

Security
Microsoft will now monitor employees even more
The company is preparing several updates designed to temper employees’ desire to break rules in the workplace.
If enterprise employees believe there are things they can do online without the knowledge of their superiors, then Microsoft has bad news for them. So, the company is preparing several updates designed to moderate the desire of employees to break the rules in the workplace.
Microsoft contributed to roadmap where she notifies her corporate clients about the innovations, several updates. The first reads: “Microsoft 365 Compliance Center: Insider risk management – Increased visibility on browsers”.
The roadmap provides a link to Microsoft Compliance Center designed to protect companies from the dangerous activity of employees.
According to the Microsoft Compliance Center, “Web browsers are often used to access both sensitive and insensitive files in an organization.” The Compliance Center allows you to monitor “files copied to personal cloud storage, printed on local and network devices, transferred or copied to network shares, copied to USB devices.”
The question arises, is it possible to further increase the visibility? Judging by the second roadmap update, titled “Microsoft 365 Compliance Center: Insider Risk Management – New ML Detectors,” you can.
Obviously, the update means that companies will soon have bots that monitor employees’ activities on the network in search of possible risks. In other words, businesses that do not have enough “increased visibility in browsers” will be able to take advantage of machine learning technologies.
Microsoft offers a link to its Insider Risk Management page with an interesting phrase: “Customers acknowledge that information relating to the behavior, character, or performance of an individual user materially related to employment can be calculated by an administrator and made available to others in the organization. “
That’s right, you can investigate not only the activity and performance of an employee, but also his character. On the one hand, this is understandable. The easier it is for employees to make even the slightest violations, the more security restrictions should be. The more cybersecurity holes exist, the more chances that someone might want to exploit them.
On the other hand, this is further evidence of a complete lack of trust between people, especially between management and employees. Technology, because of its immediacy and ubiquity, has exacerbated this problem. The more companies use spyware to monitor employees (especially those working from home), the less trust between management and subordinates.

Electric Cars
Hackers hacked Tesla twice, for which they received 350 thousand dollars and Tesla Model 3

As part of Pwn2Own’s Vancouver-based commercial vulnerability finding event, a French team called Synacktiv managed to hack into Tesla systems twice.
On the first day, Synacktiv successfully performed a TOCTOU (Time-of-check to time-of-use) attack on the Tesla Gateway, and the group was rewarded with a $100,000 cash reward and a Tesla Model 3 car. And the next day hackers broke into the Tesla infotainment system, and received another 250 thousand dollars for this.
The Tesla cybersecurity team is already analyzing the actions of hackers in order to eliminate the vulnerabilities found with a firmware update.
Security
Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

A dangerous vulnerability has been discovered in one of the standard Windows 11 applications that could lead to the disclosure of sensitive information to the user. Moreover, at the moment the vulnerability is not closed and attackers can use it.
We are talking about the application Snipping Tool (Scissors). The vulnerability, called aCropalypse, allows you to undo changes made by a user when editing a screenshot, including cropped or blurred parts that hide sensitive data.
When you edit a screenshot, you can save it with the same name as the original file by overwriting it. However, as it turns out, the Windows 11 Snipping Tool does not remove the original information from the file, but simply leaves it added at the end, which is usually invisible to users. With some trickery, a potential attacker can extract hidden information from a file and see what information has been edited.
As you can see, edited screenshots are usually much larger due to the inclusion of information from the original image.
This is a pretty serious vulnerability. For example, if you share a screenshot of an order confirmation page on Amazon, it may contain an address, the same goes for credit card numbers and other sensitive data.
Security
In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

In recent months, the ChatGPT chatbot has been on the news pages, and this has forced many companies to catch up with OpenAI. Among them are Microsoft, Google and a number of Chinese corporations. However, reportedly, the situation could be different.
As early as 2018, Google is said to have had a natural language processing AI similar to ChatGPT. However, company executives closed the project, considering it too dangerous. One of the developers was research engineer Daniel De Freitas, and Noam Shazeer, a software engineer at Google, also contributed to the project.
The project was called Meena and was a chatbot that could talk about different topics. With him you could discuss TV shows, have discussions about philosophy and joke. At the same time, the developers believed that this technology could be added to the search engine, however, in the end, Google stopped development. The company said the bot did not meet its AI security standards.
Note that later, on the basis of these developments, the LaMDA chat bot was created, which flies into the basis of Bard. Thus, the development nevertheless reached the mass user, albeit with a great delay.
-
Components3 days ago
Resident Evil 4 favors Radeon RX 7000 graphics cards. Even with ray tracing, the RX 7900 XTX is faster than the RTX 4080
-
News6 days ago
Duster will receive an improved successor: Dacia Bigster will be launched into mass production
-
Electric Cars3 days ago
The first Geely crossover with Meizu Flyme Auto interface, Harman Kardon acoustics and a 92-inch projection screen. Lynk & Co 08 introduced
-
Components5 days ago
10-core processor Intel Core i5-12600K fell in price in the US by almost a third