Skip to main content

Home/ ITGSonline/ Group items matching "control,vulnerabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed | ZDNet - 0 views

  •  
    "As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus outbreak, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than as originally intended. "
dr tech

What Is The Internet Doing To Boomers' Brains? | HuffPost - 0 views

  •  
    "The first and most obvious explanation for older internet users' increased vulnerability to misinformation is the effect of aging on the brain. A huge body of research has demonstrated that the same factors that make older Americans susceptible to financial scams - lower impulse control, slower cognitive function, higher rates of social isolation - also make them vulnerable to misinformation. "
dr tech

Elon Musk and Sam Altman's OpenAI and Pennsylvania State University made a tool to protect artificial intelligence from hacks - Quartz - 0 views

  •  
    "To thwart such hackers, Elon Musk's OpenAI and Pennsylvania State University released a new tool this week called "cleverhans," that lets artificial intelligence researchers test how vulnerable their AI is to adversarial examples, or purposefully malicious data meant to confuse the algorithms. Once the vulnerability has been found, a defense to the attack can automatically be applied."
dr tech

Efail: can email be saved? / Boing Boing - 0 views

  •  
    "The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email? One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
dr tech

"Privacy Not Included": Mozilla's guide to insecure, surveillant gadgets to avoid / Boing Boing - 0 views

  •  
    ""Privacy Not Included" is Mozilla's Christmas shopping (anti)-guide to toys and gadgets that spy on you and/or make stupid security blunders, rated by relative "creepiness," from the Nintendo Switch (a little creepy) to the Fredi Baby monitor (very creepy!). Mozilla's reviews include a detailed rationale for each ranking, including whether the product includes encryption, whether it forces a default password change, how easy to understand the documentation is, whether it shares your data for "unexpected reasons," whether it has known security vulnerabilities, whether it has parental controls and more."
1 - 6 of 6
Showing 20 items per page