Sat.Feb 02, 2019

article thumbnail

IBM experts warn of malicious abuses of Apple Siri Shortcuts

Security Affairs

IBM’s security researchers demonstrated that the Siri Shortcuts introduced in the Apple iOS 12 can be abused by attackers. Apple implemented Siri Shortcuts in the iOS 12 to allow users to rapidly access to applications and features, they can automate common tasks and can be integrated by third-party developers in their software. Researchers at IBM Managed Security Services discovered that Siri Shortcuts can be abused by hackers to perform malicious activities. “This new feature can be enab

Access 86
article thumbnail

A Facebook Crackdown, Amazon Facial Recognition, and More Security News This Week

WIRED Threat Level

Hackers use SS7 flaws to rob banks, Japan goes after IoT vulnerabilities, and more security news this week.

IoT 53
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Home Design website Houzz suffered a data breach

Security Affairs

The home remodeling and design platform Houzz informed customers that it suffered a data breach that exposed some personal information. The popular home design platform Houzz has suffered a data breach that exposed some personal information. Houzz has over 40 million monthly unique users, at the time is not clear how many individuals are affected. The company learned in late December that of an unathorized access to its user data and started notifying its users.

article thumbnail

Apple issued a partial fix for recent FaceTime spying bug

Security Affairs

On Friday, Apple announced that the FaceTime issue recently discovered has been partially fixed, the company plans to release a complete update next week. This week, Apple issued a partial fix for the FaceTime issue recently discovered, the tech giant plans to release a complete update next week. Apple experts implemented a server-side patch, but the Group FaceTime feature will be enabled again next week.

Privacy 75
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Operators of the TheMoon botnet offer it as a service

Security Affairs

Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service. Experts at the CenturyLink Threat Research Labs observed a new evolution for the TheMoon IoT botnet, operators added a previously undocumented module that allows them to offer it with a malware-as-a-service model.

IT 79