It is a known fact that Bill Gates is positive about the future of artificial intelligence, however, he is now predicting that technology will be transformative for everyone in the next five years. The boom in AI technology has raised…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Time to bring order to Cyber Chaos
In today’s digital era, businesses are embracing rapid changes to enhance efficiency, but with it comes a surge in cybersecurity challenges. Last year saw a staggering 29,000 new IT vulnerabilities reported globally, emphasising the need for a strategic approach. …
As Deepfake of Sachin Tendulkar Surface, India’s IT Minister Promises Tighter Rules
On Monday, Indian minister of State for Information Technology Rajeev Chandrasekhar confirmed that the government will notify robust rules under the Information Technology Act in order to ensure compliance by platform in the country. Union Minister, on X, expressed gratitude…
Creator of ‘Ready Player One’ Ventures into Launching Metaverse
Oscar Wilde once humorously remarked that life imitates art, a sentiment that Ernest Cline, the author of the 2011 virtual reality adventure novel “Ready Player One,” seems to be embodying quite literally. Teaming up with Dan Farah, the producer…
Data is the Missing Piece in the AI Jigsaw, Here’s How to Bridge the Gap
The skills gap that is stifling development in artificial intelligence (AI) is well documented, but another aspect stands out: data complexity. According to a new IBM study, the most common barriers to AI success are limited AI skills and…
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction
There is a possibility that artificial intelligence (AI) models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and create…
Your iPhone is at risk – Signs of Viruses You Shouldn’t Ignore!
Apple usually excels in shielding us from spam and pop-ups. With the myriad functions Apple packs into iPhones, users engage in diverse activities, from work to photos and gaming. While iPhones are considered less susceptible to cyber threats than…
Surge in Police Adoption of Private Cameras for Video Evidence Raises Privacy Concerns
Major cities like Los Angeles and Washington, D.C., are gearing up to establish Real-Time Crime Centers, positioned as pivotal hubs for the seamless integration of various police technologies and data. Described as a “nerve center,” these facilities typically amalgamate…
Unused Apps Could Still be Tracking and Collecting User’s Data
While almost everyone in this era is glued to their smartphones for long hours, there still remain several mysteries about the device that are not actively being deduced by the users. So how does one begin to know their phones?…
China Backed Actors are Employing Generative AI to Breach US infrastructure
Cybercriminals of all skill levels are utilising AI to hone their skills, but security experts warn that AI is also helping to track them down. At a workshop at Fordham University, National Security Agency head of cybersecurity Rob Joyce…