Confidentiality
Google introduces Gemini AI for schools with a commitment to greater data protection and privacy
Google is about to give schools access to artificial intelligence (AI) called Gemini, but note that it is only for teachers and students over 18 years old. Google commits not to use user data for AI training or share it with anyone. A special feature is that Gemini access on Workspace for Education accounts will […]
Hackers claim to have collected 49 million Dell customer addresses before the company discovered the breach
A hacker calling himself Menelik claimed he stole the data of 49 million Dell customers. Menelik claims to have illegally accessed an online Dell portal and stolen customer data, including home addresses, directly from Dell’s servers. Techlade has verified that a portion of the stolen data matches Dell customer records. On Thursday, Dell sent an […]
Dell’s data was hacked, revealing customers’ home address information
Today, Dell, a famous computer manufacturer, officially confirmed a data leak incident affecting customers’ personal information. According to the announcement, this incident involved the disclosure of the names and addresses of some Dell customers. According to information from Techlade and widely shared on social networks, Dell confirmed that it is investigating an “incident related to […]
Cracking passwords using Brute Force takes more time, but don’t rejoice!
Although it takes longer to crack passwords than before using Brute Force, cybersecurity experts warn that this is not necessarily good news. The security level of a password depends directly on its length and composition, including numbers, letters and special characters. The shorter and simpler the password, the easier it is to crack in a […]
‘White hat’ hackers actively attack to protect network security systems
Organizations are increasingly proactive in their defenses to stop threats before they become attacks, according to a report published Wednesday by an attack simulation and phishing company. In its 2024 Security Validation & Exposure Management report, Cymulate argues that security leaders are aware that the model of buying new technology and managing vulnerabilities in a […]
‘Two-sided’ investment: Anti-spying but supporting malware?
Although cybersecurity investors regularly affirm their commitment to combating spyware, there have been cases where a company in the sector has invested in a manufacturer of exploitative software. On Monday, the Biden administration announced six countries joining an international coalition aimed at curbing the rise of commercial spyware. This type of software is provided by […]
- 1
- 2