Browsing Category
Cyber Security
The Exponential IT Roadmap: Info-Tech Research Group Publishes Framework to…
April 10, 2024
Info-Tech Research Group has published a new strategic blueprint designed to guide IT leaders…
The Security Minefield Of The Internet Of Things: Protecting Your Connected…
by: Trevor Cooke
In an era defined by connectivity, the so-called ‘Internet of Things (IoT)’ has revolutionized…
OpenAI’s Human Voice Recreation Tech Unveiled—But You Can’t Have It
OpenAI is sharing its Voice Engine technology with testers and trying to gauge its dangers. The tech can recreate…
Former Google Engineer Charged with AI Technology Theft for China
A software engineer previously employed at Google and secretly working with two companies based in China was…
AI-Generated Celebrity Deepfakes
Canadian celebrities, including TV chef Mary Berg, singer Michael Bublé, comedian Rick Mercer, and hockey star…
Countering Mobile Phone ‘Account Takeover’ Attacks
There’s a new way to identify security weaknesses and vulnerabilities to account takeover attacks, where hackers…
OpenAI Changes ‘Military and Warfare’ Usage Ban Wording
OpenAI's usage policies page firmly states that the company prohibits using its technology for "military and…
Apple Challenging Digital Markets Act in EU
The Digital Markets Act (DMA) legislation targets the market clout of top technology companies. Apple is planning…
AI Will Not Put You Out of Work
AI favors junior workers with more extraordinary task-based Experience. Senior workers, however, have lower trust…
Signs Your Phone Was Hacked
Has your phone been hacked? How would you even know?
Here are the top signs a bad actor has got their hands on…