Étiquette : vulnerability (Page 2 of 36)

Meta Sued Over Features That Hook Children to Instagram, Facebook

https://i0.wp.com/www.beaude.net/no-flux/wp-content/uploads/2023/10/24METAKIDS-vgph-superJumbo.jpg?resize=676%2C451&ssl=1

“It’s unusual for so many states to come together to sue a tech giant for consumer harms. The coordination shows states are prioritizing the issue of children and online safety and combining legal resources to fight Meta, just as states had previously done for cases against Big Tobacco and Big Pharma companies. “Just like Big Tobacco and vaping companies have done in years past, Meta chose to maximize its profits at the expense of public health, specifically harming the health of the youngest among us,” Phil Weiser, Colorado’s attorney general, said in a statement.
Lawmakers around the globe have been trying to rein in platforms like Instagram and TikTok on behalf of children. Over the past few years, Britain, followed by states like California and Utah, passed laws to require social media platforms to boost privacy and safety protections for minors online. The Utah law, among other things, would require social media apps to turn off notifications by default for minors overnight to reduce interruptions to children’s sleep.”

Source : Meta Sued Over Features That Hook Children to Instagram, Facebook – The New York Times

This Tool Could Protect Artists From A.I. Image Generators

A hand gesturing in front of a computer screen showing examples of paintings imitated by A.I.

“To the human eye, the Glazed image still looks like her work, but the computer-learning model would pick up on something very different. It’s similar to a tool the University of Chicago team previously created to protect photos from facial recognition systems.
When Ms. Ortiz posted her Glazed work online, an image generator trained on those images wouldn’t be able to mimic her work. A prompt with her name would instead lead to images in some hybridized style of her works and Pollock’s.
“We’re taking our consent back,” Ms. Ortiz said. A.I.-generating tools, many of which charge users a fee to generate images, “have data that doesn’t belong to them,” she said. “That data is my artwork, that’s my life. It feels like my identity.”
The team at the University of Chicago admitted that their tool does not guarantee protection and could lead to countermeasures by anyone committed to emulating a particular artist. “We’re pragmatists,” Professor Zhao said. “We recognize the likely long delay before law and regulations and policies catch up. This is to fill that void.””

Source : This Tool Could Protect Artists From A.I. Image Generators – The New York Times

Frontier risk and preparedness

Frontier Risk And Preparedness

“To support the safety of highly-capable AI systems, we are developing our approach to catastrophic risk preparedness, including building a Preparedness team and launching a challenge.
The team will help track, evaluate, forecast and protect against catastrophic risks spanning multiple categories including:

  • Individualized persuasion
  • Cybersecurity
  • Chemical, biological, radiological, and nuclear (CBRN) threats
  • Autonomous replication and adaptation (ARA)”

Source : Frontier risk and preparedness

38TB of data accidentally exposed by Microsoft AI researchers

“Microsoft’s AI research team, while publishing a bucket of open-source training data on GitHub, accidentally exposed 38 terabytes of additional private data — including a disk backup of two employees’ workstations. The backup includes secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages. The researchers shared their files using an Azure feature called SAS tokens, which allows you to share data from Azure Storage accounts.”

Source : 38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog

With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe?

https://i0.wp.com/www.beaude.net/no-flux/wp-content/uploads/2023/09/zeroday-800x534-1.jpg?w=676&ssl=1

“End users, admins, and researchers better brace yourselves: The number of apps being patched for zero-day vulnerabilities has skyrocketed this month and is likely to get worse in the following weeks. People have worked overtime in recent weeks to patch a raft of vulnerabilities actively exploited in the wild, with offerings from Apple, Microsoft, Google, Mozilla, Adobe, and Cisco all being affected since the beginning of the month. The number of zero-days tracked this month is considerably higher than the monthly average this year. September so far is at 10, compared with a total of 60 from January through August, according to security firm Mandiant. The company tracked 55 zero-days in 2022 and 81 in 2021. A sampling of the affected companies and products includes iOS and macOS, Windows, Chrome, Firefox, Acrobat and Reader, the Atlas VPN, and Cisco’s Adaptive Security Appliance Software and its Firepower Threat Defense. The number of apps is likely to grow because a single vulnerability that allows hackers to execute malicious code when users open a booby-trapped image included in a message or web page is present in possibly hundreds of apps.”

Source : With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica

Who Paid for a Mysterious Spy Tool? The FBI, an FBI Inquiry Found

https://i0.wp.com/www.beaude.net/no-flux/wp-content/uploads/2023/08/00dc-nso-01-fvzc-superJumbo.jpg?resize=676%2C451&ssl=1

“When The New York Times reported in April that a contractor had purchased and deployed a spying tool made by NSO, the contentious Israeli hacking firm, for use by the U.S. government, White House officials said they were unaware of the contract and put the F.B.I. in charge of figuring out who might have been using the technology. After an investigation, the F.B.I. uncovered at least part of the answer: It was the F.B.I.”

Source : Who Paid for a Mysterious Spy Tool? The FBI, an FBI Inquiry Found. – The New York Times

Des données ultrasensibles sur la sécurité de la Suisse sont en ligne sur le darknet

“La liste est donc sans fin, Xplain ayant des contrats avec d’innombrables services de sécurité en Suisse. Des questions fondamentales se posent: comment se fait-il que la société informatique ait gardé sur son infrastructure informatique autant de données opérationnelles de ses clients? Et pourquoi la Confédération n’a pas surveillé de près ce prestataire externe si important?”

Source : Des données ultrasensibles sur la sécurité de la Suisse sont en ligne sur le darknet – Le Temps

Everyone Says Social Media Is Bad for Teens. Proving It Is Another Thing

“They agreed on a few steps parents could take now: Set limits, especially around bedtime. Don’t give a young teenager a smartphone right away. Start with a smartwatch or a phone without internet. Talk to your teenagers: Have them show you what they’re seeing, ask them how it makes them feel and discuss privacy and safety. Make a family screen time plan that takes into account which activities increase stress versus provide long-term satisfaction. Model responsible internet use yourself. It’s not about monitoring certain apps, said Caleb T. Carr, a professor of communication at Illinois State: “Instead, parents should engage with their kids. Just like parents did pre-social media, talk about being good humans and citizens, talk about respect for others and themselves, and talk about how their day was.””

Source : Everyone Says Social Media Is Bad for Teens. Proving It Is Another Thing. – The New York Times

A Tale of Unwanted Disruption: My Week Without Amazon

“This incident has led me to question my relationship with Amazon. After nearly a decade of loyalty, I’ve been given a harsh reminder that a misunderstanding can lead to such drastic measures. It seems more reasonable to handle such issues in a more compartmentalized way, rather than a blanket shutdown of all services. Due to this experience, I am seriously considering discontinuing my use of Amazon Echo devices and will caution others about this incident. This ordeal has made a case for a more personalized home assistant system, perhaps utilizing Raspberry Pi devices scattered around the house.”

Source : A Tale of Unwanted Disruption: My Week Without Amazon | by Brandon Jackson | Jun, 2023 | Medium

Leaked EU Document Shows Spain Wants to Ban End-to-End Encryption

“Security experts have long said that any potential backdoors into encrypted communications or ways to decrypt services would undermine the overall security of the encryption. If law enforcement officials have a way to decipher messages, criminal hackers or those working on behalf of governments could exploit the same capabilities.”

Source : Leaked EU Document Shows Spain Wants to Ban End-to-End Encryption | WIRED

« Older posts Newer posts »

© 2024 no-Flux

Theme by Anders NorenUp ↑