Report: Netflix is in advanced talks to acquire EuropaCorp, a movie studio co-founded by Luc Besson (Charles Barfield/The Playlist)

April 1, 2018

Charles Barfield / The Playlist: Report: Netflix is in advanced talks to acquire EuropaCorp, a movie studio co-founded by Luc Besson  —  Apple might have passed on A24, but there’s rumors floating around that another production company might be acquired by a media giant.  —  According to French media outlet Capital … Source: http://www.techmeme.com

Read More >>

Card Data Stolen From 5 Million Saks and Lord & Taylor Customers

Hudson’s Bay said on Sunday that data from card payments in some of its Saks and Lord & Taylor stores in North America had been compromised. From a report: A well-known ring of cybercriminals has obtained more than five million credit and debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor, according to a cybersecurity research firm that specializes in tracking stolen financial data. The data,…

April 1, 2018
Read More >>

To Protect AI From Attacks, Show It Fake Data

AI systems can sometimes be tricked into seeing something that’s not actually there — remember when Google’s software “saw” a 3-D-printed turtle as a rifle. At an event earlier this week, Google Brain researcher Ian Goodfellow explained how AI systems defend themselves. From a report: Goodfellow is best known as the creator of generative adversarial networks (GANs), a type of artificial intelligence that makes use of two networks trained on…

April 1, 2018
Read More >>

Information Security and the Zero-Sum Game

A zero-sum game is a mathematical representation of a situation in which each participant’s gain or loss is exactly balanced by the losses or gains of the other participant. In Information Security a zero-sum game usually references the trade-off between being secure and having privacy. However, there is another zero-sum game often played with Information […] Source: http://itsecurity.co.uk

April 1, 2018
Read More >>

Payment systems at Saks Fifth Avenue and Lord & Taylor stores breached, credit card data of 5M+ customers allegedly stolen (Gemini Advisory)

April 1, 2018

Gemini Advisory: Payment systems at Saks Fifth Avenue and Lord & Taylor stores breached, credit card data of 5M+ customers allegedly stolen  —  Key Judgements  — On March 28, 2018, a JokerStash hacking syndicate announced the release for sale of over five million stolen credit and debit cards Source: http://www.techmeme.com

Read More >>

Non-Tech Businesses Are Beginning To Use AI at Scale

Artificial intelligence is spreading beyond the technology sector, with big consequences for companies, workers and consumers. An anonymous reader shares a report: Bosses of non-tech companies in a broad range of industries are starting to worry that AI could scorch or even incinerate them, and have been buying up promising young tech firms to ensure they do not fall behind (the link may be paywalled). In 2017 firms worldwide spent…

April 1, 2018
Read More >>

Cloudflare Launches 1.1.1.1 Consumer DNS Service With a Focus On Privacy

BrianFagioli writes: Today, Cloudflare announces a new consumer DNS service with a focus on privacy. Called ‘1.1.1.1.’ it quite literally uses that easy-to-remeber IP address as the primary DNS server. Why announce on April Fool’s Day? Because the IP is four ones and today’s date is 4/1 — clever. The secondary server is 1.0.0.1 — also easy to remember. The big question is why? With solid offerings from Google and…

April 1, 2018
Read More >>

Investigation of a Twitter user’s followers shows that Twitter is relatively good at detecting fake/bot accounts, but only removes a fraction of them (Geoff Golberg)

April 1, 2018

Geoff Golberg: Investigation of a Twitter user’s followers shows that Twitter is relatively good at detecting fake/bot accounts, but only removes a fraction of them  —  Someone bought my Twitter account 10K fake/bot followers, and here’s what I learned about Twitter’s spam detection tools  —  Story First, Data Second Source: http://www.techmeme.com

Read More >>

Hack the Box Challenge: Haircut Walkthrough

April 1, 2018

Hello friends!! Today we are going to solve another CTF challenge “Haircut” which is categories as retried lab presented by Hack the Box for making online penetration practices. Solving challenges in this lab is not that much easy until you don’t have some knowledge of WAPT. Let start and learn how to analysis any vulnerability in a network then exploit it for retrieving desired information. Level: Intermediate Task: find user.txt and root.txt file in victim’s machine. Since these…

Read More >>

Our Devices May Listen More Attentively, Patents Filed By Google and Amazon Suggest

Amazon and Google, the leading sellers of smart speakers, say their AI-powered assistants record and process audio only after users trigger them by pushing a button or uttering a phrase like “Hey, Alexaâ or âoeO.K., Google.” But each company has filed patent applications, many of them still under consideration, that outline an array of possibilities for how devices like these could monitor more of what users say and do (the…

April 1, 2018
Read More >>