|
Researchers spot attackers using an existing phishing obfuscation tactic in order to better ensure recipients fall for their scam. The outlook is for more hacking
|
|
|
|
|
Is that any worse than "Microsoft tricks users into using Office 365?"
|
|
|
|
|
The 3D screen-printed, flexible sensors are not only able to detect electrophysiological activity coming from the brain but they can also harvest sweat. This brain has a good beat, and I could dance to it
|
|
|
|
|
Senior executives are 60 percent more likely to click on malicious links than their employees, making them a vulnerable target for hackers, according to a new report. You know what to do - get rid of the senior managers
|
|
|
|
|
When Windows 10 first launched back in 2015, Microsoft also made the OS a free upgrade for all Windows 7 and Windows 8 users who did so within the first year of its release. After July 29, 2016, that offer expired, and Windows 10 was no longer a free upgrade... except, it was. Can I activate Windows 7 with a Windows 11 key (you know, *really* upgrade)
|
|
|
|
|
Based on OpenAI's DALL-E text-to-image platform, Paint Cocreator will conjure up images in Windows Paint based on your descriptions. Just the thing for touching up that last screenshot you took
|
|
|
|
|
While it’s true that leaders want their employees to work hard and deliver high-quality results, measuring individual productivity on what is essentially a creative team process is barking up the wrong tree. Or just keep whipping them and hope for the best?
|
|
|
|
|
I've long said that the key to working in an environment where they flog the serfs is to learn to love the whip.
Software Zen: delete this;
|
|
|
|
|
Didn't you post that before, and didn't I reply about team bonuses or some other pithy (to me) comment?
|
|
|
|
|
I think that was a different Forrester post (I was sure I had posted this before as well, but it had a new date). That was “how to measure…” I think.
TTFN - Kent
|
|
|
|
|
In a new study, participants tended to judge faces appearing against backgrounds featuring houseplants or bookcases as more trustworthy and competent than faces with a living space or a novelty image behind them. So have a bunch of gold bars in the background for your next call
|
|
|
|
|
How about stacks of human skulls?
|
|
|
|
|
Management track!
TTFN - Kent
|
|
|
|
|
or they're French[^]...
Software Zen: delete this;
|
|
|
|
|
My Teams meeting background is the wizard's laboratory from King's Quest I. What impression does that make, I wonder?
There are no solutions, only trade-offs. - Thomas Sowell
A day can really slip by when you're deliberately avoiding what you're supposed to do. - Calvin (Bill Watterson, Calvin & Hobbes)
|
|
|
|
|
I wonder how my padded walls background affects everyone? Sure seems cozy to me!
|
|
|
|
|
Is compression equivalent to general intelligence? DeepMind digs up more potential clues. Do you need an AI on the other end to decompress?
|
|
|
|
|
The new interactive chatbots are inspired by actual celebrities and influencers, including MrBeast, Tom Brady, and Snoop Dogg. Because... ... ... Don't rush me, I'm sure I'll think of a reason soon...
|
|
|
|
|
Atlassian today announced updates to Jira’s capabilities designed to bring software teams and the business side closer together by enabling every team to manage its work, collaborate, and gain visibility into what other teams are doing. So they can help develop?
|
|
|
|
|
The U.S. Central Intelligence Agency says it’s building its own ChatGPT-style chatbot to help analysts sift through enormous amounts of data so it can improve its investigations. This one *only* plays Global Thermonuclear War
|
|
|
|
|
I want the CIA[^] to have ChatGPT give me recipes.
|
|
|
|
|
That was once a nice graphics card. How would you like to get between $30 and $561 for it? After all, the old one isn't secure (nor is the new one, but who's counting)
|
|
|
|
|
Researchers from four American universities have developed a new GPU side-channel attack that leverages data compression to leak sensitive visual data from modern graphics cards when visiting web pages. To be safe: remove the video card
|
|
|
|
|
Option 2: take my Dad's phone away
|
|
|
|
|
Hackers are breaching GitHub accounts and inserting malicious code disguised as Dependabot contributions to steal authentication secrets and passwords from developers. The hackers are all so dependable
|
|
|
|