Glaze protects art from prying AIs

In recent years, the use of artificial intelligence (AI) in art and design has been on the rise. AI has been used to create art, assist in computer-generated designs, and even generated animations, but the use of AI in art has raised some issues. One of the key issues is how to protect the original… Continue reading Glaze protects art from prying AIs

Google warns users to take action to protect against remotely exploitable flaws in popular Android phones

As mobile phones become more and more popular, they have become vulnerable to increasingly sophisticated security threats. This is particularly relevant with the prevalence of Android phones, which make up over 80% of the world’s smartphone market. Recently, Google has warned users to take action to protect their Android devices against potentially serious security flaws.… Continue reading Google warns users to take action to protect against remotely exploitable flaws in popular Android phones

North Korean hackers target security researchers with a new backdoor

In recent news, there has been an alarming revelation of North Korean hackers targeting security researchers with a new backdoor. The motive is to gain access to their computers, steal confidential data, and even carry out espionage activities. The hackers reportedly use a malicious file called ‘Noko’ to gain access to the victims’ computer systems,… Continue reading North Korean hackers target security researchers with a new backdoor

Protect me from what I want

We live in a world obsessed with physical, emotional and material desires. Many of us are constantly chasing after the next best thing to try, buy, or do. We often forget that these desires can be our distraction from actual life, and can become a real hinderance to our peace and growth. One way to… Continue reading Protect me from what I want

Hackers Stole Data on 37 Million T-Mobile Customers

Data security has come under scrutiny in recent weeks after the cellphone company T-Mobile revealed hackers had stolen details from subscribers who had signed up between 2005 and last year. According to the company, the stolen data includes customers’ names, addresses and birth dates. T-Mobile’s security breach brings forward an important issue; the need for… Continue reading Hackers Stole Data on 37 Million T-Mobile Customers

Microsoft discovers Windows/Linux botnet used in DDoS attacks

In a surprising development, Microsoft has recently discovered a Windows/Linux botnet that was being used to perpetrate distributed denial-of-service (DDoS) attacks on a number of websites. The botnet, dubbed Apophis, was found by Microsoft’s Digital Crimes Unit while they were conducting an investigation into the activities of a group of hackers going by the aliases… Continue reading Microsoft discovers Windows/Linux botnet used in DDoS attacks

Protect lands

The tech world has been abuzz with news of a major investment in Protect AI – a San Francisco based startup that offers a cybersecurity solution for Artificial Intelligence (AI) projects. Last month, the company announced it had secured $13.5 million in series A funding to continue developing tools that help protect AI projects from… Continue reading Protect lands

Exit mobile version