Vulnerability
Search documents
When "Mental Illness" Meets "Vulnerability" | Mengge Wang | TEDxZhengzhou No.7 HS
TEDx Talks· 2025-11-06 17:44
Ladies and gentlemen, today I stand before you to discuss a topic that has long been shrouded in stigma and misunderstanding. Mental illness and vulnerability. We live in a world that love to categorize, judge, and label.When we hear the words mental illness, many of us immediately conjure up images of weakness, instability, or something to be fair. But what if I told you that these labels are not only inaccurate but also incredibly harmful. What if vulnerability be far from the sign of fragility is actuall ...
WE'RE IN A SPIRITUAL CRISIS!
The Diary Of A CEO· 2025-11-03 18:30
[Music] You are the single most requested guest. >> And let me tell you, this has not been easy because we went to some hard places. But I don't think we'll ever talk about anything more important than this.Cuz it's not fear that gets in the way of us being brave with our lives and our work. It's the armor that we reach for to self-protect when we're afraid. And the hardest work is being aware of what is my armor when I'm afraid.>> Is that automatic. >> Oh no. That's a train.>> And what about vulnerability. ...
The simplest solution to overcome division | Newton Cheng | TEDxInglewood
TEDx Talks· 2025-10-31 15:11
[Music] [Applause] Are you right or you left? an educated elite or a member of the working class, a climate change doomer climate change denier? Do you see diversity, equity, and inclusion as liberation or discrimination? These aren't just questions anymore. We've turned them into weapons and we're pointing them at each other. at strangers, our neighbors, even our own family members. Conversations have become loyalty tests. Disagreements, battles for our own tribe. In the 46 years I've been alive, this is t ...
'Dating journalist' seeks answers on Gen Z relationship struggles
NBC News· 2025-10-31 03:00
What a beautiful day. >> Take a stroll down Dallas's Katy Trail. >> Hey, I have a question.Are you single. >> And your cardio may turn into a heartto-heart. >> He's taken.>> Ah, Elbeth Wimpy is trying to get to the bottom of Jenz's dating woes. >> Oh, awesome. >> When was the last time you kissed a girl.>> It's been a minute. >> When was the last time you went on a date. >> Honestly, I couldn't tell you.Have you ever ghosted a girl. >> Yeah. >> Why would that.Candid conversations like that have earned her m ...
Skin, Shape, Self: A Celebration | Hema Thakur | TEDxKPRIT
TEDx Talks· 2025-10-23 15:42
[Music] isn't it lovely how beautiful how beauty is just a matter of nazaria or perspective and what better way to put that than our lyricists have speaking of nazaria did you know that Ganesha the Indian deity who is known as a vigna hara or the remover of obstacles today was once upon a time known as Vignna Karta the creator of obstacles. Confused. Let me explain.So in olden times whenever there was any flood or any famine people would attribute such natural catastrophes to an angry version of this dity w ...
X @Wu Blockchain
Wu Blockchain· 2025-10-18 04:16
Vulnerability Overview - OneKey reported a vulnerability affecting approximately 120 thousand Bitcoin private keys [1] - The vulnerability stems from Libbitcoin Explorer (bx) 3x, which uses system time and the Mersenne Twister-32 algorithm with a small 2^32-bit seed space, making keys predictable [1] Affected Products - Affected wallets include Trust Wallet Extension 00172–00183 and Trust Wallet Core ≤311 [1] - Other products using the same libraries are also affected [1]
The Courage To Be Seen | Latil Willis | TEDxColumbiaCollegeChicago
TEDx Talks· 2025-10-17 15:22
[Applause] If my life were a movie, it would be Freaky Friday, but messier. Think less Lindsay Lohan, more emotionally repressed adults having meltdowns in the middle of Disney movies. For those of you who don't know, Freaky Friday is a film where a mother and daughter magically switch bodies for a day.And during this chaotic, hilarious, slightly traumatic swap, they're forced to see each other more clearly. They live each other's lives and feel each other's frustrations. And in that, something healed betwe ...
The Good and Bad of Distant Intimacy | Toy Monique Hawkins | TEDxColumbiaCollegeChicago
TEDx Talks· 2025-10-17 15:21
Good evening. I am Toy Monnique Hawkins. As a creative and a businesswoman, I develop and produce television, films, and literature.mostly by bringing together other creatives and teams of individuals or businesses so that we can deliver an experience and we do that from a very intimate distance kind of an oxymoron I think maybe a little bit but it's truly a remarkable gift when characters land with an audience or story lines relate in ways that make viewers cry, make them laugh, invokes fear, a little bit ...
Part 2: Social engineering, malware, and the future of cybersecurity in AI
Google DeepMind· 2025-10-16 16:08
Cybersecurity Threats & Actors - Nation-state actors are primarily motivated by geopolitical aims and espionage, often engaging in offensive cyberattacks to support warfare or prepositioning for potential conflicts [5][6] - Subnation-state actors and some nation-state activities are financially motivated, commonly using ransomware attacks to steal and encrypt data, demanding cryptocurrency for its release [9][10] - A gray market exists for zero-day vulnerabilities, with buyers including companies equipping law enforcement and governments, with some vulnerabilities worth millions of dollars [12][14] - AI is exacerbating social engineering risks by enabling deep fakes, making phishing attacks more tailored and effective, such as cloning voices for ransom demands or impersonating executives for financial fraud [30][32][33] Vulnerability Disclosure & Mitigation - Project Zero introduced a 90-day disclosure timeline for vulnerabilities, compelling companies to prioritize security patches to prevent exploitation by malicious actors [19][20] - Governments have been known to deliberately withhold vulnerability information for exploitation purposes, as exemplified by the Eternal Blue case [24] - Healthcare and critical infrastructure sectors often struggle with patch management due to the risk of disrupting essential services, leading to long-term vulnerabilities [29] - Multi-factor authentication and pass keys are emerging as strong defenses against phishing and password-related attacks, enhancing security and user experience [37][39][40] AI & Agent Security - Risk-based authentication, enhanced by AI, assesses user behavior to determine trust levels and adjust security friction accordingly, such as requiring multi-factor authentication based on anomalous activity [43][46] - The rise of AI agents acting on behalf of humans introduces new security challenges, requiring careful consideration of agent identity, permissions, and potential for misuse [50][51] - Contextual integrity is crucial for training AI agents to respect privacy norms and avoid disclosing sensitive data inappropriately, necessitating mechanisms for agents to seek permission before sharing information [57][58][59]