Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Developer Says the ‘Friend’ AI Amulet Ripped Off His Project, Releases Diss Track

Posted on August 2, 2024

Screenshot 2024 07 30 At 8.50.29 am

Another piece of AI hardware, that looks nearly identical, and is also called “Friend,” was launched long before this week’s product.

Posted in News

Post navigation

Previous: How Cyberthreats Could Disrupt the Olympics
Next: Webinar: Discover the All-in-One Cybersecurity Solution for SMBs

Recent Posts

  • Advisory: CISA Issues Emergency Directive for Critical Microsoft Exchange Flaw
  • National Academies to fast-track a new climate assessment
  • Ford switches gears, will push smaller EVs over full-size pickup and van
  • The 8BitDo Pro 3 Is So Dang Customizable, You’ll Never Need Another Controller
  • Redefining the Role: What Makes a CISO Great

Recent Comments

No comments to show.

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

OpenAI Is Trying Hard to Quickly Trademark ‘GPT’

  • News

As AI hysteria continues to pick up steam, OpenAI seems…

  • rooter
  • April 25, 2023
  • 1 min read
  • 0

Why Attackers Target the Gaming Industry

  • News

Key Takeaways: The gaming industry is a common target for…

  • rooter
  • May 30, 2023
  • 9 min read
  • 0

Neom, Saudi Arabia’s Futuristic City, Suddenly Loses Its CEO

  • News

Pitched as a mix of ‘Blade Runner’ and ‘Jurassic Park,’…

  • rooter
  • November 12, 2024
  • 1 min read
  • 0

ESXi ransomware attacks use SSH tunnels to avoid detection

  • News

Threat actors behind ESXi ransomware attacks target virtualized environments using…

  • rooter
  • January 27, 2025
  • 2 min read
  • 0
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.