Thoughts Insights & Opinions
Hackers using AI tools
Caught in the act On Thursday Reuters reported that State-backed hackers from Russia, China, and Iran have been using tools from Microsoft-backed OpenAI to hone their skills and trick their targets. Microsoft successfully identified and thwarted these malicious...
AI robot for the Elderly and Disabled
So, today we are looking at a big upside … The recent advancements in artificial intelligence (AI) technology, particularly showcased by Figure 01 from OpenAI, offer invaluable assistance to the elderly and disabled communities. This cutting-edge AI robot has the...
You have agreed to this… and so have I.
If you are a WhatsApp User, this is for you. Most of us never read the Terms and Conditions When you sign up for a free service like WhatsApp, you may not realise that you're giving up certain rights to your content. In the case of WhatsApp, their terms of service...
Four Horsemen of the EMAIL apocalypse
Join us on a journey into the heart of darkness as we uncover the Four Horsemen of the Email Apocalypse. From the Bangladesh Bank heist to the Russian election interference, these incidents serve as chilling reminders of the perils that lurk in our inboxes: 1....
Top of the Pops in 2024: Cybersecurity
In a recent report from McKinsey & Company, Cybersecurity has emerged as the predominant tech concern for enterprise buyers, with an approximately 20 percent citing rate, a 50 percent increase from the previous year. Given the increasing amount of sensitive...
Meta accused of ‘massive, illegal’ data processing
According to CNN, the European Consumer Organisation (BEUC), an umbrella body for 45 consumer groups, said eight of the groups were filing complaints with their respective national data protection authorities Thursday, accusing Meta, the owner of WhatsApp, Facebook...
New and improved, better than ever NIST 2.0
Version 2.0 of the National Institute of Standards and Technology (NIST) Cybersecurity Framework delivers several updates and enhancements to help organisations better manage cybersecurity risks. Here are four key improvements included in the most recent update:...
The infamous Hillary Clinton email controversy
The controversy surrounding Hillary Clinton's emails during her tenure as United States Secretary of State from 2009 to 2013 highlighted critical vulnerabilities in government communication channels. Critics voiced concerns over security risks and mishandling of...
Safeguarding Privacy: The Vital Link Between Article 12 and Secure Communications
In an era where digital privacy is increasingly under threat, Article 12 of the UN Universal Declaration of Human Rights stands as a beacon of protection: "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence." This...