Category: Hacking
As AI Gains Intelligence, Necessary Regulation Lags Behind
“Artificial Intelligence (AI) is transforming the way we live and work, just like the internet did.”
Claims like these have become common in the media and academic journals. Large language models (LLMs) are algorithms that form the basis of this type of AI.
Twitter and the FBI, sitting in a tree –
And they aren’t just k-i-s-s-i-n-g….. It’s much worse.
What’s being disclosed in the now-weekly Twitter releases certainly doesn’t improve the image of the FBI (and, of course, other 3-letter and 4-letter agencies).
Google Paying $29.5 Million To Settle Lawsuits Over User Location Tracking
Google has agreed to pay a total of $29.5 million to settle two lawsuits regarding the company’s geographic tracking of their users.
LastPass Hack Update: Customer Information Accessed
LastPass, the password storage service, has just revealed that customer information was accessed during the hack of their data that occurred at the end of August 2022. The data was stored with a 3rd-party cloud storage provider. Previously they had said that it was “limited to the LastPass Development environment in which some of our source code and technical information was taken.”
Mac Pro Tips: How to install yabai and skhd
In our last post, we briefly went over yabai, which is a tiling window manager for macOS. If you’re not experienced with Linux systems, the concept of a window manager (WM) is likely foreign to you, so I’ll pause briefly to provide an explanation and definition of a window manager, specifically a “tiling” WM.
How to Google Like a (Internet) Gangsta
Google has become an important tool for most people. Unfortunately, this tool’s power levels tend to take a sharp blow in the average user’s hands (fingertips?).
Multi-factor Authentication and Why You Need It
As the threat of cyberattacks keeps on increasing, individuals and organizations need to take the necessary steps to protect their data. One of the tried and tested ways of deterring data breaches is using multi-factor authentication, commonly known as MFA. The primary reason MFA is hailed as an effective method…
Does Private or Incognito Mode Make Browsing Anonymous?
By now you know that your online activities are an open secret and can be tracked by various parties. While some users resort to deploying VPNs, others activate the incognito or private mode when browsing to keep their online activities away from prying eyes. So, how private is the incognito…
Gmail’s Spam Problem and What You Can Do About It
Google’s Gmail has been hailed as one of the best free email services around the world. Gmail has great security features, including 2-step authentication that provides industry-standard protection against hackers. In addition, it has robust spam filters, which will send all your bad incoming mail to the spam folder.
How to Create a Strong Password
Every week there are reports of new data breaches, where massive amounts of personal information are leaked and exposed. Many of these data breaches revolve around unscrupulous people getting access to personal accounts as a result of weak or compromised passwords. Basically, a password acts like a gate or a…
The Cognizant Breach: What You Should Know About Maze Ransomware Attacks
Cognizant, an American company providing IT services based in Teaneck, New Jersey, is one of the latest victims of the infamous Maze ransomware. The IT services provider operating in more than 37 countries, with a turnover of $16bn, said the attack took place on Friday, April 17th. According to the…
Zoombombing and Other Security Issues Surrounding Virtual Meetings and How to Prevent Zoombombing
Zoombombing and other security issues have become more common as web meetings and conference calls have become the new normal in the modern workplace. Though many people are aware of cybersecurity issues during online interactions, very few take virtual meeting security seriously. It is not uncommon for people to finish…
Equifax Data Breach Settlement: What to Expect if you Submitted a Claim
The Equifax data breach in 2017 was one of the largest in history at the time to compromise private data. Surprisingly, the Atlanta-based credit agency did not detect the breach for six weeks. Equifax’s breach leaked out personal information which in some instances included driver’s license and Social Security numbers,…
Nearly Two Dozen Texas Towns Victims of Coordinated Ransomware Attack, Single MSP Vulnerability Suspected
A ransomware attack affecting 22 towns in Texas is believed to have had a single point of origin: a security hole, malware, or other weakness in a common, as yet unnamed, managed services provider.
Massive Capital One Breach of Data Stored on Amazon Affects Millions
Capital One has revealed that it experienced a massive data breach of the personal data of credit applicants that was stored in the cloud on Amazon.