Disclosure: All of the companies mentioned are clients of the author. This week, I’m at HP’s Amplify partner conference in Chicago. Like a lot of companies, HP is struggling with the surprisingly fast adoption of generative artificial intelligence (AI). Unlike most firms, HP is expected to conceive of and build products for a future that… Continue reading Being future ready in a generative AI world
Russian Cyberwarfare Documents Leaked
Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security service or FSB, the domestic… Continue reading Russian Cyberwarfare Documents Leaked
4 Secrets Burglars Don’t Want You to Know
Home4 Secrets Burglars Don’t Want You to Know By Alina Bradford Senior Writer, Safety & Security Expert March 30, 2023Share Article SafeWise is an independent review site. We may earn money when you click links on our site. Learn how we rank and review. Don’t think you’ll get robbed? In 2021, around 19 people in… Continue reading 4 Secrets Burglars Don’t Want You to Know
Tech big wigs: Hit the brakes on AI rollouts
More than 1,100 technology luminaries, leaders and scientists have issued a warning against labs performing large-scale experiments with artificial intelligence (AI) more powerful than ChatGPT, saying the technology poses a grave threat to humanity. In an open letter published by Future of Life Institute, a nonprofit organization with the mission to reduce global catastrophic and existential risks to humanity, Apple… Continue reading Tech big wigs: Hit the brakes on AI rollouts
The Security Vulnerabilities of Message Interoperability
Jenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate with each other: The Digital Markets Act ruled that users on different platforms should be able to exchange messages with each other. This opens up a real Pandora’s box. How will the networks manage… Continue reading The Security Vulnerabilities of Message Interoperability
How Does a Window Sensor Work?
HomeHow Does a Window Sensor Work? By Celeste Tholen Contributing Writer March 29, 2023Share Article SafeWise is an independent review site. We may earn money when you click links on our site. Learn how we rank and review. Window sensors are must-haves for comprehensive home security systems—they can promptly notify you if someone attempts to… Continue reading How Does a Window Sensor Work?
Security Vulnerabilities in Snipping Tools
Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.
UK Sets Up Fake Booter Sites To Muddy DDoS Market
The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake… Continue reading UK Sets Up Fake Booter Sites To Muddy DDoS Market
Apple Reality tidbits continue to leak — is the product really ready?
Well, this is something you don’t see very often: secrets about a still-unannounced product — shared only with a small, hand-picked group of senior managers — that somehow leak. Ruining the surprise That’s what’s happened regarding Apple’s most secret non-secret product, its first-generation mixed-reality headset destined (we think) to appear at WWDC in June and… Continue reading Apple Reality tidbits continue to leak — is the product really ready?
Hacks at Pwn2Own Vancouver 2023
An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day exploits and exploit chains to win $375,000 and a Tesla Model 3. The first to fall was Adobe… Continue reading Hacks at Pwn2Own Vancouver 2023