Fri.Nov 24, 2017

article thumbnail

What Amazon Echo and Google Home Do With Your Voice Data—And How to Delete It

WIRED Threat Level

Like the idea of Amazon Echo and Google Home, but feel uneasy about all that recording? Here's what they listen to—and how to delete it.

IT 111
article thumbnail

Weekly podcast: Uber, Tether, Bitcoin and Western Union

IT Governance

This week, we discuss Uber’s cover-up of a 2016 breach that compromised 57 million drivers’ and customers’ personal information, the theft of almost $31 million worth of USDT and more than €100,000 worth of Bitcoin, and good news for victims of Western Union transfer scams. Hello and welcome to the IT Governance podcast for Friday, 24 November 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 62 (Rockhampton Edition)

Troy Hunt

This is going to be a couple of weeks of polar opposite updates: This week I'm in Rockhampton, a regional centre in my home state where I'm surrounded by gum trees, chirping birds and a croc-invested river. Next week will be Washington DC where I'll have just finished testifying in front of US Congress. Whoa. That's the big story this week. This year.

article thumbnail

Jewson payment card breach affects almost 1,700 customers

IT Governance

The personal information of almost 1,700 customers has potentially been exposed after builders merchant Jewson suffered a data breach. The affected data is said to include “names, location, billing address, password, email, phone number, payments details, card expiry dates and CVV numbers” and “may have fallen into the hands of an unauthorised person”.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CYBERSECURITY AND GDPR: WHERE WE ARE HEADING

DLA Piper Privacy Matters

The European General Data Protection Regulation (“GDPR”) is leading to a change culture, which will increase not only data protection but also security awareness. Below you will find the main takeaways of the data protection and cybersecurity seminar held with the GIOIN Open Innovation Network in Turin. Cyberattacks (and more broadly IT security threats) are inevitable.

GDPR 53

More Trending

article thumbnail

U.K. NCSC Head Warns of Russian Cyber Threats to Critical Infrastructure

eSecurity Planet

'Russia is seeking to undermine the international system,' Martin said.

41
article thumbnail

Friday Squid Blogging: Fake Squid Seized in Cambodia

Schneier on Security

Falsely labeled squid snacks were seized in Cambodia. I don't know what food product it really was. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.