Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more than 40 CSVs, most of which are highly technical with the ability to develop spyware and zero-day exploits to compromise their targets, particularly on Android and iOS devices. Read details about what CSVs target, how spyware is used, CSVs’ harmful impact on individuals and society and…

Read More

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Image: Adobe/Sundry Photography As senior director and global head of the office of the chief information security officer (CISO) at Google Cloud, Nick Godfrey oversees educating employees on cybersecurity as well as handling threat detection and mitigation. We conducted an interview with Godfrey via video call about how CISOs and other tech-focused business leaders can allocate their finite resources, getting buy-in on security from other stakeholders, and the new challenges and opportunities introduced by generative…

Read More

What Do Apple’s EU App Store Changes Mean for App Developers?

What Do Apple’s EU App Store Changes Mean for App Developers?

In order to comply with the European Union’s Digital Markets Act, Apple announced on Jan. 25 changes to its payment system for app sellers in the EU, and that it was letting go of the hold its App Store has over iOS app distribution in the EU. As well as the App Store changes, Apple will prompt iOS users in the EU to select a preferred browser instead of defaulting to Safari in accordance with…

Read More

Empowering Crisis-Affected Communities: Cisco's Commitment to IRC Signpost

Empowering Crisis-Affected Communities: Cisco's Commitment to IRC Signpost

In times of crisis, armed conflict, or natural disasters, people are forced to adapt and make big, life-changing decisions under extreme pressure. Access to timely, accurate, and straightforward safety information is an invaluable resource for these communities as they relocate, search for critical services and struggle with complex problems. The International Rescue Committee (IRC) teamed up with Mercy Corps to provide durable solutions for people whose lives and livelihoods are shattered by conflict and disaster….

Read More

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel and the global investment firm DigitalBridge Group have formed an independent generative AI software stack company, Articul8 AI, Inc. (Articul8); Intel announced the new company on Jan. 3. Articul8 will work with Intel and provide solutions for organizations that wish to build and deploy generative AI. Articul8’s product and capabilities Articul8’s product is “a turnkey GenAI software platform that delivers speed, security and cost-efficiency to help large enterprise customers operationalize and scale AI,” according…

Read More

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More

20 Most Popular TechRepublic Articles in 2023

20 Most Popular TechRepublic Articles in 2023

Here’s a list of the 20 most popular articles published by TechRepublic in 2023. Read articles about ChatGPT, Google Bard, Windows 11 and more. This year, developments in generative AI dominated the tech world, and TechRepublic readers expressed a corresponding interest, specifically in content about AI art generators, ChatGPT and Google Bard. Our readers were interested in tutorials about Windows 11, Microsoft Excel, Google Sheets and iPhone, as well as articles about tech certifications and…

Read More

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. Google Cloud’s team recently spoke about the most notable cybersecurity threats of 2023 — multi-faceted extortion and zero-day exploitation — and predicted more zero-day attacks in 2024, during two public, virtual sessions. Plus, Google predicts that both attackers and defenders will continue to use generative AI. However, generative AI…

Read More

Google Adds Gemini Pro API to AI Studio and Vertex AI

Google Adds Gemini Pro API to AI Studio and Vertex AI

Starting Dec. 13, developers can use Google AI Studio and Vertex AI to build applications with the Gemini Pro API, which allows access to Google’s new generative AI model. Google’s initial rollout of Gemini was limited to Google Bard and the Pixel 8 Pro, so Wednesday’s general availability of Gemini for Google AI Studio and Vertex AI marks the first test of Gemini for enterprise developers. AI Studio and Vertex AI with Gemini can help…

Read More

How to Use Google's Titan Security Keys With Passkey Support

How to Use Google's Titan Security Keys With Passkey Support

Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier…

Read More
1 2 3 4