Independent

ComputerWorldIndependent

Businesses, beware: The Motorola ThinkPhone comes with a major caveat

Let me just preface this by saying: No, the saga we’re about to dive into isn’t in any way related to April Fools’ — as far as I can tell, anyway. After all, we’re at the start of May.

And yet, one of Android’s best-known phone-makers is putting out a new device with such eye-rollingly off-the-mark claims, I can’t help but wonder if maybe they got mixed up on months and meant this to be a joke. It’s so hilariously and obviously ironic, I’m just not sure what else to make of it.

So here it is: Motorola’s got a new business-aimed Android phone called the Motorola ThinkPhone. It’s the first time the company — which has been owned by Lenovo since 2014, when Google broke our hearts and pawned the brand off after a glorious 20 months of control — is bringing a classic Lenovo name into the Motorola and Android arena this prominently.

To read this article in full, please click here

Read More
ComputerWorldIndependent

White House seeks information on tools used for automated employee surveillance

Credit to Author: avenkat@idg.com| Date: Tue, 02 May 2023 02:23:00 -0700

The White House Office of Science and Technology Policy (OSTP) would soon be releasing a public request for information (RFI) to learn more about the automated tools employers use to surveil, monitor, evaluate, and manage workers, OSTP announced on Monday.

“Employers are increasingly investing in technologies that monitor and track workers, and making workplace decisions based on that information,” the blog released on Monday said, adding that while these technologies can benefit both workers and employers in some cases, they can also create serious risks to workers.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Generative AI is about to destroy your company. Will you stop it?

Credit to Author: eschuman@thecontentfirm.com| Date: Mon, 01 May 2023 10:21:00 -0700

As the debate rages about how much IT admins and CISOs should use generative AI — especially for coding — SailPoint CISO Rex Booth sees far more danger than benefit, especially given the industry’s less-than-stellar history of making the right security decisions.

Google has already decided to publicly leverage generative AI in its searches, a move that is freaking out a wide range of AI specialists, including a senior manager of AI at Google itself

To read this article in full, please click here

Read More
ComputerWorldIndependent

As Europeans strike first to rein in AI, the US follows

A proposed set of rules by the European Union would, among other things. require makers of generative AI tools such as ChatGPT,to publicize any copyrighted material used by the technology platforms to create content of any kind.

A new draft of European Parliament’s legislation, a copy of which was attained by The Wall Street Journal, would allow the original creators of content used by generative AI applications to share in any profits that result.

To read this article in full, please click here

Read More
IndependentKrebs

Many Public Salesforce Sites are Leaking Private Data

Credit to Author: BrianKrebs| Date: Fri, 28 Apr 2023 02:09:56 +0000

A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their public Salesforce Community websites, KrebsOnSecurity has learned. The data exposures all stem from a misconfiguration in Salesforce Community that allows an unauthenticated user to access records that should only be available after logging in.

Read More
ComputerWorldIndependent

ChatGPT learns to forget: OpenAI implements data privacy controls

OpenAI, the Microsoft-backed firm behind the groundbreaking ChatGPT generative AI system, announced this week that it would allow users to turn off the chat history feature for its flagship chatbot, in what’s being seen as a partial answer to critics concerned about the security of data provided to ChatGPT.

The “history disabled” feature means that conversations marked as such won’t be used to train OpenAI’s underlying models, and won’t be displayed in the history sidebar. They will still be stored on the company’s servers, but will only be reviewed on an as-needed basis for abuse, and will be deleted after 30 days.

To read this article in full, please click here

Read More
IndependentKrebs

3CX Breach Was a Double Supply Chain Compromise

Credit to Author: BrianKrebs| Date: Fri, 21 Apr 2023 01:05:44 +0000

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts on LinkedIn to lure people into opening malware disguised as a job offer; malware targeting Mac and Linux users working at defense and cryptocurrency firms; and software supply-chain attacks nested within earlier supply chain attacks.

Read More