Skip to main content

Home/ Literacy with ICT/ Group items tagged malicious

Rss Feed Group items tagged

John Evans

The 13 Best Chrome Extensions by Google You Probably Aren't Using - 3 views

  •  
    "Official Chrome extensions are supports for other Google products. They come with another side benefit - they are automatically authenticated and safe. The Chrome Web Store is safer now than before, but it can still be the Wild West for malicious extensions developers. Maybe you know about some of these official extensions…maybe you don't. Either way, let's visit the little corner on the Store that holds some of the best official extensions you should use. We start with the most beautiful of them all…"
John Evans

They Don't All Really Need Laptops Do They? - 0 views

  •  
    I've been getting this question a lot lately from administrators, parents, and taxpayers. The question isn't malicious, but rather comes from folks with a vested interest in making sure that our technology dollars directly benefit students. Does giving teachers laptops directly benefit students? For people who aren't actively teaching in a classroom, that's a hard question to answer.
tech vedic

How to remove 'Yontoo' adware Trojan from OS X system? - 0 views

  •  
    Yontoo Trojan, detected by noted security company Dr. Web is blamed for tracking the browsing behaviors across a range of popular browsers like Safari, Chrome, and Firefox. It may pretend as a media player, download manager, or other plug-in, thereby directing you to some maliciously crafted Web sites disguised as sources for file sharing and movie trailers.
tech vedic

How to family-proof your PC - 0 views

  •  
    It is important to safeguard your PC against malicious software. You need to resist dodgy downloads, suspicious pop-up and ads.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
tech vedic

How to clear off viruses and malware from an infected PC? - 0 views

  •  
    Despite updated operating system, browser, browser add-ons, installed firewall, and acute computer security settings, clever viruses, spyware or Trojans may find loop-holes to slip into your system. Not only in terms of performance, but in terms of stability and security too, these malicious software push you on back-foot. What to do next?
John Evans

New AI fake text generator may be too dangerous to release, say creators | Technology |... - 2 views

  •  
    "The creators of a revolutionary AI system that can write news stories and works of fiction - dubbed "deepfakes for text" - have taken the unusual step of not releasing their research publicly, for fear of potential misuse. OpenAI, an nonprofit research company backed by Elon Musk, Reid Hoffman, Sam Altman, and others, says its new AI model, called GPT2 is so good and the risk of malicious use so high that it is breaking from its normal practice of releasing the full research to the public in order to allow more time to discuss the ramifications of the technological breakthrough."
John Evans

Google Phishing Quiz Helps You Spot Fake Emails | Inc.com - 2 views

  •  
    "Phishing--trying to trick someone into providing their username and password to a malicious site--is the most common form of cyberattack, according to Justin Henck, product manager at Jigsaw, formerly named Google Ideas. With that in mind, Jigsaw is providing an 8-question online quiz about spotting a phishing email before you give hackers access to your accounts. It's not as easy as you'd think, but the quiz will teach you to be better at it."
John Evans

How do we teach students to identify fake news? | EdCan Network - 4 views

  •  
    "In a "post-truth" era where people are increasingly influenced by their emotions and beliefs over factual information, fact and fiction can be difficult to distinguish, and fake news can spread rapidly through mainstream media sources and social networks. Moreover, fake news is often meant to do harm, by tricking us into believing a lie or unfairly discrediting a person or political movement. Given this malicious intent, students must learn to approach news and information with a critical eye in order to identify intentionally misleading sources (although recent studies confirm that this is an uphill battle for both adults and young people). Teachers therefore play a crucial role in ensuring that their students develop the skills to decipher the many streams of information available to them."
John Evans

Eva Galperin: What you need to know about stalkerware | TED Talk - 1 views

  •  
    ""Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims."
John Evans

Deepfakes are getting better-but they're still easy to spot | Ars Technica - 0 views

  •  
    "Last week, Mona Lisa smiled. A big, wide smile, followed by what appeared to be a laugh and the silent mouthing of words that could only be an answer to the mystery that had beguiled her viewers for centuries. A great many people were unnerved. Ars Technica Join Ars Technica and Get Our Best Tech Stories DELIVERED STRAIGHT TO YOUR INBOX. SIGN ME UP Will be used in accordance with our Privacy Policy Mona's "living portrait," along with likenesses of Marilyn Monroe, Salvador Dali, and others, demonstrated the latest technology in deepfakes-seemingly realistic video or audio generated using machine learning. Developed by researchers at Samsung's AI lab in Moscow, the portraits display a new method to create credible videos from a single image. With just a few photographs of real faces, the results improve dramatically, producing what the authors describe as "photorealistic talking heads." The researchers (creepily) call the result "puppeteering," a reference to how invisible strings seem to manipulate the targeted face. And yes, it could, in theory, be used to animate your Facebook profile photo. But don't freak out about having strings maliciously pulling your visage anytime soon. "Nothing suggests to me that you'll just turnkey use this for generating deepfakes at home. Not in the short-term, medium-term, or even the long-term," says Tim Hwang, director of the Harvard-MIT Ethics and Governance of AI Initiative. The reasons have to do with the high costs and technical know-how of creating quality fakes-barriers that aren't going away anytime soon."
Phil Taylor

The top 10 most dangerous internet search terms - Telegraph - 1 views

  • Users surfing the web for song lyrics, free music tracks and screen savers are most at risk of accidentally downloading malicious software, a study has found
tech vedic

Hackers use bogus Chrome, Firefox extensions to pilfer social media accounts - 0 views

  •  
    Hacking cases are increasing day by day. There are several tricks played by hackers to steal your personal information online.
1 - 13 of 13
Showing 20 items per page