Archive for September 2024
Featured Article : Would You Be Filmed Working At Your Desk All Day?
Following a recent report in the Metro that BT is carrying out research into continuous authentication software, we look at some of the pros and cons and the issues around employees potentially being filmed all day at their desks ⊠under the guise of cyber-security. Why Use Continuous Authentication Technology? Businesses use continuous authentication technology…
Read MoreTech Insight : The Rising Cost Of API & Bot Attacks
Following a recent report by cyber-security company Imperva about the rising costs to businesses of bot attacks and vulnerable APIs, we look at why itâs happening and what can be done. Vulnerable APIs & Bot Attacks Costing Businesses $186 Billion Impervaâs report was based on Marsh McLennan Cyber Risk Intelligence Centreâs study of data from…
Read MoreTech News : AI Drone Swarms … Military Tests Successful
Munich-based Quantum Systems (a Small Unmanned Aerial Systems â âsUASâ â company), has announced a successful test of AI-powered âdrone swarmâ technology which could advance the role drones play in warfare. What Is A âDrone Swarmâ? In short, Drone swarm technology involves coordinating multiple drones to operate as a unified system and it can be…
Read MoreTech News : Human Right Abuses Linked To Lithium Batteries
New research compiled from AI-powered supply chain risk platform Infyos has revealed that 75 per cent of the lithium-ion battery supply chain may be linked to severe human rights abuses. Human Rights Abuses â Forced (and Child) Labour Infyosâs analysis, which drew on government datasets, NGO reports, news articles, social media, and proprietary data, has…
Read MoreAn Apple Byte : New macOS Update Disrupts Popular Cybersecurity Tools
Following its recent release, Appleâs latest macOS update, dubbed Sequoia (macOS 15), has disrupted the functionality of several widely used cybersecurity tools, including those from CrowdStrike, SentinelOne, and Microsoft. Users and developers have voiced frustrations on social media and in Mac-focused forums about issues leaving many security applications non-operational. Reports highlight problems with tools like…
Read MoreSecurity Stop Press : Google Simplifies Secure Passkey Syncing Across Devices
Google has announced that users can now securely sync passkeys across all devices, not just Android, making sign-ins faster and more secure. Passkeys use biometrics, such as your fingerprint, face, or screen lock, to sign in to apps and websites, thereby making it easier and more secure than using traditional passwords. Whereas previously, only Android…
Read MoreSustainability-in-Tech : 3D Printed Glass Blocks For Constructing Buildings
Engineers at the Massachusetts Institute of Technology (MIT) are developing a new kind of reconfigurable masonry made from 3D-printed, recycled glass. Fits Together Like LEGO MIT says the new multilayered glass bricks, each in the shape of a figure-of-eight, are designed to interlock, much like LEGO bricks. 3D Printed One of the big advantages of…
Read MoreVideo Update : Optimise Your LinkedIn Profile with ChatGPT
This video tutorial explains in depth how to use ChatGPT to optimise your LinkedIn profile. [Note – To Watch This Video without glitches/interruptions, It’s best to download it first] https://videovault.vip/videos/social/2024-September-Use-ChatGPT-to-optimise-your-LinkedIn-Profile.mp4
Read MoreFeatured Article : ChatGPT Now Offers Complex Reasoning
ChatGPTâs maker, OpenAI, has announced the introduction of its new OpenAI o1 large language model that can use âcomplex reasoningâ to fact-check its own answers before giving them. ChatGPT Plus and Teams Users Can Try It Now The new o1 model is already available to ChatGPT Plus or Team users, and in OpenAIâs API. OpenAI…
Read MoreTech Insight : Personal Activities … On Work Laptops (Part 2)
In this second part article, where we review the issues around employees engaging in personal activities on company-issued devices, we look deeper into the legal and compliance implications and provide real-world case studies of security breaches. We also examine how businesses can protect themselves against these growing threats. Last Week In the previous article, with…
Read More