Many security-conscious people probably think they'd never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be…| krebsonsecurity.com
The Meta founder and CEO says "it's time to get back to our roots around free expression on Facebook and Instagram."| Tech Policy Press
Hier ist der 19. Blog-Beitrag „Menschen, Daten, Sensationen – Rudis Bericht aus dem Datenzirkus, ergänzt um Franks Zugabe (KW 01/2025)“ – Die DVD-Edition. | Deutsche Vereinigung für Datenschutz e.V.
Stanford law professor Mark Lemley, a partner at Lex Lumina, is withdrawing from the Kadrey v. Meta case over Meta training its Llama LLM on copyrighted material. He’s “fired Meta as a client” beca…| Pivot to AI
Fünf Schritte zu mehr Vertrauen in die ePA| www.inoeg.de
Google is betting big that AI is the future of work.| The Verge
Die EU-Kommission setzt trotz Datenschutzbedenken weiterhin auf Microsoft 365. Dies stellt die digitale Souveränität und die Glaubwürdigkeit der EU infrage.| www.kuketz-blog.de
Das Jahr 2025 ist bereits einige Tage alt und auf dem Kuketz-Blog sind wir bereits durchgestartet! Es gibt einige Neuerungen:…| www.kuketz-blog.de
Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from…| krebsonsecurity.com
---| www.cl.cam.ac.uk
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom detection signature Volexity had deployed at a customer site (“Organization A”) indicated a threat actor had compromised a server on the customer’s network. While Volexity quickly investigated the threat activity, more questions wer...| Volexity
Researchers induced bots to ignore their safeguards without exception| IEEE Spectrum
The US government’s latest recommendations acknowledge that password composition and reset rules are not just annoying, but counterproductive. The story of why password rules were recommended and enforced without scientific evidence since their invention in 1979 is a story of brilliant people, at the very top of their field, whose well-intentioned recommendations led to decades of ignorance. These mistakes are worth studying, in part, because the people making them were so damn brilliant an...| stuartschechter.org
Die Empfehlungsecke beinhaltet aktuelle Empfehlungen zu Messengern, Browser-Add-ons und weiteren Themen • IT-Sicherheit & Datenschutz aus Karlsruhe| www.kuketz-blog.de