#AI #facebook
โกFacebook is introducing Dynaboard, an evaluation-as-a-service platform for conducting comprehensive evaluations of NLP models.
Link: https://ai.facebook.com/blog/dynaboard-moving-beyond-accuracy-to-holistic-model-evaluation-in-nlp
It enables dynamic, apples-to-apples comparisons dynamically, overcoming some of the key challenges in AI evaluation today! ๐
~ @geekcode
โกFacebook is introducing Dynaboard, an evaluation-as-a-service platform for conducting comprehensive evaluations of NLP models.
Link: https://ai.facebook.com/blog/dynaboard-moving-beyond-accuracy-to-holistic-model-evaluation-in-nlp
It enables dynamic, apples-to-apples comparisons dynamically, overcoming some of the key challenges in AI evaluation today! ๐
~ @geekcode
Collection of resources realted to ANDROID, SOFTWARE SECURITY & other professional guide's โก
https://github.com/ashishb/android-security-awesome
~ @geekcode
https://github.com/ashishb/android-security-awesome
~ @geekcode
Forwarded from Cyber Agents
Have I been Pwned goes open source
Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.
https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/
@cyberagents X @geekcode
Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.
https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/
@cyberagents X @geekcode
How Scareware Comes in Used?
Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.
Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the userโs device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.
Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.
For query : @geekcode
~ @geekcode
Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.
Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the userโs device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.
Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.
For query : @geekcode
~ @geekcode
These Codes have 5 different ranges from 1รร - 5รรโก
1รร โ Informational
2รร โ Success
3รร โ Redirection
4รร โ Client error
5รร โ Server error
Some Important HTTP STATUS CODES:
100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint
200: OK / Success
201: Created
202: Accepted
207: Multi-Status
301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect
400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons
500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout
For query : @geekserverbot
~ @geekcode
1รร โ Informational
2รร โ Success
3รร โ Redirection
4รร โ Client error
5รร โ Server error
Some Important HTTP STATUS CODES:
100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint
200: OK / Success
201: Created
202: Accepted
207: Multi-Status
301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect
400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons
500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout
For query : @geekserverbot
~ @geekcode
What is Social Engineering?
The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.
For query : @geekserverbot
~ @geekcode
The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.
For query : @geekserverbot
~ @geekcode
How to exploit insecure WebResourceResponse configurations + an example vulnerability in Amazon apps
https://blog.oversecured.com/Android-Exploring-vulnerabilities-in-WebResourceResponse/
~ @geekcode
https://blog.oversecured.com/Android-Exploring-vulnerabilities-in-WebResourceResponse/
~ @geekcode
News, Techniques & Guides
Android: Exploring vulnerabilities in WebResourceResponse
When it comes to vulnerabilities in WebViews, we often overlook the incorrect implementation of