Behave for Chrome and Firefox warns you of port scans and local attacks – gHacks Tech News

smmfh

Behave! is a new browser extension for Google Chrome and Mozilla Firefox that is designed to inform its users when sites misbehave by performing port scans or access private IP addresses. The extension may also work in other Chromium-based and Firefox-based browsers but I have not tested that. Continue reading

PSA: All Apps Can Read Your iPhone and Android Clipboard

Be wary of all them apps u install…

Have you seen the news about TikTok? A new privacy feature in iOS 14 revealed that the Chinese social media app was constantly reading iPhone clipboards. But that’s nothing new. All apps can read your smartphone clipboard whenever they like. Continue reading

Wrongfully Arrested Because Face Recognition Can’t Tell Black People Apart

I keep telling ppl facial recognition doesn’t work on melanated ppl…. expect more BS like this as long as “we” stay out of tech like this

Early this year, Detroit police arrested Robert Williams — a Black man living in a Detroit suburb — on his front lawn in front of his wife and two little daughters (ages 2 and 5). Robert was hauled off and locked up for nearly 30 hours. His crime? Face recognition software owned by Michigan State Police told the cops that Robert Williams was the watch thief they were on the hunt for. Continue reading

5 Free Zoom Alternatives for Video Conferencing and Online Meetings

I didn’t even know about a couple of these…hmmm

Everybody wants to know, “What’s the best free video chat app?” The answer is, the one that best fits your needs. Here’s a look at some of the new and free video conference apps that you should be using. Continue reading

Bluetooth BIAS attack; new way to hack into any laptop, smartphone or IoT device supporting Bluetooth

Due to the current pandemic situation around the globe, the cyberattackers have taken advantage of the lockdown and breaching data of big companies and selling them. Researchers have now discovered a new vulnerability in the Bluetooth wireless protocol which is used to interconnect devices and share data. Hackers have multiple ways to attack your systems and steal the data present but have you ever thought of hackers using Bluetooth attacks to breach into your system and steal data? Continue reading