AWS |
AWS Management Tools Blog |
Integrate AWS Support with Amazon Connect to receive critical outbound voice notifications |
https://aws.amazon.com/blogs/mt/integrate-aws-support-with-amazon-connect-to-receive-critical-outbound-voice-notifications/
|
Notifications for critical AWS Support cases are essential to ensure that issues that affect your workloads are addressed quickly AWS Support sends email notifications automatically when support cases are newly created or updated in your AWS accounts and they can be viewed in AWS Support Center or the AWS Managed Services AMS console for customers |
2023-12-20 15:58:52 |
Program |
JavaScriptタグが付けられた新着投稿 - Qiita |
Array.prototype.shift(),unshift(),push(),pop()を北斗の拳でアタァする。 |
https://qiita.com/TMDM/items/968c2422e3284b15fc10
|
prototype,shift,shiftunshiftpushpop |
2023-12-21 00:37:07 |
Program |
JavaScriptタグが付けられた新着投稿 - Qiita |
Babylon.js Playground上のサンプルで自分が欲しい部分を ChatGPT に取り出してもらう【完走賞ゲット-22】 |
https://qiita.com/youtoy/items/051e8e723dbd2bd72dff
|
babylonjsplayground,chatgpt,qiita |
2023-12-21 00:25:34 |
Program |
lambdaタグが付けられた新着投稿 - Qiita |
API GatewayからLambda非同期呼び出しをSAMで書く |
https://qiita.com/kenryo/items/37eccba3b5f84871183f
|
apigateway,adventcalendarawslambda,lambda |
2023-12-21 00:03:47 |
Program |
AWSタグが付けられた新着投稿 - Qiita |
Amazon Aurora Limitless Databaseが解決する課題とそのアーキテクチャについて |
https://qiita.com/ymktmk/items/05fc54d716629a4b8464
|
amazon,auroralimitlessdatabase,awsreinvent |
2023-12-21 00:42:58 |
Program |
AWSタグが付けられた新着投稿 - Qiita |
API GatewayからLambda非同期呼び出しをSAMで書く |
https://qiita.com/kenryo/items/37eccba3b5f84871183f
|
apigateway,adventcalendarawslambda,lambda |
2023-12-21 00:03:47 |
Program |
AWSタグが付けられた新着投稿 - Qiita |
【Amazon Kendra】Web Crawler connector v2.0のIaCのやり方 |
https://qiita.com/NKwest/items/90b8d6312c3efa7c3abb
|
amazon,amazonkendra,drawebcrawlerconnectorv |
2023-12-21 00:02:27 |
海外TECH |
Ars Technica |
EU will hold 3 major porn sites to same regulations as Meta, X |
https://arstechnica.com/?p=1992218
|
Xvideos Pornhub and Stripchat face curbs on age verification content moderation |
2023-12-20 15:06:36 |
海外TECH |
Engadget |
Researchers found child abuse material in the largest AI image generation dataset |
https://www.engadget.com/researchers-found-child-abuse-material-in-the-largest-ai-image-generation-dataset-154006002.html?src=rss
|
Researchers from the Stanford Internet Observatory say that a dataset used to train AI image generation tools contains at least validated instances of child sexual abuse material The Stanford researchers note that the presence of CSAM in the dataset could allow AI models that were trained on the data to generate new and even realistic instances of CSAM LAION the non profit that created the dataset told Media that it has a zero tolerance policy for illegal content and in an abundance of caution we are temporarily taking down the LAION datasets to ensure they are safe before republishing them The organization added that before publishing its datasets in the first place it created filters to detect and remove illegal content from them However points out that LAION leaders have been aware since at least that there was a possibility of their systems picking up CSAM as they vacuumed up billions of images from the internet nbsp According to previous reports the LAION B dataset in question contains millions of images of pornography violence child nudity racist memes hate symbols copyrighted art and works scraped from private company websites Overall it includes more than billion images and associated descriptive captions LAION founder Christoph Schuhmann said earlier this year that while he was not aware of any CSAM in the dataset he hadn t examined the data in great depth It s illegal for most institutions in the US to view CSAM for verification purposes As such the Stanford researchers used several techniques to look for potential CSAM According to their paper they employed perceptual hash based detection cryptographic hash based detection and nearest neighbors analysis leveraging the image embeddings in the dataset itself They found entries that contained suspected CSAM Many of those images were confirmed as CSAM by third parties such as PhotoDNA and the Canadian Centre for Child Protection Stability AI founder Emad Mostaque trained Stable Diffusion using a subset of LAION B data Google s Imagen text to image model was trained on a subset of LAION B as well as internal datasets A Stability AI spokesperson told Bloomberg nbsp that it prohibits the use of its test to image systems for illegal purposes such as creating or editing CSAM This report focuses on the LAION B dataset as a whole the spokesperson said Stability AI models were trained on a filtered subset of that dataset In addition we fine tuned these models to mitigate residual behaviors Stable Diffusion a more recent version of Stability AI s image generation tool was trained on data that substantially filtered out unsafe materials from the dataset That Bloomberg notes makes it more difficult for users to generate explicit images However it s claimed that Stable Diffusion which is still available on the internet does not have the same protections Models based on Stable Diffusion that have not had safety measures applied to them should be deprecated and distribution ceased where feasible the Stanford paper s authors wrote This article originally appeared on Engadget at |
2023-12-20 15:40:06 |
海外TECH |
Engadget |
QR code attacks probably aren’t coming for your scan-to-order menus |
https://www.engadget.com/qr-code-attacks-probably-arent-coming-for-your-scan-to-order-menus-153006742.html?src=rss
|
QR code based phishing attacks appear to be on the rise For this new hacking vector someone gets a phishing email asking them to scan a QR code that code redirects to a malicious link usually to steal credentials and an account takeover occurs Local news organizations have warned the public to watch out security leadership publications tell executives to be careful and security companies really really want you to call it quishing To be fair there have been some notable headlines about it lately A large scale version of this against an unnamed major US energy company went after Microsoft logins according to a Cofense report in August Security researchers have unanimously reported some level of uptick or spike in the attack vector this year Even the Federal Trade Commission warned consumers of the dangers The fanfare around these attacks however mostly outweighs the threat of using QR codes in your daily life Phishing has been and will likely always be a prevalent way to trap victims and what we re seeing when people talk about QR code attacks is just another way to do that That s why despite how the reports may generalize the dangers of QR codes as a whole some common sense security practices that you already use to avoid phishing can help you avoid this tactic too Other advanced QR based attack vectors outside of phishing are likely too technically complicated and low reward for bad actors to attempt or for you to worry about Phishing attacks that work by pointing a victim to a malicious link are incredibly common and QR codes are essentially just another way to execute them QR codes are jumping into a security gap said Randy Pargman director of threat detection at security firm Proofpoint It forces a victim away from their computer and onto a cell phone or another device adding a level of distraction Plus people are more likely to fall for a phishing link on a mobile device according to Pargman The smaller scale makes it harder to tell what s legit for example you can t easily see a full link to point out discrepancies and we generally tend to feel safer in our handheld world Scanning a QR code on a phone takes a victim away from their computer That could mean it has fewer security plugins installed on its browser that would warn you to stay away from suspicious sites although more browsers have automatic protections against both Or if it s taking you from a work device to a personal device a security team probably supports the computer but not your cell phone with extra protections in place to stop you from falling victim But on the flip side this is a lot less efficient for scammers to set up It assumes the victim has access to two devices rather than just clicking a link Plus people tend to scan the QR codes even if they re from an unfamiliar source because we re so used to it according to Fae Carlisle principal security engineer at VMware Carbon Black People are regularly told to scan a QR code to show them a map of a place to vote in a competition to visit Instagram etc Carlisle said Because of inherent trust people go along with it Hackers seemingly saw this trend and figured out they could exploit it While the application of QR codes to phishing attacks is fairly straightforward the hype around their use in other malicious vectors mostly ends there Security professionals advise against scanning unknown QR codes in the same way you shouldn t plug a random thumb drive into your device But while you should always be on guard to protect against phishing attacks you don t really have to worry about using QR codes in your daily life because it s still rare to see them used as a hacking tactic This matters because when we think of QR codes we don t usually think of getting them in emails You re probably more familiar with them from real world interactions like a call to action on a flier or a scan to order menu at a restaurant Looking at my own inbox and desktop the instances of getting a QR code are few and far between with maybe the exception of some multifactor authentication apps and cross login for VPNs Basically for a hacker going after everyday targets the less effort the better and plastering a poisoned QR code all over physical space in the hopes someone will scan it is a whole lot of work according to Pargman Bulk sending phishing emails is just a heck of a lot more efficient While it s also possible to imagine a link takeover situation where the destination of legitimate QR codes is redirected to a malicious URL that really hasn t been seen yet Not only is it a lot of effort but it would require an attacker to identify a widely used QR code That would mean sourcing the code information and then hoping it was worth the work Quishing may be legit but avoiding QR codes at all costs probably goes a step too far If something seems off about scanning a QR code pause before proceeding If you re scanning a menu of the restaurant s and it s asking you to login to your Gmail account to access the menu that s a highly unexpected step said Olesia Klevchuk product marketing director at security company Barracuda Networks Those are the kinds of things we want to be on the lookout for But if you just want to learn more about an exhibit at a museum or have a contactless check in at the gym you probably have nothing to worry about This article originally appeared on Engadget at |
2023-12-20 15:30:06 |
海外TECH |
Engadget |
Apple Pay, Apple Card and Wallet are down for some users |
https://www.engadget.com/apple-pay-apple-card-and-wallet-are-facing-outages-151139333.html?src=rss
|
Apple s financial services including Apple Pay Apple Cash Apple Card and Wallet have been experiencing service disruptions for some users since AM this morning the company reports As of AM ET those services still have outage notices on Apple s System Status page As AppleInsider notes it s unclear how widespread the issues are but the company has experienced intermittent Apple Pay issues earlier this year nbsp On a personal note I was able to use Apple Pay without issue around AM ET to make a pick up order at Starbucks After launching in it took a while for Apple Pay and other contactless payments options to reach widespread support in the US These days you can tap your phone or Apple Watch to pay at most major retailers except for Home Depot for some reason Depending on how long this outage lasts Apple may end up losing some consumer trust as users have to dig out their credit cards or God forbid cash to grab their morning lattes nbsp This article originally appeared on Engadget at |
2023-12-20 15:13:55 |
YouTube Channels |
TED |
My Mission to Change the Narrative of Mental Health | Glenn Close | TED |
https://www.youtube.com/watch?v=G5UT0K_NEig
|
Legendary actor and mental health advocate Glenn Close is on a quest to change how we think about mental health starting with her decision to speak out about her own family s struggles ーa brave choice considering the stigma that pervades the topic In a sweeping conversation with TEDWomen curator Pat Mitchell Close shares the inspiration behind the advocacy group she founded to combat the crisis underscoring the transformative power of community and the critical need for comprehensive mental health care systems If you love watching TED Talks like this one become a TED Member to support our mission of spreading ideas Follow TED X Instagram Facebook LinkedIn TikTok tedtoksThe TED Talks channel features talks performances and original series from the world s leading thinkers and doers Subscribe to our channel for videos on Technology Entertainment and Design ーplus science business global issues the arts and more Visit to get our entire library of TED Talks transcripts translations personalized talk recommendations and more Watch more TED s videos may be used for non commercial purposes under a Creative Commons License Attribution Non Commercial No Derivatives or the CC BY NC ND International and in accordance with our TED Talks Usage Policy For more information on using TED for commercial purposes e g employee learning in a film or online course please submit a Media Request at TED TEDTalks mentalhealth |
2023-12-20 15:19:41 |
コメント
コメントを投稿