FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayWIRED

Here Are the Secret Locations of ShotSpotter Gunfire Sensors

The locations of microphones used to detect gunshots have been kept hidden from police and the public. A WIRED analysis of leaked coordinates confirms arguments critics have made against the technology.

A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

An EU government body is pushing a proposal to combat child sexual abuse material that has significant privacy implications. Its lead advocate is making things even messier.

How to Stop Google Bard From Storing Your Data and Location

Checking out this AI chatbot's new features? Make sure to keep these privacy tips in mind during your interactions.

Your Boss’s Spyware Could Train AI to Replace You

Corporations are using software to monitor employees on a large scale. Some experts fear the data these tools collect could be used to automate people out of their jobs.

Criminals Have Created Their Own ChatGPT Clones

Cybercriminals are touting large language models that could help them with phishing or creating malware. But the AI chatbots could just be their own kind of scam.

SolarWinds: The Untold Story of the Boldest Supply-Chain Hack

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.

ADS-B Exchange, the Flight Tracker That Powered @ElonJet, Sold to Jetnet

ADS-B Exchange, beloved for resisting censorship, was sold to a company owned by private equityβ€”and now even its biggest fans are bailing.

Lensa AI and β€˜Magic Avatars’: What to Know Before Using the App

Are you thinking about uploading some selfies and buying a pack of β€˜Magic Avatars’? Consider these expert tips first.

Elon Musk’s Twitter Files Are a Feast for Conspiracy Theorists

From QAnon influencers to @catturd, the very online right sees exactly what they want to see in the CEO’s orchestrated disclosure.

Mystery Hackers Are β€˜Hyperjacking’ Targets for Insidious Spying

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

iOS Can Stop VPNs From Working as Expectedβ€”and Expose Your Data

A security researcher claims that Apple mobile devices keep connections open if they are created before a VPN is activated.
❌