article thumbnail

Bodyguard is a mobile app that hides toxic content on social platforms

TechCrunch

If you’re somewhat famous on various social networks, chances are you are exposed to hate speech in your replies or in your comments. After you download the app and connect the app with your favorite social networks, you choose the level of moderation. The company has started with a mobile app that anyone can use.

Social 257
article thumbnail

TechCrunch+ roundup: Gen Z VCs, choosing a GTM model, crypto crisis communication tips

TechCrunch

Use discount code TCPLUSROUNDUP to save 20% off a one- or two-year subscription. Tech investors born after 1996 “have raised funds, garnered social media followings and profited from the Gen Z mentality,” says Andrew Chan, a senior associate at Builders VC. .” Full TechCrunch+ articles are only available to members.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. Caesars noted in a filing that an “unauthorized actor” had stolen data in a social engineering attack targeting an outsourced IT support vendor, according to an InfoSecurity report. Déjà vu can suck sometimes.

article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. Reconnaissance Uses AD explorer to enumerate users, computers, and groups. Creates decoy users, user groups, and computers in your Active Directory.

article thumbnail

Gen Z social app Yubo rolls out age ‘estimating’ technology to better identify minors using its service

TechCrunch

Yubo , a social livestreaming app popular with a Gen Z audience, announced today it’s becoming one of the first major social platforms to adopt a new age verification technique that uses live image capture technology to identify minors using its app, in order to keep them separated from adult users.

article thumbnail

6 most underhyped technologies in IT — plus one that’s not dead yet

CIO

But with all due respect, AI is hardly the only critical tech in town. Isn’t it time some of those overlooked and underappreciated technologies get their due? With that in mind, we asked a group of IT leaders and tech analysts to list what they think are some underhyped technologies, why they get overlooked, and why they shouldn’t.

article thumbnail

Article: Virtual Group Coaching: How to Improve Group Relationships in Remote Work Settings

InfoQ Culture Methods

Due to the pandemic, many software development teams will work remotely longer or permanently or work in blended venues such as some team members working in an office, some working from home, some working from other venues. By William Rothwell, Cho Hyun Park.

Groups 98