ChatGPT back in Italy after order. ChatGPT, sent a letter to the Italian SA describing the measures it implemented in order to comply with the order issued by the SA on 11 April. OpenAI:– explained what personal data it uses for training of algorithms;– explaned privacy notice accessible in sign up;– granted all individuals in […]
The European Parliament has approved a new Artificial Intelligence Act (AIA) that regulates the use of AI in the EU. The Artificial Intelligence Act is aimed at ensuring that AI is developed and used in a safe, ethical, and transparent manner. The AIA will apply to all AI systems developed or used in the EU, […]
OpenAI’s is the latest large language model (LLM) release. GPT-4 surpasses its predecessor in terms of reliability, creativity, and ability to process intricate instructions. It can handle more nuanced prompts compared to previous releases, and is multimodal, meaning it was trained on both images and text. We don’t yet understand its capabilities – yet it […]
Google Authenticator users who store their one-time codes as a backup in their Google account should note that this does not use end-to-end encryption, meaning Google has access to this information. This week Google announced a new feature for the Google Authenticator. A 2FA code generation application that allows users to log into an account. […]
Microsoft Edge browser has a privacy issue that can lead to URL leaks. Bing gets search results from Edge. This issue arises due to the “search suggestions” feature in Edge, which suggests URLs as users type. These suggested URLs are fetched from Bing, Microsoft’s search engine. However, the URLs are fetched even before the user […]
There is an everlasting need to mitigate Web3 Blockchain risks and security threats. Web3 applications run on blockchain platforms and are gaining popularity, but they come with security risks. Smart contracts are a major source of risk, as they can contain vulnerabilities that can be exploited by attackers. Web3 applications are also vulnerable to phishing […]
Terravision, a company that arranges bus transport to and from European airports, has leaked the data of more than two million customers. This concerns names, telephone numbers, e-mail addresses, salted password hashes and in some cases dates of birth and country of origin. Details about the data breach are not yet known. Via ID Control […]
ChatGPT is an advanced tool that can generate meaningful results with minimal user expertise, but what are the security implications of ChatGPT? The quality of ChatGPT’s output depends on factors such as specificity, clarity, and context. Users must understand ChatGPT’s capabilities and limitations and evaluate its output critically. Effective utilization of ChatGPT involves prompt engineering […]
Researchers have found malware on the systems of 3CX, which provides software for VoIP solutions worldwide and fell victim to a supply chain attack. Both macOS and Windows systems of the software supplier turned out to be infected, 3CX said in an update about the attack. How the infections could have occurred has still not […]
CISA updated the Zero Trust Maturity Model (ZTMM) which provides a roadmap for agencies to reference as they transition towards a zero-trust architecture. ZTMM also provides a gradient of implementation across five distinct pillars to facilitate federal implementation, allowing agencies to make minor advancements toward optimization over time.CISA encourages state, local, tribal, and territorial governments, and […]