Remove tag health-information
article thumbnail

Mar 13- Mar 19 Ukraine – Russia the silent cyber conflict

Security Affairs

Google’s TAG team revealed that China-linked APT groups are targeting Ukraine ’s government for intelligence purposes. March 16 – Russia’s disinformation uses deepfake video of Zelenskyy telling people to lay down arms. Russia’s disinformation uses deepfake video of Zelenskyy telling people to lay down arms.

Cloud 85
article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

Assuming privacy concerns get addressed, much wider consumer uses are envisioned in areas such as marketing, retailing and health services. Many of these photos are tagged with the identity of the people in them. The development of universal video surveillance with facial recognition is generally happening away from the public eye.

Privacy 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

Security Affairs

Dell SupportAssist software is described as a tool that proactively checks the health of system’s hardware and software. When an issue is detected, the necessary system state information is sent to Dell for troubleshooting. The expert published a video PoC of the hack and the source code of the proof of concept : Pierluigi Paganini.

Access 91
article thumbnail

10 everyday machine learning use cases

IBM Big Data Hub

At Slack, ML powers video processing, transcription and live captioning that’s easily searchable by keyword and even helps predict potential employee turnover. In genetic research, gene modification and genome sequencing, ML is used to identify how genes impact health. Then, it suggests the social media user tag that individual.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Clarify computer vision AI-powered computer vision enables image segmentation , which has a wide variety of use cases, including aiding diagnosis in medical imaging, automating locomotion for robotics and self-driving cars, identifying objects of interest in satellite images and photo tagging in social media.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data apparently includes users’ full names, phone numbers, addresses, email addresses and partial payment card information. Data breached: 21,100,000 records.