'I submitted a data subject access request, asking Amazon to disclose everything it knows about me
Scanning through the hundreds of files I received in response, the level of detail is, in some cases, mind-bending.'
Absolutely brilliant training, best I've attended in a very long time, thanks so much Simon
17 December 2024
10 December 2024
07 December 2024
'I submitted a data subject access request, asking Amazon to disclose everything it knows about me
Scanning through the hundreds of files I received in response, the level of detail is, in some cases, mind-bending.'
Using Machine Learning to listen to your keystrokes and hack your password.
'I’m writing this to illustrate that the best phishing attacks will look very convincing. Often people are told to watch out for poor grammar and formatting to protect against phishing. This will work in some cases, but not in cases like the one I’m about to show. Sophisticated scammers use good English and pattern-match with legitimacy.'
When should we silence those who we disagree with?
Controversial commentator Katie Hopkins has had her Twitter account suspended for violating its anti-hate policy.
Twitter typically doesn't comment when an account is suspended.
Late last year Twitter broke its silence on why it has not blocked US President Donald Trump, who in the eyes of many has tweeted or reposted hateful comments. Twitter said it made exceptions for world leaders.
Airbnb has developed technology that looks at guests’ online “personalities” when they book a break to calculate the risk of them trashing a host’s home.
Details have emerged of its “trait analyser” software built to scour the web to assess users’ “trustworthiness and compatibility” as well as their “behavioural and personality traits” in a bid to forecast suitability to rent a property.
Individuals will have to become their own chief security officer – finding a way to manage and control access to all of their digital assets, cloud services, social media profiles, personal communications and private devices. As our personal digital universes expand exponentially, so will the necessity of controlling our data and digital identities.
Comments
make a comment