China’s cyberspace regulator, the Cyberspace Administration of China (CAC), has deleted 1.4 million social media posts and closed 67,000 social media accounts in a two-month crackdown on misinformation, illegal profiteering, impersonation of state officials, and other “pronounced problems”. The campaign, which ran from March 10 to May 22, is part of China’s ongoing effort to
0 Comments
A new Android malware called ‘Daam’ has been identified by the Indian Computer Emergency Response Team (CERT-In) as capable of infecting mobile phones and hacking into sensitive data, including call records, contacts, history, and camera. The malware has the potential of bypassing anti-virus programs and deploying ransomware on targeted devices. The malware gets distributed through
0 Comments
Twitter has decided to leave the EU’s code of practice on disinformation, which is a voluntary pact that groups together major social media platforms. Industry Commissioner Thierry Breton tweeted on Saturday that although Twitter has left the pact, its obligations remain. The code of practice was launched in 2018 and counts nearly three dozen signatories,
0 Comments
Twitter has withdrawn from the European Union’s voluntary agreement to combat online disinformation, according to European Commissioner Thierry Breton. While other major social media platforms have committed to supporting the EU’s disinformation “code of practice,” Twitter has abandoned this pledge. Breton tweeted that Twitter’s “obligation” remains, referring to the EU’s new digital rules that will
0 Comments
Generative AI, or Gen AI, has become the buzzword of the year, garnering the attention of the global tech community. VC firm Sequoia has even declared that Gen AI could create trillions of dollars of economic value. Many businesses, from Microsoft to Fiat, have jumped on board to integrate the technology, seeing it as a
0 Comments
Artificial intelligence (AI) algorithms are present in almost all autonomous and robotic systems used in security applications, including facial recognition, biometrics, drones, and autonomous vehicles utilized in combat surveillance and military targeting applications. However, the data underlying these algorithms can be vulnerable to cyber attacks, which can result in incorrect predictions and serious security threats.
0 Comments