Sat.Jan 19, 2019

article thumbnail

'The goal is to automate us': welcome to the age of surveillance capitalism

The Guardian Data Protection

Shoshana Zuboff’s new book is a chilling exposé of the business model that underpins the digital world. Observer tech columnist John Naughton explains the importance of Zuboff’s work and asks the author 10 key questions We’re living through the most profound transformation in our information environment since Johannes Gutenberg’s invention of printing in circa 1439.

IT 109
article thumbnail

ES File Explorer vulnerabilities potentially impact 100 Million Users

Security Affairs

Security expert Robert Baptiste ( aka Elliot Alderson ) discovered a vulnerability ( CVE-2019-6447 ) in the ES File Explorer that potentially expose hundreds of million Android installs. The ES File Explorer is an Android file manager that has over 100,000,000 installs and more than 500 million users worldwide according to its developer. Baptiste discovered that the application uses a local HTTP server that listen on the open port 59777.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Home Office under fire for blocking new spy watchdog

The Guardian Data Protection

Surveillance expert Eric King vetoed from top job at IPCO over past associations The Home Office has prompted outrage by blocking the appointment of the man tasked with leading investigations into the UK’s spy agencies. Eric King had been appointed head of investigations at the new government watchdog charged with regulating the intelligence agencies until the Home Office intervened, apparently due to his “previous work and associations”.

article thumbnail

“Collection #1” Data Breach Analysis – Part 1

Security Affairs

Cybersecurity expert Marco Ramilli has analyzed the huge trove of data, called Collection #1, that was first disclosed by Troy Hunt. Few weeks ago I wrote about “ How Data Breaches Happen “, where I shared some public available “pasties” within apparently (not tested) SQLi vulnerable websites. One of the most famous data breaches in the past few years is happening in these days.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Estimates v. Facts

InfoGovNuggets

“How Estimates of the Gig Economy Went Wrong,” The Wall Street Journal , January 8, 2019. Estimates of the impact of the “gig economy” based on a 2015 survey turned out to be not that accurate a prediction of the actual impact (which was minimal), looking back. Estimates and opinions and forecasts are, in one sense, Information.

More Trending

article thumbnail

What does it say?

InfoGovNuggets

“AstraZeneca Appoints Controversial Cancer Doctor to Head Research Unit,” The Wall Street Journal , January 8, 2019. Doctor was accused in the past of not disclosing possible conflicts in articles he wrote. He claims the failures to disclose were accidental. How do you accidentally neglect to disclose a conflict? Does the explanation offered (different rules in different journals) pass muster?

IT 28
article thumbnail

DarkHydrus adds Google Drive support to its RogueRobin Trojan

Security Affairs

Security experts attributed new malicious campaigns to the DarkHydrus APT group (aka Lazy Meerkat), threat actors used a new variant of the RogueRobin Trojan and leveraged Google Drive as an alternative C2 channel. DarkHydrus was first discovered by experts at Palo Alto Networks’ Unit 42 team in July when the group carried out attacks aimed at a government agency in the Middle East.

IT 84
article thumbnail

Are the new media the same as a Free Press?

InfoGovNuggets

“Facebook, Twitter Turn to Right-Leaning Groups to Help Referee Political Speech,” The Wall Street Journal , January 9, 2019. Facebook, Twitter, and Google try to find a way to moderate stories with a political element. Does adding advisors from different ends of the political spectrum help provide or restore credibility when you have been accused of filtering and promoting stories from one end differently than those from the other?

article thumbnail

Security Affairs - Untitled Article

Security Affairs

A bug in Microsoft partner portal ‘exposes ‘ support requests to all partners, fortunately, no customer data was exposed. The Register in exclusive reported that Microsoft partner portal ‘exposed ‘every’ support request filed worldwide.’ Tickets submitted from all over the world were exposed to all Microsoft support partners due to the glitch.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DNC Accuses Russia, ACLU Sues ICE, and More Security News This Week

WIRED Threat Level

Trump dominated security headlines this week, but there's plenty of other news to catch up on.