Reading view

There are new articles available, click to refresh the page.

Canvassing to empty houses: knocking on doors in the smart doorbell era

Campaigning door-to-door is nothing new, but selling your party’s vision in the UK election to someone when you can’t see them can be a mixed blessing

Since their debut just over a decade ago, smart doorbells have been a revelation for anyone interested in home security and, though most won’t admit it, being a bit nosey. They’ve also transformed door knocking for political canvassers.

While doorbell camera footage of passersby pilfering packages or behaving badly can be found all over the internet, spare a thought for those campaigning for the country’s future.

Continue reading...

💾

© Photograph: Samuel Gibbs/The Guardian

💾

© Photograph: Samuel Gibbs/The Guardian

Sam Bankman-Fried funded a group with racist ties. FTX wants its $5m back

The Guardian reveals FTX trustees, in charge after the CEO’s downfall, allege payments were made with looted funds

Multiple events hosted at a historic former hotel in Berkeley, California, have brought together people from intellectual movements popular at the highest levels in Silicon Valley while platforming prominent people linked to scientific racism, the Guardian reveals.

But because of alleged financial ties between the non-profit that owns the building – Lightcone Infrastructure (Lightcone) – and jailed crypto mogul Sam Bankman-Fried, the administrators of FTX, Bankman-Fried’s failed crypto exchange, are demanding the return of almost $5m that new court filings allege were used to bankroll the purchase of the property.

Continue reading...

💾

© Composite: Reuters, Google Maps

💾

© Composite: Reuters, Google Maps

Computer says yes: how AI is changing our romantic lives

Artificial intelligence is creating companions who can be our confidants, friends, therapists and even lovers. But are they an answer to loneliness or merely another way for big tech to make money?

Could you fall in love with an artificial intelligence? When Spike Jonze’s film, Her, came out 10 years ago, the question still seemed hypothetical. The gradual romance between Joaquin Phoenix’s character Theodore and Scarlett Johansson’s Samantha, an operating system that embraces his vulnerabilities, felt firmly rooted in science fiction. But just one year after the film’s release, in 2014, Amazon’s Alexa was introduced to the world. Talking to a computer in your home became normalised.

Personified AI has since infiltrated more areas of our lives. From AI customer service assistants to therapy chatbots offered by companies such as character.ai and wysa, plus new iterations of ChatGPT, the sci-fi storyline of Her has come a lot closer. In May, an updated version of ChatGPT with voice assistant software launched, its voice’s similarity to Scarlett Johansson’s prompting the actor to release a statement claiming that she was “shocked, angered and in disbelief” that the AI system had a voice “eerily similar” to her own.

Continue reading...

💾

© Illustration: Thomas Burden/The Observer

💾

© Illustration: Thomas Burden/The Observer

‘It’s the perfect place’: London Underground hosts tests for ‘quantum compass’ that could replace GPS

Subatomic instrument will be able to accurately pinpoint locations under ground and under water, where satellite signals are often blocked

Dr Joseph Cotter takes some unusual pieces of luggage on his trips on the London underground. They include a stainless steel vacuum chamber, a few billion atoms of rubidium and an array of lasers that are used to cool his equipment to a temperature just above absolute zero.

While not the average kit you would expect to find being dragged into carriages on the District Line, this is the gear that Cotter – who works at Imperial College London’s Centre for Cold Matter – uses on his underground travels.

Continue reading...

💾

© Photograph: Thomas Angus

💾

© Photograph: Thomas Angus

How Blockchain Technology Can Help Safeguard Data and Strengthen Cybersecurity

Blockchain Technology

By Mohan Subrahmanya, Country Leader, Insight Enterprises In an era consistently besieged by data breaches and increased cyber threats, blockchain technology is emerging as a key tool for the enhancement of cybersecurity and the protection of data. It is a decentralized and secure way of recording critical data that brings forth innumerable benefits to many sectors through a sound framework for secure transactions and integrity of data.

Understanding Blockchain Technology

At its core, blockchain is a decentralized ledger that records transactions across a network of computers, ensuring that data remains transparent, secure, and immutable. Each block in the blockchain contains a timestamp, transaction data, and a cryptographic hash of the previous block, creating a chain of records that is nearly impossible to alter. The exponential growth of blockchain technology is fueled by the need to simplify business processes, increase transparency, improve traceability, and cut costs. According to ReportLinker, the global blockchain market is expected to increase by 80% between 2018 and 2023, from $1.2 billion to $23.3 billion.

Key Components of Blockchain That Ensure Data Security

Blockchain technology enhances data security by ensuring that data recorded once remains unalterable and undeletable without network consensus, thus maintaining integrity. One of the key features of blockchain technology is decentralization. Unlike traditional centralized databases, blockchain operates on a distributed network. This structure reduces the risk of a single point of failure and makes it much more difficult for malicious entities to compromise the entire system. By distributing data across multiple nodes, blockchain eliminates vulnerabilities associated with centralized servers, thereby enhancing overall security. Another feature is the Cryptographic hash function which plays a crucial role in blockchain security. These mathematical algorithms generate a unique identifier for each block, making it virtually impossible to alter any recorded data without detection. All the altered information on the blockchain is visible and immutable, which not only ensures data integrity but also provides a reliable mechanism to detect and prevent fraudulent activities. Blockchain also employs consensus mechanisms such as Proof of Work (PoW) and Proof of Stake (PoS) to validate transactions and ensure network consistency. By allowing only authentic transactions to be added to the blockchain, these mechanisms prevent double payments and other fraudulent practices. Digital signatures, which use a private key to sign transactions, further enhance this level of security. This ensures that only authorized individuals can initiate or modify data entries, while anyone with the public key can verify the authenticity of the transaction.

Applications Across Sectors

The use of blockchain technology could have a significant impact on cybersecurity across various sectors. Many organizations are recognizing the significant business benefits of blockchain technology and are increasingly adopting it across various sectors. Blockchain has a lot to offer, from manufacturing and healthcare to supply chains and beyond. Financial services, for instance, can benefit from blockchain's ability to secure transactions, reduce fraud, and improve transparency. The healthcare sector can utilize blockchain to secure storage and share patient information between authorized personnel, ensuring confidentiality and accuracy. In the manufacturing industry, blockchain is primarily used for the movement and management of digital assets and physical goods, enhancing transparency and traceability. In order to ensure a transparent and immutable record of the origin of products, supply chain management can use blockchain technology to prevent counterfeiting and ensure authenticity. Government services can also use blockchain to increase the security and efficiency of public records, voting systems as well as identity management.

Key Challenges and Considerations

There are certain challenges to the use of blockchain technology, despite its many benefits. Scalability is an important concern, as the number of transactions increases, the blockchain may become slow and costly to maintain. Furthermore, significant computational power is required for consensus mechanisms such as POW which could result in considerable energy consumption. Regulatory uncertainty is another issue, as the evolving legal landscape can obscure the widespread adoption of blockchain technology. Addressing these challenges is crucial for the continued growth and adoption of blockchain technology. Global efforts are being made to create scalable blockchain systems and more effective consensus methods. Additionally, regulatory frameworks are also evolving to offer more precise guidelines to implement blockchain technology.

Growth of Blockchain Technology in India

India is seeing a strong increase in the adoption of blockchain technology in many sectors. This growth is driven by government-backed projects and initiatives, such as the National Blockchain Framework, to improve transparency, security, and efficiency. The technology's potential to enhance data integrity and operational efficiency aligns well with India's digital transformation goals, making blockchain a key component in the nation's technological advancement. The use of blockchain technology has been much more of a game-changer in terms of data security and is supporting cybersecurity. It provides robust security against all cyber threats since it is decentralized, immutable, and fully transparent. Overcoming the challenges of scaling and regulatory uncertainty would enable blockchain's distributed ledger technology to emerge as the key player in secure digital infrastructures that drive innovation across all sectors. The more organizations study its potential applications, the more blockchain will change the face of data security and cybersecurity. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

Accessible and ‘a pleasure to read’: how Apple’s podcast transcriptions came to be

Apple rolled out a feature highly requested by both disabled users and podcast creators. Why did it take so long?

Ren Shelburne was fed up with trying to listen to popular podcast episodes her friends recommended. Shelburne, a photographer with partial hearing loss and an auditory processing condition, remembers struggling to finish a particular episode. It was a specific type of show: too many talking heads, complicated overlapping dialogue and, until recently, no transcription. “Those I’m just so lost on because there’s just too much going on at once,” Shelburne says. She couldn’t follow along, so she couldn’t discuss the show with her friends. “Podcasts are such a big part of pop culture and media at this point. I want to be able to be a part of that conversation.”

Weekly podcast listenership in the United States has more than quadrupled in the past decade, according to Pew Research. For some, though, the medium still feels inaccessible.

Continue reading...

💾

© Photograph: Apple, Guardian Design

💾

© Photograph: Apple, Guardian Design

Russian ties and cheap tech: G7 leaders unequivocal in criticism of China

Concerns set out over supply of materials with military applications, and impact of subsidies on global market

China’s role in providing assistance to Russia in its war against Ukraine, and its “harmful overcapacity” in the production of cheap goods, have been targeted by G7 leaders despite misgivings from Germany.

On the second day of the annual summit, being held in Puglia under the Italian chair, the US drove home a 36-page communique that condemned Chinese subsidies for products such as solar panels and electric cars which it said were leading to “global spillovers, market distortions and harmful overcapacity … undermining our workers, industries, and economic resilience and security”.

Continue reading...

💾

© Photograph: Ukrainian presidential press office/UPI/Rex/Shutterstock

💾

© Photograph: Ukrainian presidential press office/UPI/Rex/Shutterstock

‘I felt I was talking to him’: are AI personas of the dead a blessing or a curse?

As growing numbers of people turn to grieftech, some are disturbed by its possible consequences

When Christi Angel first talked to a chatbot impersonating her deceased partner, Cameroun, she found the encounter surreal and “very weird”.

“Yes, I knew it was an AI system but, once I started chatting, my feeling was I was talking to Cameroun. That’s how real it felt to me,” she says.

Continue reading...

💾

© Photograph: PR

💾

© Photograph: PR

Jaguar Land Rover to spend £1m to help police stop car thefts

Funding for policing comes amid soaring insurance costs after Range Rovers hit by wave of crime

Jaguar Land Rover is planning to invest more than £1m to support UK police to fight car thefts and fund intelligence gathering.

The luxury carmaker said the money would be used to target theft hotspots and provide police forces “with additional dedicated resources to respond to vehicle thefts across the country”.

Continue reading...

💾

© Photograph: Parmorama/Alamy

💾

© Photograph: Parmorama/Alamy

Elon Musk’s $45bn Tesla pay package not a done deal, say legal experts

Although shareholders have backed chief executive’s remuneration deal, doubts remain over whether he will be able to access share-based package

Tesla’s battle to reinstate Elon Musk’s $45bn (£35bn) pay package is far from over, according to legal experts, despite shareholders backing the chief executive’s remuneration deal.

Investors in the electric carmaker re-ratified the pay deal on Thursday after it had been struck down by a judge in the US state of Delaware. The company’s chair, Robin Deynholm has already pledged to “put it back in front of the court”.

Continue reading...

💾

© Photograph: Mario Anzuoni/Reuters

💾

© Photograph: Mario Anzuoni/Reuters

US bank Wells Fargo fires employees for ‘simulating’ being at their keyboards

Workers were sacked after review found they were ‘creating impression of active work’, says filing

The US bank Wells Fargo has fired more than a dozen workers for alleged “simulation of keyboard activity”, in an apparent attempt to fool their employer into thinking they were working.

The employees were “discharged after review of allegations involving simulation of keyboard activity creating impression of active work”, according to a filing with the Financial Industry Regulatory Authority.

Continue reading...

💾

© Photograph: De Visu/Alamy

💾

© Photograph: De Visu/Alamy

Cop busted for unauthorized use of Clearview AI facial recognition resigns

Cop busted for unauthorized use of Clearview AI facial recognition resigns

Enlarge (credit: Francesco Carta fotografo | Moment)

An Indiana cop has resigned after it was revealed that he frequently used Clearview AI facial recognition technology to track down social media users not linked to any crimes.

According to a press release from the Evansville Police Department, this was a clear "misuse" of Clearview AI's controversial face scan tech, which some US cities have banned over concerns that it gives law enforcement unlimited power to track people in their daily lives.

To help identify suspects, police can scan what Clearview AI describes on its website as "the world's largest facial recognition network." The database pools more than 40 billion images collected from news media, mugshot websites, public social media, and other open sources.

Read 16 remaining paragraphs | Comments

Tesla shareholders approve CEO Elon Musk’s $45bn pay package

Billionaire tells shareholders ‘hot damn, I love you guys’ after retaining largest-ever executive pay package at US-listed firm

Tesla shareholders have approved a $45bn (£35.3bn) pay deal for CEO Elon Musk, following a fiercely contested referendum on his leadership.

The result, announced on Thursday, comes as the billionaire tycoon fights to retain the largest-ever compensation package granted to an executive at a US-listed company.

Continue reading...

💾

© Photograph: Gonzalo Fuentes/Reuters

💾

© Photograph: Gonzalo Fuentes/Reuters

AI-Powered Transformation: Optimizing B2B SaaS for Efficiency and Growth (Without Sacrificing Your Team)

The fear of AI replacing human jobs in B2B SaaS is a myth. AI excels at automating repetitive tasks, allowing your team to focus on strategic initiatives.

The post AI-Powered Transformation: Optimizing B2B SaaS for Efficiency and Growth (Without Sacrificing Your Team) appeared first on Security Boulevard.

Photographer takes on the machines in AI competition – and wins

Miles Astray subverts trend of artificial pictures muscling in on human photography, but is disqualified

Ever since the advent of generative AI, the age-old battle of man v machine has been looking decidedly one-sided. But one photographer, intent on making the case for pictures captured with the human eye, has taken the fight to his algorithm-powered rivals – and won.

Miles Astray subverted the idea of artificially generated pictures muscling in on human photography awards by submitting his own human-made image, Flamingone, to the AI category in a prestigious competition.

Continue reading...

💾

© Photograph: Miles Astray

💾

© Photograph: Miles Astray

Carlos Slim: who is the Mexican billionaire who has invested £400m in BT?

The 84-year-old telecoms tycoon has been described as the Latin American prototype of a Russian oligarch

Carlos Slim, the Mexican billionaire who this week paid £400m for a 3% stake in BT, has traversed some of life’s highest peaks and lowest ebbs.

He claims that in 1997, aged 57, he was briefly declared dead after suffering a massive haemorrhage on the operating table at the Texas Heart Institute during surgery to replace a faulty heart valve.

Continue reading...

💾

© Photograph: Susana Vera/Reuters

💾

© Photograph: Susana Vera/Reuters

I banned my daughter from using the iPhone she bought. It made her a better person

I set expectations when she saved up and got the phone – little did I know it would undermine them, and her mental health

The byline on this essay is a pseudonym.

My daughter is one of those kids the US surgeon general warned us about. Our nation’s children are “unknowing participants” in a “decades-long experiment”. Social media usage poses mental health risks to youth, who use it “almost constantly”, causing sleep deprivation, depression and anxiety.

Continue reading...

💾

© Illustration: Ulises Mendicutty/The Guardian

💾

© Illustration: Ulises Mendicutty/The Guardian

ChatGPT is coming to your iPhone. These are the four reasons why it’s happening far too early | Chris Stokel-Walker

The AI’s errors can still be comical and catastrophic. Do we really want this technology to be in so many pockets?

Tech watchers and nerds like me get excited by tools such as ChatGPT. They look set to improve our lives in many ways – and hopefully augment our jobs rather than replace them.

But in general, the public hasn’t been so enamoured of the AI “revolution”. Make no mistake: artificial intelligence will have a transformative effect on how we live and work – it is already being used to draft legal letters and analyse lung-cancer scans. ChatGPT was also the fastest-growing app in history after it was released. That said, four in 10 Britons haven’t heard of ChatGPT, according to a recent survey by the University of Oxford, and only 9% use it weekly or more frequently.

Chris Stokel-Walker is the author of How AI Ate the World, which was published last month

Continue reading...

💾

© Photograph: Angga Budhiyanto/ZUMA Press Wire/REX/Shutterstock

💾

© Photograph: Angga Budhiyanto/ZUMA Press Wire/REX/Shutterstock

Elon Musk says Tesla shareholders voting to back $45bn pay deal

Electric carmaker’s CEO faces crunch vote before its AGM over biggest pay package in US corporate history

Elon Musk has claimed Tesla shareholders are voting by a wide margin to approve a compensation package for him worth about $45bn (£35bn) in the run-up to the electric carmaker’s crunch annual general meeting later on Thursday.

The pay package, which is the highest ever awarded to the chief executive of a US company, is subject to an investor ballot after it was thrown out by a US judge earlier this year. Shareholders will also vote on Musk’s proposal to move the legal base of the electric carmaker to Texas.

Continue reading...

💾

© Photograph: Gonzalo Fuentes/Reuters

💾

© Photograph: Gonzalo Fuentes/Reuters

I have always laughed at those who read the instructions. But the joke is on me | Adrian Chiles

How much time could I have saved, and what handy things could I have done, if I had actually read the manuals for all my gadgets?

A long time ago, I went to a friend’s wedding at which the best man made an amusing observation about the groom. He said he was the kind of man who, upon buying a computer or food processor or some such apparatus, would sit down and read the manual cover to cover before he’d got the machine out of the box. How I laughed, because I’m totally the opposite. But the joke’s on me.

Until recently, I drove an estate car with a really useful feature. Instead of opening the tailgate fully, you could just flip open the back window for easy access. Nice. Hardly life-changing, but nice. The unfortunate thing was that, having driven the car for three years, it was only on the day I took it back to the dealership where the dealer checked the car over that I learned about the feature. Ooh, I said, as she popped it open, I never knew it could do that.

Continue reading...

💾

© Photograph: Peter Cade/Getty Images

💾

© Photograph: Peter Cade/Getty Images

Apple says long-awaited AI will set new privacy standards – but experts are divided

Apple maintains its in-house AI is made with security in mind, but some professionals say ‘it remains to be seen’

At its annual developers conference on Monday, Apple announced its long-awaited artificial intelligence system, Apple Intelligence, which will customize user experiences, automate tasks and – the CEO Tim Cook promised – will usher in a “new standard for privacy in AI”.

While Apple maintains its in-house AI is made with security in mind, its partnership with OpenAI has sparked plenty of criticism. OpenAI tool ChatGPT has long been the subject of privacy concerns. Launched in November 2022, it collected user data without explicit consent to train its models, and only began to allow users to opt out of such data collection in April 2023.

Continue reading...

💾

© Photograph: Justin Sullivan/Getty Images

💾

© Photograph: Justin Sullivan/Getty Images

Should Tesla pay Elon Musk $45bn? The shareholders will decide

CEO claims he is winning investor votes by ‘wide margins’ but it is unclear if court will allow restoration of payout

Tesla shareholders will decide late Thursday whether to award CEO Elon Musk a pay package worth about $45bn in what has become a referendum on the tech mogul’s leadership and a source of fierce legal contention at his electric car company.

Musk claimed on Wednesday night in a post on X, formerly Twitter, that shareholder votes on his record-breaking payout and a plan to move the electric carmaker’s legal headquarters to Texas were “currently passing by wide margins”.

Continue reading...

💾

© Photograph: David Swanson/Reuters

💾

© Photograph: David Swanson/Reuters

Elon Musk sued by SpaceX engineers claiming they were illegally fired

Musk ordered firings after engineers raised concerns about alleged sexual harassment and discrimination, lawsuit says

SpaceX and its chief executive, Elon Musk, were sued on Wednesday by eight engineers who say they were illegally fired for raising concerns about alleged sexual harassment and discrimination against women, their lawyers have said.

The eight engineers include four women and four men and claim that Musk, who owns the rocket-maker, the electric carmaker Tesla and the social media platform Twitter/X, ordered their firing in 2022.

Continue reading...

💾

© Photograph: Jordan Strauss/Invision/AP

💾

© Photograph: Jordan Strauss/Invision/AP

‘We need to go places and touch things’: the people turning away from smartphones

Disquiet over social media addiction is leading to a growing enthusiasm for Polaroids, postcards and the physical and analogue world

For Bea, it was moments like finding herself scrolling though the news on the toilet that made her feel the need to reassess her relationship with her phone.

The 37-year-old from London had began to feel uncomfortable with the way pinging notifications and the urge to pick up her phone were encroaching on her life. So when her iPhone broke, over a year ago, she decided it was time to switch to a device that allowed her to stay in touch with others while minimising distractions.

Continue reading...

💾

© Photograph: Neil Setchfield/Alamy

💾

© Photograph: Neil Setchfield/Alamy

Child predators are using AI to create sexual images of their favorite ‘stars’: ‘My body will never be mine again’

Safety groups say they’re increasingly finding chats about creating images based on past child sexual abuse material

Predators active on the dark web are increasingly using artificial intelligence to create sexually explicit images of children, fixating especially on “star” victims, child safety experts warn.

Child safety groups tracking the activity of predators chatting in dark web forums say they are increasingly finding conversations about creating new images based on older child sexual abuse material (CSAM). Many of these predators using AI obsess over child victims referred to as “stars” in predator communities for the popularity of their images.

Continue reading...

💾

© Composite: The Guardian/Getty Images

💾

© Composite: The Guardian/Getty Images

Is my Samsung laptop not all it’s cracked up to be?

My Galaxy Book 360 from Currys developed screen cracks while it was just sitting on a table

In February I bought a Samsung Galaxy Book 360 convertible laptop from Currys and paid £1,279.

After a couple of months, while sitting on a table overnight, it developed two hairline cracks across the screen. This device has never been dropped or damaged by me.

Continue reading...

💾

© Photograph: Samsung

💾

© Photograph: Samsung

Is the Tesla board in charge of a public company or the Elon Musk fan club? | Nils Pratley

If Musk is awarded an astronomic $56bn pay award for a second time, it will amount to an astonishing lack of self-reflection

One reasonable view of the great Elon Musk pay affair says Tesla shareholders should stick to their guns and approve the astronomic $56bn award for a second time, thereby sending a message to the interfering Delaware judge who cancelled the 2018 scheme that they’re quite capable of making up their own minds, thanks very much.

That, roughly speaking, is the stance of Baillie Gifford, a big investor in the electric vehicle company since the early days. “We agreed the remuneration package with Tesla back in 2018 because it introduced extremely stretching targets that would make a huge amount of money for shareholders if they were reached,” Tom Slater, manager of the FTSE 100 Scottish Mortgage Investment Trust, told the Financial Times last month. “Having agreed to that, we believe that it should be paid out.” Fair enough, the line has the virtue of consistency: we understood what we were voting for, and a deal’s a deal.

Continue reading...

💾

© Photograph: Tingshu Wang/Reuters

💾

© Photograph: Tingshu Wang/Reuters

‘We’re writing history’: Spanish women tackle Wikipedia’s gender gap

Wikiesfera is one of a handful of groups around world trying to ‘make women visible’ on user-edited site

Packed into the back room of a feminist bookshop in Madrid, 17 women hunched over their laptops, chatting and laughing as they passed around snacks. Every now and then a hearty burst of applause punctuated the sound of typing, each time marking a milestone as the group steadily chipped away at what is perhaps one of the world’s most pervasive gender gaps.

Just under a fifth of Wikipedia’s content, including biographies, is focused on women, while women account for just about 15% of the site’s volunteer editors. “The numbers are pretty terrifying,” said Patricia Horrillo, who for much of the past decade has spent her spare time working to tackle this gap, cultivating a community of Wikipedia editors dedicated to publishing content focused on women.

Continue reading...

💾

© Photograph: The Guardian

💾

© Photograph: The Guardian

Elon Musk abruptly withdraws lawsuit against Sam Altman and OpenAI

Tesla CEO had accused company of abandoning mission of creating artificial intelligence for greater good of humanity

Elon Musk has moved to dismiss his lawsuit accusing ChatGPT maker OpenAI and its CEO Sam Altman of abandoning the startup’s original mission of developing artificial intelligence for the benefit of humanity.

Musk launched the suit against Altman in February, and the case had been slowly working its way through the California court system. There was no indication until Tuesday that Musk planned to drop the suit; only a month ago, his lawyers filed a challenge that forced the judge hearing the case to remove himself.

Continue reading...

💾

© Photograph: David Swanson/Reuters

💾

© Photograph: David Swanson/Reuters

Apple push into AI could spark smartphone upgrade ‘supercycle’

Only most powerful iPhones will meet processing requirements to run new Siri and Apple Intelligence features

Apple’s big push into AI – which the company insists stands for “Apple Intelligence” – could spark an upgrade “supercycle”, with the intense processing requirements for the souped-up Siri limiting it to only the most powerful iPhones currently on the market.

The company risks angering users who will update to iOS 18 this autumn to discover that even a brand-new iPhone 15 is unable to run features such as automatic transcription, image generation and a smarter, more conversational voice assistant.

Continue reading...

💾

© Photograph: Jonathan Raa/NurPhoto/REX/Shutterstock

💾

© Photograph: Jonathan Raa/NurPhoto/REX/Shutterstock

‘We anchored ourselves in wild adventure!’ Tilda Swinton on her trippy film about learning, AI and neuroscience

What can a pipe-smoking caterpillar, a few algorithms and a researcher from the year 2042 tell us about the future of learning? The actor turned director explains all the ideas that fed into her thought-provoking new documentary

‘This is a film about learning, full of questions, with not many answers,” announces Tilda Swinton at the start of her new documentary, The Hexagonal Hive and a Mouse in a Maze. “It has been dreamt up by the Derek Jarman Lab between 2016 and 2042, in conversations with thinkers both living and not, a caterpillar and one or two algorithms.”

It’s a useful heads-up that the film, co-directed by Swinton with Bartek Dziadosz, is no conventional piece of storytelling or analysis. The words “dreamt up” are telling too, for The Hexagonal Hive – which premieres at Sheffield DocFest this week – has the floating, freewheeling atmosphere of a dream. It collects ideas about neuroscience, education and the world of work, and creates a sensory collage that includes footage from Scotland, Bangladesh and west Africa, with gnomic captions such as: “What a machine the world is – how to work its gears?” It also features the voices of academics and children, as well as clips from Night of the Hunter and My Neighbour Totoro.

Continue reading...

💾

© Photograph: Lillie Eiger/The Observer

💾

© Photograph: Lillie Eiger/The Observer

Mastercard To Phase Out Manual Card Entry For Online Payments In Europe By 2030

storkus shares a report: Starting from 2030, Mastercard will no longer require Europeans to enter their card numbers manually when checking out online -- no matter what platform or device they're using. Mastercard will announce Tuesday in a fireside chat with CNBC that, by 2030, all cards it issues on its network in Europe will be tokenized. In other words, instead of the 16-digit card number we're all accustomed to using for transactions, this will be replaced with a randomly generated "token." The firm says it's been working with banks, fintechs, merchants and other partners to phase out manual card entry for e-commerce by 2030 in Europe, in favor of a one-click button across all online platforms. This will ensure that consumers' cards are secure against fraud attempts, Mastercard says. Users won't have to keep entering passwords every time they try to make a payment, as Mastercard is introducing passkeys that replace passwords. storkus comments: "This story, as currently written, says nothing about their plans outside Europe but in the past the USA in particular has been dead last in getting this kind of tech."

Read more of this story at Slashdot.

‘It should be a right to fix your phone’: the boss of booming secondhand tech firm Back Market

Thibaud Hug de Larauze says sales at his marketplace for refurbished electronics are soaring not just because people need to save money, but because they also care about waste

Thibaud Hug de Larauze is waving his iPhone, boasting that it is more than seven years old. “It works great,” he says. Not what you’d expect from a tech entrepreneur heading one of France’s biggest “unicorn” startups – Back Market – which has raised more than $1bn to expand into 18 countries.

The chief executive of the secondhand gadget marketplace says he would rather identify as an eco-warrior than a tech guru, fighting to persuade us all to buy pre-owned phones, laptops and other devices, and repair or recycle our old ones.

Continue reading...

💾

© Photograph: Julie Glassberg

💾

© Photograph: Julie Glassberg

Why passwords still matter in the age of AI

As Apple’s new Passwords app tries to solve our identity crisis, why are we still proving who we are via strings of random characters?

Whether it stands for artificial intelligence or, er, Apple intelligence, AI is the hot news of the day. Which is why I think it’s time to talk about [sits backwards on chair] passwords.

It may have been buried in the reporting of last night’s Apple event – which the inestimable Kari Paul and Nick Robins-Early covered for us from Cupertino and New York – but one of the more consequential changes coming to the company’s platforms in the next year is the creation of a new Passwords app.

The average user probably has never heard of 1Password or LastPass, and they may or may not be aware that the iPhone can automatically create and store passwords for them. For users like that, a new Passwords app showing up on their iPhone’s Home screen this fall is going to hopefully lead them to a more secure computing future.

A mild improvement in your daily life. That’s what Apple, Google and Microsoft are offering, with a fairly rare triple announcement that the three tech giants are all adopting the Fido standard and ushering in a passwordless future. The standard replaces usernames and passwords with ‘passkeys’, log-in information stored directly on your device and only uploaded to the website when matched with biometric authentication like a selfie or fingerprint.

At around 11pm last night my partner went to change our lounge room lights with our home light control system. When she tried to login, her account couldn’t be accessed. Her Apple Keychain had deleted the Passkey she was using on that site … Just like adblockers, I predict that Passkeys will only be used by a small subset of the technical population, and consumers will generally reject them.

Zoom users in the not-too-distant future could send AI avatars to attend meetings in their absence, the company’s chief executive has suggested, delegating the drudge-work of corporate life to a system trained on their own content.

• Phasing out voice based authentication as a security measure for accessing bank accounts and other sensitive information
• Exploring policies to protect the use of individuals’ voices in AI
• Educating the public in understanding the capabilities and limitations of AI technologies, including the possibility of deceptive AI content

Continue reading...

💾

© Photograph: Franck Robichon/EPA

💾

© Photograph: Franck Robichon/EPA

Genetic testing company 23andMe investigated over hack that hit 7m users

Data watchdogs in UK and Canada to look at whether there were enough safeguards on personal information

The California genetic testing company 23andMe faces investigations by the data watchdogs of the UK and Canada over a security breach affecting nearly 7 million people last October.

Hackers who broke into the site gained access to personal information by using customers’ old passwords. In some cases the information accessed included family trees, birth years and geographic locations.

Continue reading...

💾

© Photograph: Kristoffer Tripplaar/Alamy

💾

© Photograph: Kristoffer Tripplaar/Alamy

Beats Solo 4 review: Apple headphones get Android-loving upgrade

Solid sound, 50 hours of battery life, spatial audio and cross-platform features elevate fourth-gen Beats

The Solo 4 headphones are a revamp of the fan favourite that helped make Beats a household name, upgraded with longer battery life, better sound and modern Apple and Android-loving features.

The original Solo HD launched in 2009 and was most recently updated as the Solo 3 in 2016 after Apple’s purchase of Beats. Now in their fourth generation, the Solo are the company’s smallest and lightest headphones, costing £200 (€230/$200/A$330), and sit below the £350 Studio Pro.

Weight: 217g

Dimensions: 177 x 158 x 68mm

Drivers: 40mm

Connectivity: Bluetooth 5.3, 3.5mm, USB-C audio and charging

Bluetooth codecs: SBC, AAC

Battery life: 50 hours

Continue reading...

💾

© Photograph: Samuel Gibbs/The Guardian

💾

© Photograph: Samuel Gibbs/The Guardian

Standup and TikToker Abi Clarke: ‘Why did I get into comedy? Attention!’

The social media star on performing to silent audiences, turning spite into success and still having to prove herself as a ‘proper’ comedian

Can you recall a gig so bad, it’s now funny?
I was once booked for an outdoor, family friendly village fete where none of the comedians had been warned that the jokes would have to be child-appropriate. In the early days of your comedy career, you only have five minutes of jokes so we didn’t have tamer ones we could swap in. The section of field directly in front of the stage had been roped off for the dog show later in the day (the main event), meaning anyone wanting to watch the comedy would have to watch from about 10 metres away with a whole load of nothing between us. Only five people stood behind the rope to watch, including an adult in a full Peppa Pig costume who heckled throughout. I performed five minutes to silence, before the next act got their microphone disconnected and the comedy cancelled after saying the C word.

What is your upcoming show, (Role) Model, about?
It’s about 55 minutes long … 57 with a good audience. I want it to feel like an incredibly fun conversation with your toxic best friend. But I guess it’s also a show about what it’s like to go viral overnight, or even worse, going viral for dancing with your parents. I’m trying to work out who I want to be versus what other people want me to be, and asking why are both impossible.

Abi Clarke: (Role) Model is at Pleasance Courtyard, Edinburgh, 29 July-25 August

Continue reading...

💾

© Photograph: Dylan Woodley

💾

© Photograph: Dylan Woodley

Apple brings ChatGPT to Siri as it debuts ‘Apple Intelligence’ at WWDC 2024

New features and deal with OpenAI presented at conference marks change in focus for tech giant, which is under pressure to catch up with rival firms’ AI push

Tim Cook, the Apple CEO, announced a series of generative artificial intelligence products and services on Monday during his keynote speech at the company’s annual developer conference, WWDC, including “Apple Intelligence” and a deal with ChatGPT-maker OpenAI.

The new tools mark a major shift toward AI for Apple, which has seen slowing global sales over the past year and integrated fewer AI features into its consumer-facing products than competitors.

Continue reading...

💾

© Photograph: John G Mabanglo/EPA

💾

© Photograph: John G Mabanglo/EPA

Brighton general election candidate aims to be UK’s first ‘AI MP’

Steve Endacott claims his artificial intelligence-produced avatar would answer constituents’ questions and concerns

Politics is too serious a matter to be left to the politicians, so the saying goes.

This may be why a businessman in the south of England is proposing a novel solution: putting himself forward as a candidate in the UK general election as the first “AI MP”.

Continue reading...

💾

© Photograph: AI Steve

💾

© Photograph: AI Steve

BT left my blind father without a panic button

It didn’t work after it switched his landline to digital without warning

My 101-year-old father was left without a landline and a functioning panic button after BT switched his phone service from analogue to digital without warning us. BT had informed us that the contract was about to finish, and asked me to contact them about renewing. I duly called and was, at no time, advised to contact the panic button provider, or told of the possible need for adaptors to connect analogue phones to the new service. After four hours on the phone to BT when the service failed, I was informed that digital adaptors were required to ensure our phones worked. Four days later, these had still not arrived and BT said it was unable to expedite the delivery. My father, who is registered blind and has only 30% hearing, was without his panic button for five days until the care line team attended and got it working.
TB, Birmingham

Your father’s predicament shows the human cost of the transfer of analogue telephone lines to an internet-based service. Since September, customers who start, or renew, contracts have been switched to Digital Voice, which requires a broadband router. However, the new technology poses a threat to vulnerable users since digital landlines do not function during power cuts and some fall buttons are incompatible.

Continue reading...

💾

© Photograph: Prostock-studio/Alamy

💾

© Photograph: Prostock-studio/Alamy

Wooden bowling arm that bested Australian cricketer in 1909 rebuilt

Cambridge engineers re-create mathematician Dr John Venn’s machine, which launched balls at 33mph

A wooden contraption that bowled out an Australian international cricketer four times in 1909 has been re-created by engineers at the University of Cambridge.

The bowling machine was designed by Dr John Venn, the mathematician who gave his name to Venn diagrams, in the early 1900s.

Continue reading...

💾

© Photograph: Cambridge University/PA

💾

© Photograph: Cambridge University/PA

Ticketmaster Data Breach and Rising Work from Home Scams

In episode 333 of the Shared Security Podcast, Tom and Scott discuss a recent massive data breach at Ticketmaster involving the data of 560 million customers, the blame game between Ticketmaster and third-party provider Snowflake, and the implications for both companies. Additionally, they discuss Live Nation’s ongoing monopoly investigation. In the ‘Aware Much’ segment, the […]

The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Shared Security Podcast.

The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Security Boulevard.

💾

Securing Operational Technology: The Foundation of Modern Industrial Operations in META Region

Securing Operational Technology, OT, IT, META Region, The Cyber Express, The Cyber Express News,

In the field of business operations in the META region, operational technology (OT) acts as a backbone, facilitating system maintenance, control, and optimization. From factories to energy projects, OT systems play an important role in increasing efficiency, ensuring safety, and maintaining reliability. However, with the increasing interconnectivity between OT and the Internet of Things (IoT), as well as the growing threat landscape, securing operational technology environments has never been more crucial.

Understanding Operational Technology

OT encompasses the hardware and software utilized to monitor and control physical devices and processes within industrial operations, including sectors such as manufacturing, energy, transportation, and utilities. It comprises of two main categories: Internet of Things (IoT) devices, which introduce networking capabilities to traditional OT systems, and Industrial Control Systems (ICS) - specialized systems dedicated to monitoring and controlling industrial processes.
Key functions of OT include:
  • Driving innovation, improving productivity, ensuring safety, reliability, and maintaining critical infrastructure.
  • Enhancing efficiency by automating and optimizing processes, minimizing downtime, reducing waste, and maximizing output.
  • Ensuring safety by monitoring environmental conditions, detecting abnormalities, and triggering automated responses to prevent accidents.
  • Providing reliable performance in harsh environments to prevent financial losses and risks to public safety.
  • Maintaining product quality and consistency by monitoring and adjusting production processes.
  • Enabling data-driven decision-making by generating insights into operations.
  • Managing critical infrastructure such as energy grids, water treatment plants, and transportation networks.

Differentiating OT from IT

While Operational Technology shares similarities with Information Technology (IT), it differs in several key aspects. IT focuses on managing digital information within organizations and OT controls highly technical specialist systems crucial for ensuring the smooth operation of critical processes. These systems include Supervisory Control and Data Acquisition (SCADA) systems, Programmable Logic Controllers (PLCs), sensors, and actuators, among others. OT is not just limited to manufacturing but can also be found in warehouses and in daily outdoor areas such as parking lots and highways. Some examples of OT include ATMs and other kiosks, connected buses, trains, and service fleets, weather stations, and even electric vehicles charging systems. The key difference between IT and OT is that IT is centered on an organization's front-end informational activities, while OT is focused on their back-end production. The merging of OT with IT, known as IT/OT convergence, aims at enhancing efficiency, safety, and security in industrial operations, yet also introduces challenges regarding cybersecurity as OT systems become more interconnected with IT networks.

IoT and OT Cybersecurity Forecast for META in 2024

Cybersecurity stands as a paramount concern for executives across various OT sectors in the META region. As the region witnesses a surge in cyber threats, organizations are increasingly investing in cybersecurity services and solutions to safeguard critical infrastructure and sensitive data. Modernization and optimization top the cyber-investment priorities for 2024, according to Pwc Digital Trust Insights 2024-Middle East Findings Report. More than half (53%) of chose optimization of existing technologies and investments in order to identify those with the highest potential to create value, while 43% selected technology modernization, including cyber infrastructure. The year 2024 is poised to bring new challenges and advancements in IoT and OT security, which could possibly shape the cybersecurity landscape in the META region.
Geopolitical Threats and APT Activity
With geopolitical tensions shaping the cybersecurity landscape, the META region is anticipated to witness heightened levels of Advanced Persistent Threat (APT) activity. Critical infrastructure, including shipping, power, and communications, will remain prime targets for cyber adversaries seeking to disrupt operations and undermine stability.
Escalating Costs of Cyber Attacks
The cost of cyberattacks is expected to escalate further in 2024, driven by an increase in ransom demands. Recent years have seen a significant rise in ransomware attacks globally, with cybercriminals targeting sectors such as healthcare and manufacturing. As ransom demands soar, organizations in the META region must bolster their cybersecurity defenses to mitigate financial and operational risks.
Heightened Threats to IoT and OT Deployments
Cyber threats targeting IoT and OT deployments are poised to intensify, posing significant risks to critical infrastructure and industrial systems. Health and safety departments, Industrial Control Systems (ICS), and IoT networks will remain prime targets for cyber adversaries, necessitating proactive cybersecurity measures to mitigate potential threats.
Focus on Network and Device Vulnerabilities
Cybercriminals will continue to exploit network and device vulnerabilities, highlighting the importance of robust patching and vulnerability scanning practices. Government infrastructures, finance, and retail sectors are particularly vulnerable to phishing attacks, underscoring the need for enhanced cybersecurity measures and employee awareness training.
Lookout for AI
With AI coming to the fore and large language models helping cybercriminals from drafting phishing mails to making AI-based robo-calling the surge of AI needs to be kept an eye on and better regulations will be the need of the hour. On the defense front, many vendors are also pushing the limits of GenAI, testing what’s possible. It could be some time before we see broad-scale use of defenceGPTs.  In the meantime, here are the three most promising areas for using GenAI in cyber defence: Threat detection and analysis; cyber risk and incident reporting; and adaptive controls that are tailored for organizations threat profile, technologies and business objectives.
Emphasis on Supply Chain Security
In 2024, supply chain vetting and internal security methods will become mainstream, as organizations strive to fortify their defenses against supply chain attacks. With compliance orders shifting from voluntary to mandatory, enterprises will be required to align with cybersecurity standards such as IEC 62443 to mitigate supply chain risks effectively.
Rise of Cyber Threat Intelligence
The year 2024 is poised to witness a surge in cyber threat intelligence investments, as organizations seek to enhance their threat detection and response capabilities. With C-level management increasingly involved in cybersecurity decision-making, enterprises will prioritize cyber threat intelligence feeds to bolster their security posture and safeguard critical infrastructure.
Expansion of Attack Surfaces
As digital transformation accelerates across sectors, the OT attack surface is expected to expand, providing cyber adversaries with new opportunities to exploit vulnerabilities. Industries such as manufacturing and healthcare must exercise caution and diligence in navigating the complexities of digital transformation to mitigate emerging cyber threats effectively.

Structuring a Secure OT Network

Despite its critical importance, OT faces significant vulnerabilities, particularly concerning cybersecurity. As OT systems become increasingly interconnected with IT networks and the IoT, they become more exposed to cyber threats. Moreover, the inability to shut down OT systems for maintenance or upgrades poses challenges in implementing security measures effectively. With the steady adoption of IoT and personal connected devices, an increase of over 4-fold in IoT malware attacks year-over-year has been reported in the Middle East region alone. This highlights persistence and ability of the cybercriminals to adapt to evolving conditions in launching IoT malware attacks. They are targeting legacy vulnerabilities, with 34 of the 39 most popular IoT exploits specifically directed at vulnerabilities that have existed for over three years. The biggest receiver of these attacks has been manufacturing, followed by oil & gas, power grids and maritime.

Securing Operational Technology with a 4-Phase Approach

To address these challenges, organizations must adopt a proactive approach to building secure OT environments. This involves implementing comprehensive security measures and adhering to industry best practices. A four-phase approach can guide organizations in building a secure OT network:
  1. Assess: Conduct an assessment to evaluate the current OT environment against industry standards and identify risks and vulnerabilities.
  2. Design: Develop a comprehensive design considering elements such as network segmentation, vendor security, and defense-in-depth strategies.
  3. Implement: Implement changes into the OT network while ensuring interoperability and compatibility with existing systems.
  4. Monitor and Respond: Establish mechanisms for detection and response to security incidents, enabling a dedicated security team to contain and eradicate threats effectively.
In addition to the four-phase approach, organizations can implement other security best practices, including access control, patch management, incident response planning, physical security measures, employee training, and vendor security assessments. By adopting a holistic approach to OT security and implementing robust security measures, organizations can mitigate cyber threats, protect critical infrastructure, and maintain the integrity and reliability of their operational systems. In an era of evolving cyber threats, securing Operational Technology is paramount to safeguarding industrial operations and ensuring the resilience of modern societies.

Blockchain Tech Firms Breached? DFINITY & Cryptonary User Data Allegedly Leaked

Data Breaches at DFINITY and Cryptonary

A threat actor (TA) has posted databases belonging to two prominent companies utilizing blockchain technology, The DFINITY Foundation and Cryptonary, on the Russian-language forum Exploit. The databases, if genuine, contain sensitive information of hundreds of thousands of users, allegedly exposing them to significant security risks. The threat actor's post on Exploit detailed the alleged data breaches at DFINITY and Cryptonary.

Details of Alleged Data Breaches at DFINITY and Cryptonary

For The DFINITY Foundation, the threat actor claimed to have over 246,000 user records with information fields including:
  • Email Address
  • First Name
  • Last Name
  • Birthday
  • Member Rating
  • Opt-in Time and IP
  • Confirm Time and IP
  • Latitude and Longitude
  • Timezone, GMT offset, DST offset
  • Country Code, Region
  • Last Changed Date
  • Leid, EUID
  • Notes
For Cryptonary, the post advertised 103,000 user records containing:
  • Email
  • First Name
  • Last Name
  • Organization
  • Title
  • Phone Number
  • Address
  • City, State/Region, Country, Zip Code
  • Historic Number of Orders
  • Average Order Value
  • User Topics
The prices quoted for these datasets were $9,500 for DFINITY's data and $3,500 for Cryptonary's data. Data Breaches at DFINITY and Cryptonary Blockchain Technology The DFINITY Foundation is a Swiss-based not-for-profit organization known for its innovative approach to blockchain technology. It operates a web-speed, internet-scale public platform that enables smart contracts to serve interactive web content directly into browsers. This platform supports the development of decentralized applications (dapps), decentralized finance (DeFi) projects, open internet services, and enterprise systems capable of operating at hyper-scale. On the other hand, Cryptonary is a leading platform in the crypto tools and research space. It provides essential insights and analysis to help users navigate the complexities of the cryptocurrency market and capitalize on emerging opportunities. When The Cyber Express Team accessed the official website of The DFINITY Foundation, they found a message warning visitors about phishing scams on third-party job boards. The message read: “Recently, we've seen a marked increase in phishing scams on third-party job boards — where an individual impersonating a DFINITY team member persuades job-seekers to send confidential information and/or payment. As good practice, please continue to be vigilant regarding fraudulent messages or fake accounts impersonating DFINITY employees. If you need to confirm the legitimacy of a position, please reach out to recruiting@dfinity.org.” [caption id="attachment_75612" align="aligncenter" width="1024"]Data Breaches at DFINITY and Cryptonary Source: Offical Website of The DFINITY Foundation[/caption] While this message serves as a caution regarding phishing scams, it is unclear whether it hints at a broader security issue or is merely a general warning. The DFINITY website and the Cryptonary website both appeared fully functional with no evident signs of compromise. The Cyber Express Team reached out to the officials of both companies for verification of the breach claims. However, as of the time of writing, no official response had been received, leaving the authenticity of the threat actor's claims unverified. Now whether this message is a hint that they are being attacked by a criminal or it's just a caution message, we can come to the conclusion they release any official statement regarding the same.

Implication of Cyberattack on Blockchain Technology

However, if the claims of the data breaches are proven true, the implications could be far-reaching for both The DFINITY Foundation and Cryptonary. The exposure of sensitive user data could lead to: Identity Theft and Fraud: Users whose personal information has been compromised could become victims of identity theft and fraud, leading to financial and personal repercussions. Reputational Damage: Both companies could suffer significant reputational harm. Trust is a critical component in the blockchain and cryptocurrency sectors, and a data breach could erode user confidence in their platforms. Legal and Regulatory Consequences: Depending on the jurisdictions affected, both companies might face legal actions and regulatory fines for failing to protect user data adequately. Operational Disruptions: Addressing the breach and enhancing security measures could divert resources and attention from other business operations, impacting overall performance and growth. While the claims remain unverified, the potential consequences highlight the importance of vigilance and proactive security strategies. The Cyber Express Team will continue to monitor the situation and provide updates as more information becomes available. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
❌