Fri.Mar 14, 2025

article thumbnail

Worried about DeepSeek? Turns out, Gemini is the biggest data offender

Collaboration 2.0

It's an AI privacy showdown. How much data does your favorite chatbot collect?

Privacy 337
article thumbnail

A New Era of Attacks on Encryption Is Starting to Heat Up

WIRED Threat Level

The UK, France, Sweden, and EU have made fresh attacks on end-to-end encryption. Some of the attacks are more crude than those in recent years, experts say.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 5 best rolling release Linux distributions - and why you should be using one

Collaboration 2.0

If you're looking for a new Linux distribution, maybe it's time you tried a rolling release distribution. Here are my top five options.

IT 306
article thumbnail

Insurer Notifying 335,500 Customers, Agents, Others of Hack

Data Breach Today

Texas Incident is Largest Breach Reported by a Health Plan So Far in 2025 A Texas-based insurance firm is notifying more than 335,500 people of a December hack involving their sensitive personal and health information. The breach affects many - but not all - of the company's policyholders, agents and insurance carrier partners in multiple states.

Insurance 213
article thumbnail

Going Beyond Chatbots: Connecting AI to Your Tools, Systems, & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.

article thumbnail

This thumb-sized SSD is my new favorite iPhone accessory for work travel - how it works

Collaboration 2.0

The Planck SSD is a handy USB-C accessory that gives any device additional storage, especially for on-the-go video recording.

IT 291

More Trending

article thumbnail

Regolith Linux makes learning a tiling window manager easy

Collaboration 2.0

A tiling window manager can be a thing of efficient beauty, but with them can come a steep learning curve. Regolith Linux aims to lesson that curve and ease the transition.

288
288
article thumbnail

Suspected LockBit Ransomware Developer Extradited to US

Data Breach Today

Feds Accuse Dual Russian-Israeli National of Serving as Key Member of Operation An accused developer for Russian-speaking ransomware group LockBit, 51-year-old Rostislav Panev, appeared in a U.S. courtroom after being extradited from Israel. The dual Russian and Israeli citizen faces a 41 count superseding criminal indictment charging him with being a key member of the group.

article thumbnail

One of my favorite smartwatches has a timeless analog look - and the features I need

Collaboration 2.0

For those who prefer a classic timepiece over the sleek, tech-heavy look of most smartwatches, the Withings ScanWatch Nova blends traditional analog styling with robust health and wellness features.

265
265
article thumbnail

360 Privacy Raises $36M to Expand Threat Protection Services

Data Breach Today

Investment to Scale Engineering, Expansion from Data Deletion to Threat Reduction Executive digital protection firm 360 Privacy raised $36 million to expand its engineering team and boost its ability to remove sensitive data from brokers. The company is shifting from a data deletion focus to broader threat mitigation, tackling risks from digital tracking and location data leaks.

Privacy 130
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Worried about DeepSeek? Turns out, Gemini collects more user data

Collaboration 2.0

It's an AI privacy showdown. How much data does your favorite chatbot collect?

Privacy 263
article thumbnail

DeepSeek-R1 Can Almost Generate Malware

Data Breach Today

DeepSeek Comes Very Close to Producing a Keylogger and Ransomware Security researchers used the Chinese DeepSeek-R1 artificial intelligence reasoning model to come close to developing ransomware variants and keyloggers with evasion capabilities. The model needs prompt engineering and its output requires code editing.

article thumbnail

What if AI ran ER triage? Here's how it sped up patient care in real-world tests

Collaboration 2.0

A first-of-its-kind study from Yale and Johns Hopkins tested an AI program at three emergency rooms to see if it could help nurses make quicker, more accurate decisions and speed up patient flow. Here's what happened.

IT 255
article thumbnail

ISMG Editors: The X Outage - When DDoS and Politics Converge

Data Breach Today

Also: Gartner's Sydney Summit Highlights, Rising OT Security Risks In this week's update, ISMG editors discussed Xs major DDoS outages, politically motivated cyberattacks, key takeaways from Gartners Security & Risk Summit in Sydney, and rising operational technology threats highlighted in recent Dragos and Gartner reports.

Risk 130
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Linux power users: Here's a distro with a refreshing approach to OS design

Collaboration 2.0

NixOS is a well-designed OS with a fantastic array of layouts and features, but I recommend it to Linux users who aren't afraid of a little learning curve.

IT 253
article thumbnail

Accessibility testing in mobile applications: Ensuring inclusivity for all

OpenText Information Management

In our tech-driven world, mobile applications have become a fundamental part of everyday life, providing endless services and conveniences right at our fingertips. However, not everyone experiences mobile applications in the same way. For 1.3 billion people around the globe with disabilities, accessing and using applications can present significant challenges.

Access 52
article thumbnail

6 things I always do after setting up Windows 11 - and why you should too

Collaboration 2.0

Microsoft's default settings for Windows 11 are filled with tiny annoyances, including unnecessary taskbar icons and unwanted apps. Here's how to declutter your new setup and maximize your security settings.

Security 236
article thumbnail

EIOPA Publishes Consultation on Opinion on AI Governance and Risk Management

Data Matters

On February 12, 2025, the European Insurance and Occupational Pensions Authority ( EIOPA ) published a consultation on its draft opinion on artificial intelligence ( AI ) governance and risk management (the Opinion ). The post EIOPA Publishes Consultation on Opinion on AI Governance and Risk Management appeared first on Data Matters Privacy Blog.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

3 reasons why Apple Watch's popularity is dropping and what's taking its place

Collaboration 2.0

The smartwatch market is down, and the Apple Watch plays a major role in that decline.

Marketing 236
article thumbnail

98% Spike in Phishing Campaigns Leveraging Russian (.ru) Domains

KnowBe4

A KnowBe4 Threat Lab publication Authors: Martin Kraemer, Jeewan Singh Jalal, Anand Bodke, and James Dyer EXECUTIVE SUMMARY : We observed a 98% rise in phishing campaigns hosted on Russian (.ru) top-level domains (TLDs) from December 2024 to January 2025, primarily used for credential harvesting.

article thumbnail

These 3 AI themes dominated SXSW - and here's how they can help you navigate 2025

Collaboration 2.0

I sat through a dozen AI panels at SXSW, and three dominant themes came up again and again. Here's what they mean for you.

235
235
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: Im speaking at the Rossfest Symposium in Cambridge, UK, on March 25, 2025. I’m speaking at the University of Toronto’s Rotman School of Management in Toronto, Ontario, Canada, on April 3, 2025. The list is maintained on this page.

71
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

OpenAI wants to trade gov't access to AI models for fewer regulations

Collaboration 2.0

The company pitches its proposal as a way to counter China's AI advances. Google makes a similar argument for weakening copyright restrictions.

Access 226
article thumbnail

Jamf wins Best Mobile Security Solution Award at teissAwards 2025

Jamf

Jamf Mobile Security wins Best Mobile Security Solution at teissAwards2025, highlighting Jamf excellence in mobile cybersecurity and device protection

article thumbnail

This Linux distro can be used without installation (and it's totally free)

Collaboration 2.0

If you're a creator or digital artist looking for a Linux distro, Dynebolic was designed with you in mind. It's back after a 10-year hiatus and still just as good.

IT 220
article thumbnail

Friday Squid Blogging: SQUID Band

Schneier on Security

A bagpipe and drum band : SQUID transforms traditional Bagpipe and Drum Band entertainment into a multi-sensory rush of excitement, featuring high energy bagpipes, pop music influences and visually stunning percussion!

88
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Watch out, Shokz - Samsung might be entering the open-ear earbud game this summer

Collaboration 2.0

During its rumored summer Unpacked event, industry insiders say Samsung could announce a pair of open-ear earbuds.

IT 209
article thumbnail

ClickFix: How to Infect Your PC in Three Easy Steps

Krebs on Security

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ ClickFix ,” the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware.

Phishing 266
article thumbnail

How I upgraded to Wi-Fi 7 home internet with the easiest router setup yet

Collaboration 2.0

Non-tech-savvy users will appreciate the Eero 7's straightforward installation and consistently fast performance.

209
209