article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

The partners aim to combine fingerprint and facial data to more effectively authenticate employees in workplace settings. It’s now commonplace for high-resolution video cams to feed endless streams of image data into increasingly intelligent data mining software.

Privacy 157
article thumbnail

Expert released PoC for Outlook for Android flaw addressed by Microsoft

Security Affairs

An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.” This one is mine. ” Below the timeline of the flaw: 10 December 2018 – First disclosed to MSRC 16 January 2019 – Video screen capture of vulnerability sent. Microsoft cannot repro. Case went cold.

Mining 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine.

Mining 91
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Techopedia (2021) defines a CSP as “a software environment where users can collaborate as well as create and work on different types of content such as text, audio and video pieces. This includes the digital content previously mentioned, but with a greater emphasis on multimedia, such as podcasts, video, digital images, and movies.

article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

We foresee regulations expanding beyond authentication and data privacy, and into more detailed requirements of network security and visibility into device bills of materials. not located behind routers or firewalls) to conduct future DDoS attacks on data centers and cloud services or for crypto currency mining purposes.

IoT 88
article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

She was pretty shocked when I showed her this as it was precisely the same verbal password as she used to authenticate to her bank. No video recording or photos needed. I've obfuscated parts of the screen above because no way, no how would I want to show this information publicly, especially my wife's password.