Pornhub is using AI and facial recognition to tag its videos
Tweet Facebook Google plus Send to 1 CommentHOBBYIST SITE Pornhub is embracing artificial intelligence (AI) and facial recognition to tag its videos, which could make them more accurately described and...
View ArticleIntel's Nervana AI chips take aim at Nvidia GPUs Firm says 'industry first'...
Intel's Nervana AI chips take aim at Nvidia GPUsFirm says 'industry first' processor will be out later this yearCHAINMAKER Intel has shown off what it describes as the "industry's first neural network...
View ArticleGoogle Bug Bounty Program : Target - Android Apps
Google Offers Big Rewards To Hack Android's Most Popular AppsGoogle is looking to improve its Play Store security. Google calls security researchers who invest their time and effort in order to make...
View ArticleHacker takes over Coinhive DNS Server using an old password
Hacker takes over Coinhive DNS Server using an old passwordAn unknown attacker has hijacked Coinhive's DNS server and replaced the legitimate Coinhive JavaScript in-browser miner with a malicious...
View ArticleA new Ransomware 'Bad Rabbit' strikes Ukraine and Russia
'Bad Rabbit' ransomware strikes Ukraine and RussiaA new strain of ransomware nicknamed "Bad Rabbit" has been found spreading in Russia, Ukraine and elsewhere.The malware has affected systems at three...
View ArticleCanvas fingerprinting may be blocked in Firefox 58
The Mozilla Foundation is boosting privacy in an upcoming version of its Firefox browser by removing the snooping capability called canvas fingerprinting, a method of tracking users across multiple...
View ArticleBritish Energy Industry is being targeted by Russian Hackers
British Energy Industry is being targeted by Russian HackersRussian hackers have attacked targets from the British energy industry over the last 12 months, the head of the country’s National Cyber...
View Article20 Million Amazon Echo And Google Home Devices Are Affected By Bluetooth Hack
A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal...
View ArticleBanking Trojan Got The Especial Ability To Steal Facebook, Twitter and Gmail...
Banking Trojan Got The Especial Ability To Steal Facebook, Twitter and Gmail Accounts.Security researchers have discovered a new, sophisticated form of malware based on the notorious Zeus banking...
View ArticleHere is How to Troubleshoot Your iPhone’s Wifi Hotspot
Here is How to Troubleshoot Your iPhone’s Wifi Hotspot.Now you can Troubleshoot Your iPhone’s Wifi Hotspot using the different ways that will help you to work it correctly as lots of time you must be...
View ArticleCryptocurrency Mining Scripts Even Run After You Close Your Browser
Cryptocurrency Mining Scripts Even Run After You Close Your BrowserSome websites have found using a simple yet effective technique to keep their cryptocurrency mining javascript secretly running in the...
View ArticleHidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites
Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 SitesBuying popular plugins with a large user-base and using it for effortless malicious campaigns have become a new trend for bad...
View ArticleHackers Can Steal All Your Passwords Through The Pre-Installed Password...
Hackers Can Steal All Your Passwords Through The Pre-Installed Password Manager On Windows 10 If you are running Windows 10 on your PC, then there are chances that your computer contains a...
View ArticleCrypto Mining Crackdown By China Threatens Bitcoin's Future
With its price dropping, sky-high transaction fees, growing tractionamong competitors, and regulatory agencies taking action in several countries, Bitcoin is starved for good news. Today marked another...
View ArticleFeedspot ranked Top 40 Cyber Security News Websites And Hacker Ritz Is In...
Few days back, Feedspot ranked Top 40 Cyber Security News Websites/Blogs out of thousands of blogs from all over the World.Feedspot is a Modern RSS Reader. If you're trying to keep up with news and...
View ArticleAnyone Can Find Your Aadhar Data Due To Vulnerability Claims French Security...
Vulnerability in mAadhaar Android app allows anyone to steal your Aadhaar data, finds French security researcherAfter an investigation by a leading English news daily in India discovered how Aadhaar...
View ArticleSPYRUS NEWS : Providing Very Strong Security In This Insecure World , Grab...
SPYRUS SEMS provides a very strong security and productivity solution for any organization deploying SPYRUS encrypting secure storage drives and/or our Microsoft certified bootable Windows To Go Live...
View ArticleAlexander Nix Of Cambridge Analytica's : A Villain Or A Tech Genius.
LONDON: The British press and parliamentarians - and his own former employees - are divided over how to characterize the mysterious, plummy, exquisitely tailored Alexander Nix, founder of the now...
View ArticleWipro's New Tech Centre Will Enhance Tech Standard.
India’s third-largest IT services company Wipro on Tuesday said it has opened a new technology centre in Plano, Texas. The centre will initially employ 150 people and Wipro will increase the headcount...
View ArticleHackers Reveal How Code Injection Attack Works in Signal Messaging App
Hackers Reveal How Code Injection Attack Works in Signal Messaging AppAfter the revelation of the eFail attack details, it's time to reveal how the recently reported code injection vulnerability in the...
View Article
More Pages to Explore .....