Sun.Dec 30, 2018

article thumbnail

Facebook tracks non-users via Android Apps

Security Affairs

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According to a report presented by Privacy International yesterday at 35C3 hacking conference held in Germany, the list of Android apps that send tracking and personal information back to Facebook includes dozens of apps including Kayak , Yelp, and Shazam , “Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools.

Privacy 92
article thumbnail

How Facebook Tracks Non-Users via Android Apps

Threatpost

Facebook tracks Android users via apps, even if they aren’t Facebook users.

Privacy 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers bypassed vein based authentication with a fake hand

Security Affairs

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from a photo. If you consider vein based authentication totally secure, you have to know that a group of researchers demonstrated the opposite at the Chaos Communication Congress hacking conference. Vein based authentication scan invisible vein pattern (i.e. shape, size, and position of a user’ s veins) of the palm, back of the hand, fingers, etc, to identify the user.

article thumbnail

My MEDIUM Article, “Cybersecurity Trends for 2019?—?The Good and The Bad?”

Architect Security

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019?—?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security Affairs newsletter Round 194 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! Cisco ASA is affacted by a privilege escalation flaw. Patch it now! France data protection agency fines Uber 400k Euros Over 2016 Data Breach.

More Trending

article thumbnail

The Most Dangerous People on the Internet in 2018: Trump, Zuck and More

WIRED Threat Level

From Donald Trump to Russian hackers, these are the most dangerous characters we've been watching online in 2018.

article thumbnail

Predictions 2018: How I Did. (Pretty Damn Well, Turns Out)

John Battelle's Searchblog

Mssr. Nostradamus. Every year I write predictions for the year ahead. And at the end of that year, I grade myself on how I did. I love writing this post, and thankfully you all love reading it as well. These “How I Did” posts are usually the most popular of the year, beating even the original predictions in readership and engagement. What’s that about, anyway?