News
Persona, Discord, and OpenAI – When “age verification” suddenly smells like FinCEN and Big Brother throws a party
6+ hour, 48+ min ago (211+ words) In addition, there are so-called experimental model checks, which suggest machine learning models that are either being tested or used productively. For the end user, it remains completely unclear which models operate with which training data and according to which…...
Meta tests facial recognition for its smart glasses
6+ day, 6+ hour ago (199+ words) Experiments by students have already shown that such scenarios are realistic, demonstrating how strangers can be identified with the help of glasses and external databases. Even though these experiments did not originate from Meta itself, they highlighted the potential for…...
Even Notepad now has malware vulnerabilities
1+ week, 1+ day ago (472+ words) Even Notepad now has malware vulnerabilities'igor'sLAB The once spartan text editor is becoming a potential target for attacks. What used to be little more than a digital notepad is now packed with features " and that is precisely the problem. Microsoft…...
TeamViewer closes critical access vulnerability without confirmation prompt
1+ week, 6+ day ago (276+ words) TeamViewer closes critical access vulnerability without confirmation prompt'igor'sLAB A security vulnerability has been identified in the remote maintenance software TeamViewer that allows logged-in attackers to bypass existing access restrictions. Specifically, this affects the "Allow after confirmation" function, which normally requires…...
Data protection in the age of artificial intelligence: why transparency, control, and humanity are now crucial
2+ week, 43+ min ago (690+ words) Data protection in the age of artificial intelligence: why transparency, control, and humanity are now crucial'igor'sLAB Artificial intelligence is currently changing almost all areas of work, from public administration and contract management to human resources. Automated processes, accelerated document processing,…...
LeakWatch 2026 – Security incidents, data leaks, and IT incidents in the current calendar week 6
2+ week, 1+ hour ago (556+ words) LeakWatch 2026 " Security incidents, data leaks, and IT incidents in the current calendar week 6igor'sLAB Today's edition of LeakWatch systematically reviews all verifiable cases of data leaks, IT breaches, and structural security problems that have become public in the current calendar…...
Google's new role as preferred cloud partner puts Apple's data protection strategy to the test
2+ week, 2+ day ago (473+ words) Google's new role as preferred cloud partner puts Apple's data protection strategy to the test'igor'sLAB Since the introduction of Private Cloud Compute in 2024, Apple has consistently focused its long-term AI strategy on data protection. The company deliberately positioned itself as…...
30 years of DDoS: why a structural problem persists
2+ week, 5+ day ago (447+ words) 30 years of DDoS: why a structural problem persists'igor'sLAB The first publicly documented denial-of-service attack occurred in 1996, when New York-based internet service provider Panix was rendered inaccessible for several days by a relatively simple SYN flood attack. A few hundred manipulated…...
Another massive data breach: why changing passwords is no longer enough
3+ week, 2+ day ago (477+ words) Another massive data breach: why changing passwords is no longer enough'igor'sLAB The rediscovery of a freely accessible database containing around 149 million stolen usernames and passwords dramatically illustrates how fundamentally the threat landscape in the digital space has changed. The incident…...
Email fraud using AI dramatically accelerates cyberattacks on companies
3+ week, 3+ day ago (418+ words) Email fraud using AI dramatically accelerates cyberattacks on companies'igor'sLAB The way in which companies are attacked has changed fundamentally in recent years. Instead of laboriously overcoming technical protection mechanisms, cybercriminals are increasingly targeting identities, trust, and everyday work processes. Email…...