It is certainly a noble gesture, but one that is doomed to fail. The San Francisco city attorney is suing 16 websites that create and distribute non-consensual AI-generated pornography. This is a first of a kind lawsuit. The sites, which are not named, allow paying customers to upload photos of real people, apply AI to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Using a badge to get you in the office (and for some companies out of the office as well) may not be as secure as you thought it was. French security services firm Quarkslab has made an eye-popping discovery: a significant backdoor in millions of contactless cards made by Shanghai Fudan Microelectronics Group, a leading […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unfortunately, data breaches are with us to stay, at least for the near term. I’d like to think that they will end soon, but I don’t think that is going to happen. Today web site FlightAware warned that some customers’ information has been ‘exposed’, including social security numbers. FlightAware claims to be one of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
White House Working on Cyber Insurance Policy for Catastrophes The White House is working on a policy proposal to stabilize the economy in case of a massive cyber incident. This would require help from Congress, of course, but it is certainly possible that we could have a cyber 9/11 that would require a federal bailout. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Twitter’s AI tool, Grok, has very limited “guard rails”. For example, one Grok AI image shows Trump piloting a plane that looks like it is about to crash into the Twin Towers with one of the towers already in flames. Even though Grok says that it won’t let you create images that infringe on copyrights […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
API Keys are an alternative to passwords for connecting to a computer or web service. Typically, API Keys are used by software applications to talk to other applications and are considered more secure than using userids and passwords to authenticate. Unfortunately, too many developers don’t treat APIkKeys like the security risk they are. API keys […]
Continue reading →
[DISPLAY_ACURAX_ICONS]