Pornhub OnlyFans and Meta Join New Sextortion Prevention Platform This is actually pretty cool. The new service will allow a teenager (or anyone) that shared a nude image with someone who later posted it without their permission, to start the takedown process without having to send the sensitive image anywhere. They use the software to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ChatGPT 3.5 was basically a beta. They got lots of people to feed data into the system, including sensitive, proprietary data (oops) in order to train it. Now that it is “more” trained, OpenAI released ChatGPT 4. Contrary to the founding principles of investors like Elon Musk, the company, which claimed that it would be […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Section 702 of the Foreign Intelligence Surveillance Act allows the government to collect intelligence from non-Americans located outside the United States without a warrant. Section 702 cannot be used to target Americans. At least some people say that Section 702 needs some reform. When Section 702 was first enacted lawmakers knew that this could spell […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Given the risk of cyberattacks on critical infrastructure, the government is responding. After the Colonial Pipeline attack, the TSA (yes, they are responsible for pipeline security-don’t ask) issued a somewhat misguided set of rules to pipeline owners. Those rules were updated a couple of months later, but at least there is some activity. Actually quite […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As most of you probably know, TikTok is in the fight of its life. While, if Americans stop using it, that only represents a hundred million users, they are relatively speaking very wealthy and the data they represent is very useful. While TikTok says it is not sharing your data with the Chinese government, China, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 Three different cybercriminal groups claimed access to internal networks at communications giantĀ T-MobileĀ in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then […]
Continue reading →
[DISPLAY_ACURAX_ICONS]