Skip to main content

Home/ Digit_al Society/ Group items matching "vulnerabilities,ITGS" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Leading adviser quits over Instagram's failure to remove self-harm content | Instagram | The Guardian - 0 views

  •  
    "A leading psychologist who advises Meta on suicide prevention and self-harm has quit her role, accusing the tech giant of "turning a blind eye" to harmful content on Instagram, repeatedly ignoring expert advice and prioritising profit over lives. Lotte Rubæk, who has been on Meta's global expert group for more than three years, told the Observer that the tech giant's ongoing failure to remove images of self-harm from its platforms is "triggering" vulnerable young women and girls to further harm themselves and contributing to rising suicide figures."
dr tech

FCC bans AI voices in robocalls - Boing Boing - 0 views

  •  
    "AI-generated voices are extremely convincing and can converse without the obvious repetitions and scripted lines, making a dream tool for fraudsters, marketers and political campaigns. The Federal Communications Commission sees the costs of all this coming and is banning their use in robocalls. "Bad actors are using AI-generated voices in unsolicited robocalls to extort vulnerable family members, imitate celebrities and misinform votes," said FCC Chairwoman Jessica Rosenworcel in a press release. "State attorneys general will now have new tools to crack down on these scams and ensure the public is protected from fraud and misinformation.""
dr tech

New Go-playing trick defeats world-class Go AI-but loses to human amateurs | Ars Technica - 0 views

  •  
    "KataGo's world-class AI learned Go by playing millions of games against itself. But that still isn't enough experience to cover every possible scenario, which leaves room for vulnerabilities from unexpected behavior. "KataGo generalizes well to many novel strategies, but it does get weaker the further away it gets from the games it saw during training," says Gleave. "Our adversary has discovered one such 'off-distribution' strategy that KataGo is particularly vulnerable to, but there are likely many others.""
dr tech

(1) How Technology is "Downgrading Humans" (Tristan Harris X Capgemini) - YouTube - 0 views

  •  
    "Tristan Harris presents on 1) why humans as a species are vulnerable to technology, 2) why it's so hard to solve the issues of social media algorithms, artificial intelligence, and exponential tech, and 3) what it will take to come together to avoid these existential threats."
dr tech

China's Olympics app is pure spyware; preparing for cyber spillover; and simulating tomorrow's reality | American Enterprise Institute - AEI - 0 views

  •  
    "Cybersecurity researchers say the My2022 mobile app - the official app of the Beijing Winter Olympics - has serious security vulnerabilities and that "all Olympian audio is being collected, analyzed and saved on Chinese servers." Why This Matters: The Chinese government is mandating all Olympic athletes, coaches, and attendees use the My2022 app and, as of Thursday morning, the app is still available in the Apple and Android U.S. app stores where Americans can download it too."
dr tech

Recently uncovered software flaw 'most critical vulnerability of the last decade' | Software | The Guardian - 0 views

  •  
    "The flaw, dubbed "Log4Shell", may be the worst computer vulnerability discovered in years. It was uncovered in an open-source logging tool that is ubiquitous in cloud servers and enterprise software used across the industry and the government. Unless it is fixed, it grants criminals, spies and programming novices alike, easy access to internal networks where they can loot valuable data, plant malware, erase crucial information and much more."
dr tech

'So vague, it invites abuse': Twitter reviews controversial new privacy policy | Twitter | The Guardian - 0 views

  •  
    "Activists swiftly warned that the policy as it was published would backfire. The policy was vague and had been put together without much input from the communities most vulnerable to harassment and doxxing, the activists argued. They had little faith in Twitter's reporting and appeals process, which they described as unreliable, automated and allowing for little discussion about the enforcement of policies."
dr tech

How does Apple technology hold up against NSO spyware? | Apple | The Guardian - 0 views

  •  
    "The disclosure points to a problem security researchers have been warning about for years: that despite its reputation for building what is seen by millions of customers as a secure product, some believe Apple's closed culture and fear of negative press have harmed its ability to provide security for those targeted by governments and criminals. "Apple's self-assured hubris is just unparalleled," said Patrick Wardle, a former NSA employee and founder of the Mac security developer Objective-See. "They basically believe that their way is the best way. And to be fair … the iPhone has had incredible success. "But you talk to any external security researcher, they're probably not going to have a lot of great things to say about Apple. Whereas if you talk to security researchers in dealing with, say, Microsoft, they've said: 'We're gonna put our ego aside, and ultimately realise that the security researchers are reporting vulnerabilities that at the end of the day are benefiting our users, because we're able to patch them.' I don't think Apple has that same mindset.""
dr tech

'Facebook has a blind spot': why Spanish-language misinformation is flourishing | Facebook | The Guardian - 0 views

  •  
    "In the last year, Facebook adjusted some of the most fundamental rules about what gets posted on its platform, halting algorithmic recommendations of political groups, banning lies about vaccines and removing a number of high-profile figures for spreading misinformation and hate - including Donald Trump. But researchers say the social media platform is not enforcing those policies as effectively when it comes to misinformation in Spanish - a blind spot that may prove deadly as health lies spread through the most vulnerable populations during the global vaccine effort."
immapotaeto

Biden transition team forced to build its own cybersecurity protections - The Verge - 0 views

  •  
    "Biden's team is more vulnerable to cyberattacks "
dr tech

What Is The Internet Doing To Boomers' Brains? | HuffPost - 0 views

  •  
    "The first and most obvious explanation for older internet users' increased vulnerability to misinformation is the effect of aging on the brain. A huge body of research has demonstrated that the same factors that make older Americans susceptible to financial scams - lower impulse control, slower cognitive function, higher rates of social isolation - also make them vulnerable to misinformation. "
dr tech

U.K. Found 'Critical' Weakness in Huawei Equipment - Bloomberg - 0 views

  •  
    ""Critical, user-facing vulnerabilities" were found in the Chinese supplier's fixed-broadband products caused by poor code quality and an old operating system, the Huawei Cyber Security Evaluation Centre Oversight Board said in a report. "U.K. operators needed to take extraordinary action to mitigate the risk.""
dr tech

Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed | ZDNet - 0 views

  •  
    "As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus outbreak, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than as originally intended. "
dr tech

Hack the vote: terrifying film shows how vulnerable US elections are | Television & radio | The Guardian - 0 views

  •  
    "And these machines' vulnerabilities to hacking are "terrifying", Sarah Teale, co-director along with Simon Ardizzone and Russell Michaels, told the Guardian. America's current election infrastructure is, as Kill Chain explains, a prescription for disaster - an outdated, willfully naive system no more prepared for attack than four years ago."
dr tech

Iran 'revenge' could come in the form of cyber-attacks, experts warn | World news | The Guardian - 0 views

  •  
    "Hultquist noted that cyberwarfare evens the battlefield between Iran and the US. "That's why they choose an asymmetric battleground," he said. "We might have this massive advantage with a very sophisticated ability, but we also have this very sophisticated society that makes us very vulnerable to computer attacks.""
dr tech

Can Your Genetic Information Be Hacked? - 0 views

  •  
    "Now, researchers warn that these "direct to consumer" services could be vulnerable to a sort of genetic hacking. By uploading selected DNA sequences, they say, it may be possible, for example, to pull out the genomes of most people in a database or to identify people with genetic variants associated with specific traits such as Alzheimer's disease."
dr tech

Digital dystopia: how algorithms punish the poor | Technology | The Guardian - 0 views

  •  
    "Vast sums are being spent by governments across the industrialized and developing worlds on automating poverty and in the process, turning the needs of vulnerable citizens into numbers, replacing the judgment of human caseworkers with the cold, bloodless decision-making of machines. "
dr tech

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en masse / Boing Boing - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
dr tech

The Downfall of Computers - David Koff - Medium - 0 views

  •  
    "These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
dr tech

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide area's mobile activity / Boing Boing - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
1 - 20 of 42 Next › Last »
Showing 20 items per page