Although this article looks at the image cropping security issue from the position of a whistle-blower, it could just as easily apply to a document you send out to a client or supplier or use internally. For example and image of pay scales across a company where you crop out …
Because It’s Friday – A follow-up to the Mary Queen of Scots cyber security story
This is an interesting follow on to the story we included in “Because It’s Friday” a couple of weeks back where a cipher created by Mary Queen of Scots was decrypted having been a secret since the 16th century. Rupert Goodwins fits Mary’s life and political activities into modern day …
Continue reading “Because It’s Friday – A follow-up to the Mary Queen of Scots cyber security story”
CISA advises three exploited vulnerabilities
Although a US government agency the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog is a valuable resource for anyone responsible for cyber security. It reports on mainstream and less used software so that offbeat package you use could be reported on one day! They have released an …
Continue reading “CISA advises three exploited vulnerabilities”
ChatGPT – the fakes
Threat actors are always looking for the opportunity to abuse someone’s trust, exploit a tragedy or take advantage of something in the news, etc. etc. etc.. ChatGPT is in the news. Earlier this year, the popular artificial intelligence (AI) ChatGPT service started to charge for access and this has prompted …
Here is an update to the ChatGPT debate
Influences are pushing a new “get rich quick scheme” – get an AI to write a story for you and submit it for publishing. IT has caused one publishing house to close for unsolicited submissions: Sci-fi publisher Clarkesworld halts pitches amid deluge of AI-generated stories | The Guardian On top …
