A new anti-bullying feature uses AI to recognize mean words in comments and warns users before they post them.
from Naked Security https://ift.tt/2G3zDoQ
via IFTTT
A new anti-bullying feature uses AI to recognize mean words in comments and warns users before they post them.
from Naked Security https://ift.tt/2G3zDoQ
via IFTTT
Its local web server reportedly also automatically reinstalls Zoom if a user removes the app and joins a meeting.
from Naked Security https://ift.tt/2YIISSH
via IFTTT
An eagle-eyed developer has discovered a backdoor recently sneaked into a library (or ‘gem’) used by Ruby on Rails (RoR) web apps to check password strength.
from Naked Security https://ift.tt/32gF7WJ
via IFTTT
People subscribed to Google Trends in New Zealand were emailed the murder suspect’s name in violation of a New Zealand court’s order.
from Naked Security https://ift.tt/2LPKeam
via IFTTT
Mozilla has introduced a lot of tracker blocking protections into Firefox lately. Now, it is planning a new feature that will let you see how many online snoopers you’ve successfully evaded. A new feature called the Tracking Protections Panel (aka the Protection Report) will tell users how many trackers Firefox blocked in the prior week, […]
from Naked Security https://ift.tt/2Jp0dLh
via IFTTT
It’s outside of Sidewalk Labs HQ in Toronto, where Google’s sister company is working on stuffing the city with data-collecting sensors.
from Naked Security https://ift.tt/2Job87N
via IFTTT
Hackers just infiltrated virtual reality, enabling them to manipulate users’ immersive 3D worlds.
from Naked Security https://ift.tt/2Ju76th
via IFTTT
An open letter from the OpenID Foundation says that Apple introduced potential risks when it diverged from the OpenID Connect protocol.
from Naked Security https://ift.tt/2L94qEV
via IFTTT
ISPA has shortlisted Mozilla for the sort of award that, on the face of it, no tech company should be keen to win – 2019’s Internet Villain.
from Naked Security https://ift.tt/2XveIAJ
via IFTTT
Back in 2014, @DerpTrolling said he attacked sites simply based on requests from people who tweeted suggested targets.
from Naked Security https://ift.tt/2YImLfc
via IFTTT