Remove video-series talking-trust
article thumbnail

Weekly Update 375

Troy Hunt

For a weekly update with no real agenda, we sure did spend a lot of time talking about the ridiculous approach Harvey Norman took to dealing with heavy traffic on Black Friday. It's Device Trust for Okta. It was just. unfathomable. Watch the demo today!

253
253
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Same again with the TicTocTrack kids tracking watches which allowed a stranger on the other side of the world to talk to my 6 year old daughter. Or talking teddy bear.

IoT 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Wren Eleanor story: Why you should keep your kids’ images off social media

Malwarebytes

hashtagfacts, another account, posted a video about what other people on TikTok have observed about this account’s followers. Many also found a lot of “disgusting comments left by men” in certain videos about Wren. Limit access to the child’s photos and videos. The smaller the circle of trust, the better.

Media 103
article thumbnail

Episode 226: The Cyber Consequences Of Our Throw Away Culture

The Security Ledger

Related Stories Episode 224: Engineering Trust In The Cyber Executive Order Episode 222: US Rep. John and I talk about the world’s growing electronic waste problem and how foreign actors are believed to be harvesting sensitive data from laptops, phones and other electronics discarded by the U.S. and other nations.

article thumbnail

Mom Uses Deepfakes to Damage Cheer Team Reputations

SecureWorld News

Someone created deepfake videos to damage the reputation of three teenage girls so they would get kicked off a competitive cheer squad. This is a case that illustrates the risk we face in the future when it comes to deciding if the video we see is real and if the privacy we give up on social media will be weaponized against us.

article thumbnail

Deepfake technology and its implications for the future of cyber-attacks

CyberSecurity Insiders

Initially I assumed this pause was caused by whatever auto-dialer software the spammer was using to initiate the call before their text-to-speech software starts talking about my car’s extended warranty. The things that we hear, even when spoken by a trusted voice, cannot be believed.

article thumbnail

Implementing Data Protection and Key Management in DevOps without slowing things down

Thales Cloud Protection & Licensing

As enterprises develop software in today’s environment, where everything has digitally transformed and must follow Zero Trust policies, new challenges arise that can complicate and slow down the DevOps software pipeline. Implementing Data Protection and Key Management in DevOps without slowing things down. Tue, 02/15/2022 - 05:15.