Tue.Jan 28, 2025

article thumbnail

Apple researchers reveal the secret sauce behind DeepSeek AI

Collaboration 2.0

The AI model that shook the world is part of a broad trend to squeeze more out of chips using what's called sparsity.

363
363
article thumbnail

Mega-Breaches Bump Up 2024 Victim Count

Data Breach Today

Identity Theft Resource Center Catalogs 3,158 Known US Incidents in 2024 The number of U.S. organizations falling victim to a data breach appears to be holding steady, as viewed on an annual basis, according to the latest annual data breach report from the Identity Theft Resource Center, which counted 3,158 reported data breaches in 2024, down just 1% from 2023.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This new Android feature protects your phone, even if someone has your PIN

Collaboration 2.0

If you're looking for an additional layer of security for your Android device, Google's Identity Check might be just the ticket. Here's how it works.

Security 325
article thumbnail

EU Sanctions Russian Intel Officers Linked to Estonia Hack

Data Breach Today

Europe Targets Officers of Unit 29155 of the Russian Main Intelligence Directorate The European Union sanctioned on Monday three officers of a Russian military intelligence unit for their role in cyberattacks targeting Estonia in 2020. The sanctions are tied to the unit's 2020 hack of the Estonian government departments and the exfiltration of sensitive documents.

Military 147
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

This lightweight, easy-to-use Linux OS can save your aging Windows 10 PC

Collaboration 2.0

If your computer currently runs Windows 10 but doesn't support Windows 11, you might want to install an OS that will live past 2025, and WattOS is a great option.

317
317

More Trending

article thumbnail

Why I pick this ultraportable Lenovo tablet over the iPad Air for mobile entertainment

Collaboration 2.0

The Lenovo Tab Plus houses a surprisingly powerful speaker system and a 2K display, enough to make a competing iPad look bad.

298
298
article thumbnail

UHG's PR Headache: How Did Breach Total Jump to 190 Million?

Data Breach Today

Experts Explain Complexity of Company's Massive Data Breach Analysis Endeavor UnitedHealth Group says its previously eye-popping estimate of 100 million people affected by last year's attack on its Change Healthcare unit nearly doubled in recent months to a staggering 190 million victims. Why did it take so long for the company to figure out the extent of the compromise?

article thumbnail

The Lenovo ThinkPad I recommend to most professionals is also one of the most affordable

Collaboration 2.0

Lenovo's sixth-generation ThinkPad E14 is a budget laptop designed to be a reliable workhorse for day-to-day tasks.

297
297
article thumbnail

DeepSeek's Rise Shows Limits of US Chip Controls

Data Breach Today

China's DeepSeek AI Model Sparks US Policy Debate Amid Growing Industry Concerns The global artificial intelligence race saw a historic "Sputnik moment" this week when the Chinese startup DeepSeek claimed to develop a competitive model with $6 million and a stockpile of old Nvidia semiconductors - defying export restrictions and raising alarms about China's ability to innovate.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

How to protect your privacy from Facebook - and what doesn't work

Collaboration 2.0

Bothered by Facebook looking over your shoulder? Here are some ways to keep Meta from being such a snooper.

Privacy 264
article thumbnail

Insider Fraud: Ignore It at Your Own Risk

Data Breach Today

British Museum IT Disruption Highlights Missteps in Identity and Access Management The British Museum faced unexpected disruption when a former contractor trespassed into the museum and disabled its IT systems. This disruption highlights the risks posed by disgruntled employees and raises concerns about access rights after employment ends.

Risk 130
article thumbnail

Installing iOS 18.3? Here are the 3 biggest features you should try out first

Collaboration 2.0

iOS 18.3 is a relatively small update but with notable changes to the iPhone's AI features. Here's the rundown, and how to modify them.

263
263
article thumbnail

Eclypsium Raises $45M to Guard AI and Telecom Infrastructure

Data Breach Today

Series C Funding Targets Supply Chain Risks in AI, Next-Gen Infrastructure Security Eclypsium raised $45 million in Series C funding to address emerging cyber threats in AI workloads, GPU systems and the global supply chain. With support from Qualcomm and 1011 Ventures, the company will to tackle advanced cyberthreats from nation-state adversaries like Volt Typhoon.

Risk 130
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Block's new open-source AI agent 'goose' lets you change direction mid-air

Collaboration 2.0

Block built its agent - 'codename goose' - to do it all, from writing code to ordering your dinner. Here's how to access it.

Access 260
article thumbnail

Tips for Detecting Real-time Deepfakes: A Guide to Staying One Step Ahead

KnowBe4

Deepfakes are no longer just the stuff of sci-fi thrillerstheyre here, and theyre deceptively good. From celebrity endorsements to real-time impersonations , deepfake technology has advanced to the point where spotting one isnt as easy as it used to be.

IT 116
article thumbnail

7 apps that helped me escape the cloud - and protect my data privacy

Collaboration 2.0

If you're tired of knowing that a third party has access to your data and content, it's time to move away from cloud services that may be selling your information or using it to train their LLMs.

Cloud 254
article thumbnail

Using Genuine Business Domains and Legitimate Services to Harvest Credentials

KnowBe4

KnowBe4 Threat Lab analyzed a sophisticated phishing campaign targeting multiple organizations to harvest Microsoft credentials.

Phishing 111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What to know about DeepSeek AI, from cost claims to data privacy

Collaboration 2.0

Besides one-upping US rivals and panicking investors, DeepSeek presents a host of security concerns. Here's what you should know.

article thumbnail

Microsoft is Still the Most Commonly Impersonated Brand in Phishing Attacks

KnowBe4

Microsoft, Apple, and Google were the most commonly impersonated brands in phishing attacks last quarter, according to researchers at Check Point.

article thumbnail

I've used every Samsung Galaxy S25 model - and the one I love most isn't the Ultra

Collaboration 2.0

My favorite Galaxy S25 model (and the one most people should buy) strikes the right balance of form and function.

250
250
article thumbnail

CyberheistNews Vol 15 #04 [HEADS UP] Bad Actors Abuse Google Translate to Craft Phishing Attacks

KnowBe4

CyberheistNews Vol 15 #04 [HEADS UP] Bad Actors Abuse Google Translate to Craft Phishing Attacks

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Apple reveals the secret to updating every AirPods model - and it's easier than you think

Collaboration 2.0

Rather than leave it up to chance, you can take steps to update your specific AirPods model to the latest software version.

IT 247
article thumbnail

The Nobel Prize embraces AI: A turning point in academia and beyond

CGI

The Nobel Prize is now embracing AI in ways that were unimaginable just a decade ago. Learn more in this CGI blog.

66
article thumbnail

I mapped my iPhone's Control Button to ChatGPT - here are 5 ways I use it everyday

Collaboration 2.0

I haven't used Siri once since the switch.

IT 246
article thumbnail

Three data must-haves in applying GenAI to payments processing

CGI

This CGI blog explores three data must-haves in applying GenAI to payments processingdata quality, alignment and governance.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Finally, I found a wireless charger for my iPhone with a built-in fan and Qi2 support

Collaboration 2.0

Wireless chargers are known for their predisposition to generate heat during charging. The Torras PolarCircle solves this problem - and solves it well.

IT 243
article thumbnail

Online Safety Act: Protecting Children from Harmful Content Online – Ofcom’s Guidance on Age Assurance for Part 3 Services

Data Protection Report

Ofcom has published its guidance for implementing age assurance measures for regulated service providers.User-to-user (U2U) services and search services take note:a decision not to implement highly effective age assurance measures means that your service may be deemed by Ofcom to be accessible by children.

Access 40
article thumbnail

I put DeepSeek AI's coding skills to the test - here's where it fell apart

Collaboration 2.0

Is DeepSeek the next big thing in AI? How this Chinese open-source chatbot outperformed some big-name AIs in coding tests, despite using vastly less infrastructure than its competitors.

IT 240