An as-yet unidentified hacker pulled off quite a heist on Twitter recently. He (or she) gained access to a Twitter Admin account, and used that access to rapidly take control of a number of high profile Twitter accounts. Once the […]
Google recently published a blog post that didn’t get much attention, but that outlines a major change to the way the company’s video collaboration tool “Meet” works. The blog post reads in part, as follows: “In the coming weeks, you’ll […]
Google Meet is a video conferencing tool the company originally designed for Enterprise users. There are serious security issues with some of the more popular free or low-cost options available for the masses. So, Google made the decision to make […]
Facebook recently released an intriguing research paper called “The Hateful Memes Challenge: Detecting Hate Speech in Multimodal Memes.” It’s well worth the read and a closer look at the database developed over the course of the research. The idea is […]
If you use Twitter on a regular basis, then you probably saw the official tweet from the company. Effective immediately, they’ve shut down the functionality that allowed users to tweet via SMS, something that has been a part of the […]
Are you working from home right now? If so, you’re certainly not alone. Tens of millions of people are doing the same, and there are untold millions around the world doing likewise. Working from home presents a host of new […]
Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content. The major players on the social media landscape are […]
WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it’s got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities […]
Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server. In addition, […]