Agregátor RSS

Vybrali jsme 14 špičkových televizorů. Ty nejlepší z nejlepších, které dnes můžete mít

Živě.cz - 13 Srpen, 2024 - 17:45
I když ceny televizorů klesají a ani velké úhlopříčky už nejsou drahé, stále má smysl připlatit si za prémiové televizory. Vybrali jsme ty nejlepší.
Kategorie: IT News

Feds bust minor league Radar/Dispossessor ransomware gang

The Register - Anti-Virus - 13 Srpen, 2024 - 17:23
The takedown may be small but any ransomware gang sent to the shops is good news in our book

The Dispossessor ransomware group is the latest to enter the cybercrime graveyard with the Feds proudly laying claim to the takedown.…

Kategorie: Viry a Červi

Max a 30 nejoblíbenějších filmů a seriálů v srpnu 2024. Tohle Češi na Max (dříve HBO) nejvíc sledují

Živě.cz - 13 Srpen, 2024 - 16:45
Tyto filmy a seriály jsou teď na českém Max (dříve HBO Max) nejoblíbenější. Nerozlišujeme žánr, stáří ani hodnocení na filmových webech. Jde o souhrnnou oblíbenost za poslední týdny, kterou zjišťuje a počítá web FlixPatrol.
Kategorie: IT News

GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

The Hacker News - 13 Srpen, 2024 - 16:02
A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head's XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices. The vulnerability has been codenamed GhostWrite. It has been described as a direct CPU bug embedded in the hardware, as
Kategorie: Hacking & Security

GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

The Hacker News - 13 Srpen, 2024 - 16:02
A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head's XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices. The vulnerability has been codenamed GhostWrite. It has been described as a direct CPU bug embedded in the hardware, as Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Na Marsu je možná mnohem víc vody, než jsme si mysleli. Mohla by naplnit oceán

Živě.cz - 13 Srpen, 2024 - 15:45
Mars si určitě představíte jako rudou poušť, skály, krátery a sucho. Vodu byste na povrchu hledali marně. Nyní však přichází překvapivé zjištění – pod povrchem rudé planety se možná skrývají obrovské zásoby vody v tekutém skupenství. Stejně jako se hledá ropa na Zemi Překvapivou zprávu zveřejnil ...
Kategorie: IT News

Sublime Text 4 Build 4180

AbcLinuxu [zprávičky] - 13 Srpen, 2024 - 15:36
Byl vydán Sublime Text 4 Build 4180. Sublime Text (Wikipedie) je proprietární multiplatformní editor textových souborů a zdrojových kódů. Ke stažení a k vyzkoušení je zdarma. Pro další používání je nutná licence v ceně 99 dolarů. Spolu se Sublime Merge je cena 168 dolarů.
Kategorie: GNU/Linux & BSD

Apple, this is the time to seize the moment

Computerworld.com [Hacking News] - 13 Srpen, 2024 - 15:17

Apple’s competitors are reeling on bad news, which makes this a perfect moment for Apple to exploit their weakness and seize market share. And it’s well prepared to do so.

Just in the last few weeks, several big events have taken place Cupertino could and should exploit.

Reasons to be cheerful

Here’s the landscape Apple faces at the moment:

  • The recent judgement against Google might eventually cost Apple as much as $20 billion in lost fees, but it will cost Android device makers money, too, since they also take cash to use Google as the default search engine. That means Android devices will inevitably become more expensive as manufacturers in that part of the highly competitive smartphone market struggle to make the numbers add up. 
  • Security and reliability matter. That’s why when we look at the recent Microsoft/Crowdstrike failure that cost the global economy billions and generated human stress and (in medical scenarios) might have caused real suffering, we should consider Apple’s far stronger track record on security. While the miscreants try to evade responsibility citing loopholes buried in their T&C, Apple continues its “tireless work to keep our users safe.” If it is true that many in tech remain invested in Windows, Delta’s ongoing litigation over the Crowdstrike failure will further expose the weakness of such dependency. 
  • Apple’s evolving approach to artificial intelligence (AI) in its devices and its determination to prize privacy above convenience further sets the company apart. This caution matches the public mood, which is to embrace AI in ways that augment, rather than replace, the human. While opinions on Apple Intelligence differ, its expected introduction will boost iPhone, iPad, and Mac sales.

These three factors amplify other ongoing trends, for example: feedback from employee choice schemes continues to overwhelmingly favor the Mac and iPhone; customer satisfaction levels for its products lead the industry; there’s growing recognition of the TCO advantages of its platforms; and Apple’s fast-growing enterprise market share acts as catalyst on its own — each deployment gives business users confidence to consider the platform

Action and reaction

That confidence is also turning into action. 

  • Recent PC market data from IDC, Canalys, and Gartner confirm Apple is growing at a rate that dramatically exceeds its rivals, even while smartphone sales in those all-important not-yet-saturated emerging markets also favor iPhone. 
  • In the background, you see hundreds of millions of dollars being invested in the wider Apple-in-the-enterprise ecosystem, which is growing swiftly.
  • You also see Apple’s rapid iteration with its own Apple Silicon processors, which realize significant computational performance improvements with each new version. No one else comes close today.

To paraphrase the gravel-tinged tones of Apple co-founder Steve Jobs’ favorite, Bob Dylan, you really don’t need to be a weatherman to see which way this wind is already blowing.

So, what’s Apple doing to seize the day? 

Will Apple now change the game?

Apple is doing quite a lot, as it happens. Here’s what to expect in the next few weeks:

  • First, it is upscaling its entire product range, pimping out all its devices with faster AI-ready M4 and A18 processors.  
  • Second, Apple is reaching higher by going lower, planning to put A18 chips inside next year’s iPhone SE upgrade, which reports claim will be priced into the mid-range smartphone market, at around $500
  • Third, Apple is expected to introduce new Macs this fall, all of which are said to hold M4 chips. These will include a much smaller Mac mini, which currently costs around $599. 
  • Fourth, it looks as if Apple Intelligence isn’t going to be introduced until Apple launches new Macs (if it launches them) in fall, further reinforcing the “whole platform” advantage it enjoys.

Put it all together and within a few short weeks Apple will be offering the world’s most secure end-to-end platform ecosystem for AI priced so you can jump in for just $500. It will do this even as the reputation of its main rivals stands tarnished for reasons that really, really matter to \ users. It does so at a point in Apple’s history when it is already receiving the same degree of regulatory oversight as it might expect if it actually led the markets it is in.

So, why not become the market leader and make that attention worthwhile? This is the time.

Please follow me on Mastodon, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

Kategorie: Hacking & Security

Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

The Hacker News - 13 Srpen, 2024 - 15:00
Cybersecurity researchers have discovered two security flaws in Microsoft's Azure Health Bot Service that, if exploited, could permit a malicious actor to achieve lateral movement within customer environments and access sensitive patient data. The critical issues, now patched by Microsoft, could have allowed access to cross-tenant resources within the service, Tenable said in a new report shared
Kategorie: Hacking & Security

Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

The Hacker News - 13 Srpen, 2024 - 15:00
Cybersecurity researchers have discovered two security flaws in Microsoft's Azure Health Bot Service that, if exploited, could permit a malicious actor to achieve lateral movement within customer environments and access sensitive patient data. The critical issues, now patched by Microsoft, could have allowed access to cross-tenant resources within the service, Tenable said in a new report sharedRavie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Nová destička Raspberry Pi Pico 2 pro kutily má mnohem rychlejší čip, více RAM a stojí směšných 149 korun

Živě.cz - 13 Srpen, 2024 - 14:45
Rodina prototypovacích desek od nadace Raspberry Pi má nového člena Pico 2. Jak už název napovídá, jedná se o druhou generaci nejmenšího mikrokontroleru pro kutily, kteří jej naprogramují v C a Pythonu. Prototypovací deska Raspberry Pi Pico 2 s novým procesorem RP2350 Řada Pico se ...
Kategorie: IT News

Tahle prťavá mechanická klávesnice pro hráče zlevnila na 587 Kč. Ještě na jaře byla čtyřikrát dražší

Živě.cz - 13 Srpen, 2024 - 13:45
Klávesnice CZC.Gaming Warlock zlevnila na 587 Kč, když v košíku zadáte slevový kód CZC30SALE. Prodávat se začala letos v březnu na 2499 Kč, cena pak ale v průběhu jara padala až na 999 Kč. Teď je ještě skoro o polovinu nižší. Potěší i tříletá záruka. Jde o model privátní značky CZC.cz s 60% ...
Kategorie: IT News

Tails 6.6

AbcLinuxu [zprávičky] - 13 Srpen, 2024 - 13:38
Byla vydána nová verze 6.6 živé linuxové distribuce Tails (The Amnesic Incognito Live System), jež klade důraz na ochranu soukromí uživatelů a anonymitu. Přehled změn v příslušném seznamu. Tor Browser byl povýšen na verzi 13.5.2. Thunderbird na verzi 115.14.0.
Kategorie: GNU/Linux & BSD

Orion SA says scammers conned company out of $60 million

The Register - Anti-Virus - 13 Srpen, 2024 - 13:27
Incident sounds like a BEC fraud targeting an unwitting staffer

Luxembourg-based chemicals and manufacturing giant Orion SA is telling US regulators that it will lose out on around $60 million after it was targeted by a criminal wire fraud scheme.…

Kategorie: Viry a Červi

A New Era of Threats: Double-Extortion Ransomware Targeting Linux Machines

LinuxSecurity.com - 13 Srpen, 2024 - 13:00
As cybersecurity evolves, so too has its threats. Symantec recently identified an emerging threat aimed at Linux systems. This new type of ransomware (called double extortion by its creators) encrypts files and exfiltrates and holds onto data, demanding ransom payments in return. Such sophisticated cybercriminal tactics highlight their audacity while attacking many enterprise and cloud environments - an audacious move by cybercriminals targeting such essential infrastructure as server farms.
Kategorie: Hacking & Security

Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

The Hacker News - 13 Srpen, 2024 - 12:56
Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized. With high-value assets, it’s not good enough to have the protection, it’s
Kategorie: Hacking & Security

Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

The Hacker News - 13 Srpen, 2024 - 12:56
Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized. With high-value assets, it’s not good enough to have the protection, it’s The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

X faces new challenges in Europe over AI training with personal data

Computerworld.com [Hacking News] - 13 Srpen, 2024 - 12:47

After the Irish Data Protection Commission (DPC), Austrian advocacy group NOYB has now filed a complaint against the social media platform X, accusing it of using personal data to train its AI systems without consent.

In a statement, NOYB said it has lodged GDPR complaints with data protection authorities in nine countries to ensure the fundamental legal concerns over X’s AI training are thoroughly addressed.

Last week, the DPC sought an order to halt or limit X’s use of user data for AI development, training, and refinement.

Following this, X agreed to temporarily suspend AI training using personal data from EU users until they had been given the opportunity to withdraw their consent.

However, NOYB considers this insufficient, saying that the DPC’s complaint primarily addresses mitigation measures and X’s lack of cooperation, without challenging the legality of the data processing itself.

“We have seen countless instances of inefficient and partial enforcement by the DPC in the past years,” Max Schrems, chairman of NOYB, said in the statement. “We want to ensure that Twitter [X] fully complies with EU law, which – at a bare minimum – requires to ask users for consent in this case.”

NOYB added that several key questions remain unanswered, including what happened to EU data already ingested into the systems and how X plans to properly separate EU and non-EU data.

Setting a precedent in GDPR enforcement

The complaint marks a significant precedent for applying GDPR in AI training, particularly in the creation and use of embeddings in AI models. Under the EU AI Act, these processes must adhere to transparency and ethical AI usage standards.

“This case highlights the tension between technological advancement and data privacy regulations,” said Sakshi Grover, senior research manager at IDC Asia Pacific. “The GDPR, alongside the EU AI Act, emphasizes user consent and transparency, leading to increased scrutiny of how personal data is used for AI training. Applications and platforms must adhere to strict data governance standards to protect user data and ensure privacy, involving measures compliant with GDPR and the EU AI Act’s data handling provisions.”

This is crucial because data serves as the lifeblood of modern organizations, driving competition, enhancing efficiency, generating business insights, and creating new revenue streams.

“In an age of continuous data generation, businesses need the ability to access, govern, and use data securely and effectively to advance their digital transformation efforts,” Grover added. “Establishing protocols for data privacy is essential to fuel this transformation securely.”

Impact on X’s operations  

For X, this could spell trouble as it needs to build a strong “social graph,” a model that tracks users’ interactions on a social media platform, according to Neil Shah, VP of research and partner at Counterpoint Research.

Using AI on user-generated content linked to demographic data is essential for the survival of social media platforms, especially those driven by advertising-led business models.

“While X can directly use data generated on the platform in the public domain, similar to others, there’s a fine line regarding how and to what extent user data is stored, used to train the AI model, and then utilized to target those users again,” Shah said. “This will require more transparency from X to ensure that the line isn’t crossed and that the proper GDPR process is followed. Until then, this case could set a precedent for most platforms leveraging user data to train their AI.”

The latest complaint could slow down the advanced analytics goal with Grok for X, especially for monetization in the form of a premium subscription or targeted advertising capabilities, Shah added.

Kategorie: Hacking & Security
Syndikovat obsah