatsoever to know train passengers’ gender.
My 2 cents: If, and only if eg you would offer a carriage for women only, that could be necessary.
curia.europa.eu/jcms/upload/...
@eliothiggins.bsky.social (@bellingcat.com) breaks down 4 key drivers of misinformation:
1️⃣ State actors
2️⃣ Proxy actors
3️⃣ Opportunistic manipulators
4️⃣ True believers
Shared at our seminar featuring:
🔹 @manisha.bsky.social
👏 Hosted by Richard Danbury
@eliothiggins.bsky.social (@bellingcat.com) breaks down 4 key drivers of misinformation:
1️⃣ State actors
2️⃣ Proxy actors
3️⃣ Opportunistic manipulators
4️⃣ True believers
Shared at our seminar featuring:
🔹 @manisha.bsky.social
👏 Hosted by Richard Danbury
”Because much of the collection is occurring through the advertising ecosystem—not code developed by the app creators themselves—this data collection is likely happening without users’ or even app developers’ knowledge.”
”Because much of the collection is occurring through the advertising ecosystem—not code developed by the app creators themselves—this data collection is likely happening without users’ or even app developers’ knowledge.”
These accounts pretend to be INTERPOL agents and will contact users via Direct Message. Don't fall for their tricks.
🛑 Block & report them
bsky.app/profile/inte...
These accounts pretend to be INTERPOL agents and will contact users via Direct Message. Don't fall for their tricks.
🛑 Block & report them
bsky.app/profile/inte...
“..broadcasting live footage accessible to anyone on the internet, the misconfigured cameras also exposed [collected data].. including photos of cars and logs of license plates. The real-time video and data feeds don’t require any usernames or passwords to access.”
“..broadcasting live footage accessible to anyone on the internet, the misconfigured cameras also exposed [collected data].. including photos of cars and logs of license plates. The real-time video and data feeds don’t require any usernames or passwords to access.”
One of my favorite sources has always been OECD, even not that boring!
Their AI portal is fantastic oecd.ai/en/
One of my favorite sources has always been OECD, even not that boring!
Their AI portal is fantastic oecd.ai/en/
Curious to hear your opinions. I am shocked, maybe I shouldn’t be.
www.linkedin.com/posts/janira...
Curious to hear your opinions. I am shocked, maybe I shouldn’t be.
www.linkedin.com/posts/janira...