Sun.Apr 05, 2020

article thumbnail

Experts uncovered hidden behavior in thousands of Android Apps

Security Affairs

A group of security researchers has found thousands of Android apps containing hidden backdoors and blacklists. Researchers from The Ohio State University, New York University, and CISPA Helmholtz Center for Information Security analyzed thousands of mobile applications for Android and discovered dangerous behavior, including backdoors and blacklists. “While these apps have rich and useful functionality that is publicly exposed to end users, they also contain hidden behaviors that are not

Passwords 109
article thumbnail

How to Keep Your Zoom Chats Private and Secure

WIRED Threat Level

Trolls. Prying bosses. Zoom's a great video chat platform, but a few simple steps also make it a safe one.

Security 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Popular OGUsers hacking forum breached for the second time in a year

Security Affairs

OGUsers, one of the most popular hacking forums, was hacked again, it is the second security breach it has suffered in a year. The popular hacking forum OGUsers was hacked again, it is the second security breach it has suffered in a year, the news was first reported by ZDNet. OGUsers is a black marketplace known for selling any kind of stolen data, including Instagram, Fortinet, Minecraft, Steam, PSN, Fortinet, Skype, and Snapchat accounts.

article thumbnail

How AI helps keeping Gmail inboxes malware free

Elie

This talk provides an overview of how Google uses AI to strengthen Gmail's document defenses and withstand attacks that evade traditional AVs

62
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Coronavirus-themed attacks March 29 – April 04, 2020

Security Affairs

In this post, I decided to share the details of the Coronavirus-themed attacks launched from March 29 to April 04, 2020. Threat actors exploit the interest in the COVID19 outbreak while infections increase worldwide, experts are observing new campaigns on a daily bases. Below a list of attacks detected this week. March 30, 2020 – Your colleague was infected with COVID19, this is the latest phishing lure.