Sun.Sep 09, 2018

article thumbnail

Social Media Too Shall Pass

John Battelle's Searchblog

At dinner last night with my wife and our 14 year-old daughter, I noticed a circular table of four teenage girls eating alone. They were about the same age as my daughter, who wasn’t exactly thrilled to be stuck with her parents as company on her first weekend of the school year. As we ate, I paid attention to the group’s dynamics, imagining them to be a possible reflection of what my daughter would be doing once she started going out alone with friends in New York City.

IT 106
article thumbnail

Social Engineering At Work: Some books that have helped me

Architect Security

One of my talks is about using “Social Engineering at work” – how to gain and utilize positive influence to get things done.

81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Everything You Should Do Before You Lose Your Phone

WIRED Threat Level

Misplacing your smartphone—or worse, having it stolen—is awful. But you can at least minimize the damage with a few easy steps.

IT 80
article thumbnail

'Right to be forgotten' could threaten global free speech, say NGOs

The Guardian Data Protection

ECJ hears France’s data regulator wants to extend 2014 ruling to apply universally The so-called ‘right to be forgotten’ online is in danger of being transformed into a tool of global censorship through a test case at the European court of justice (ECJ) this week, free speech organisations are warning. An application by the French data regulator for greater powers to remove out of date or embarrassing content from internet domains around the world will enable authoritarian regimes to exert contr

IT 55
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The main source of infection on ICS systems was the internet in H1 2018

Security Affairs

Researchers from Kaspersky have published a new report on the attacks on ICS systems observed by its products in the first half of 2018. Kaspersky Lab experts have published a new report titled “Threat Landscape for Industrial Automation Systems” report for H1 2018, that includes interesting data related to attacks against the ICS systems. The security firm detected over 19,400 samples belonging to roughly 2,800 malware families, most of which were not threats specifically designed to this cate

More Trending

article thumbnail

Domestic Kitten – An Iranian surveillance operation under the radar since 2016

Security Affairs

CheckPoint uncovered an extensive surveillance operation conducted by Iranian APT actor and tracked as Domestic Kitten aimed at specific groups of individuals. Researchers at security firm CheckPoint uncovered an extensive surveillance operation conducted by Iranian APT actor and tracked as Domestic Kitten aimed at specific groups of individuals. Cyber spies used malicious mobile apps that collect sensitive information on the target device and implements specific features to spy on the victims,

article thumbnail

If You’re an eDiscovery Professional Interested in Predictive Coding, Here is a Site You May Want to Check Out: eDiscovery Trends

eDiscovery Daily

On his Complex Discovery site, Rob Robinson does a great job of analyzing trends in the eDiscovery industry and often uses surveys to gauge sentiment within the industry for things like industry business confidence. Now, Rob is proving and overview and conducting a survey regarding predictive coding technologies and protocols for representatives of leading eDiscovery providers that should prove interesting.

Mining 31
article thumbnail

Security Affairs newsletter Round 179 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! · John McAfees Bitfi cryptocurrency wallet was hacked by a security duo. · Kaspersky warns of a new Loki Bot campaign target corporate mailboxes. · MagentoCore skimmer already infected 7,339 Magento stores