RV_ Posted March 6, 2023 Report Share Posted March 6, 2023 iPhone users targeted in phone AND data theft campaign When is an iPhone theft not just an iPhone theft? When the user's Apple ID, and more, goes with it. Fighting online censorship, or, encryption's latest surprise use-case: Podcast This week on Lock and Code, host David Ruiz speaks with Mallory Knodel about the stories that countries tell their people to fear encryption, and why the most recent threats to encryption are different. LastPass was undone by an attack on a remote employee LastPass has said the attackers responsible for its breach compromised a remote worker's computer in order to get inside the network. AI voice cracks telephone banking voice recognition Now we have freely-available AI happily replicating people’s voices, could it be a security risk? Recent research suggests that it could. Source: https://links.e.malwarebytes.com/email_browser_view?uid=5e997408-3efa-4edf-8132-a367895358d1&mid=6b812b03-084e-42be-9578-97646e9cf69a&eid=6fdf216a-a306-2e45-64a3-475042e06b0a&bsft_ek=2023-03-06T20%3A15%3A23Z&bsft_aaid=18a8abbd-b7b6-422b-8352-283554e9475a&bsft_mime_type=html&bsft_tv=7&bsft_lx=3 Quote RV/Derekhttp://www.rvroadie.com Email on the bottom of my website page.Retired AF 1971-1998 When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius “Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.