"Researchers put AI normally used to search for helpful drugs into a kind of "bad actor" mode to show how easily it could be abused at a biological arms control conference.
All the researchers had to do was tweak their methodology to seek out, rather than weed out toxicity. The AI came up with tens of thousands of new substances, some of which are similar to VX, the most potent nerve agent ever developed. Shaken, they published their findings this month in the journal Nature Machine Intelligence."
"Hayleigh Bosher, associate dean of intellectual property law at Brunel University, who researches the music industry, said "the law needs to move with the times" as "making music is so different to how it was 50 years ago".
She added: If Sheeran loses, I imagine we will see even more cases. I don't think copyright is doing its job properly if songwriters are afraid, that's stifling creativity.""
"The gate, a chip component that switches transistors on and off, is a critical measure of transistor size. Previous research had already pushed gate lengths to one nanometer and below. By scaling gate lengths down to the size of single atoms, the latest work sets a new mark that'll be hard to beat. "In the future, it will be almost impossible for people to make a gate length smaller than 0.34 nm," the paper's senior author Tian-Ling Ren told IEEE Spectrum. "This could be the last node for Moore's Law.""
"Tech companies around the world appeared to listen. The very public and very swift removal of Russian channels on social media represented a sea change from years of prior content moderation decisions, when government requests for removals were often done with less fanfare and were frequently met with ire from human rights groups."
"These are yet more children getting conscripted, tik tok and all, into Putin's worst war yet. It's his western fellow travelers and apologists to get coarse at, the smilers with the knives under their cloaks."
"But it feels less creepy once you learn that these technologies don't have to rely on a camera to see where you are and what you're doing. Instead, they use radar. Google's Advanced Technology and Products division-better known as ATAP, the department behind oddball projects such as a touch-sensitive denim jacket-has spent the past year exploring how computers can use radar to understand our needs or intentions and then react to us appropriately."
"On Tuesday, security firm Cleafy reported that TeaBot was back. This time, the trojan spread through a malicious app called QR Code & Barcode Scanner, which as the name suggests, allowed users to interact with QR codes and barcodes. The app had more than 10,000 installations before Cleafy researchers notified Google of the fraudulent activity and Google removed it."
"The reasons for this "bot holiday", as Fisman calls it, are probably varied - but many of them point to the Russian invasion of Ukraine.
Russia's information war with western nations seems to be pivoting to new fronts, from vaccines to geopolitics."
"Cyber conflicts are fought in the shadows, but in the case of Russia's invasion of Ukraine, it is a group that calls itself Anonymous that has made the most public declaration of war. Late on Thursday the hacker collective tweeted from an account linked to Anonymous, @YourAnonOne, that it had Vladimir Putin's regime in its sights."
""It's not so much the technical disruption, it's what it does to undermine confidence, like in the financial sector. It gets people quite nervous. It's more that kind of secondary impact," said Jamie Collier, a Mandiant consultant, who described a DDoS as akin to stuffing a thousand envelopes through a letterbox every second."
"My prediction failed. For a decade and a half, Facebook resisted the fate of all the social networks that preceded it. In hindsight, it's easy to see why: it cheated. The company used investor cash to buy and neutralize competitors ("Kids are leaving Facebook for Insta? Fine, we'll buy Insta. We know you value choice!"). It allegedly spied on users through the deceptive use of apps such as Onavo and exploited the intelligence to defeat rivals. More than anything, it ratcheted up "switching costs.""
"But in internet time 2009 was aeons ago. Now, intensive surveillance is available to anyone. And you don't have to be a tech wizard to do it. In mid-January this year, Kashmir Hill, a talented American tech reporter, used three bits of everyday consumer electronics - Apple AirTags, Tiles and a GPS tracker - to track her husband's every move. He agreed to this in principle, but didn't realise just how many devices she had planted on him. He found only two of the trackers: a Tile he felt in the breast pocket of his coat and an AirTag in his backpack when he was looking for something else. "It is impossible to find a device that makes no noise and gives no warning," he said when she showed him the ones he missed."
"Ultimately, despite all the pitfalls of social media, there may be no going back. "Sometimes I wish the electrical grid would go down so I wouldn't have to do it any more," says Quin. "But we're in the maze and I don't know how to get out.""
"To conclude: this is all a long-winded way of saying the metaverse is the internet. But spatial. And built with game engines. And probably NFTs. And who knows where that takes us…"
"Truth Social allows users to post and share a "truth" the same way they would with a tweet. There are no ads, according to Willis and a second source familiar with TMTG.
Users choose who they follow and the feed is a mix of individual posts and an RSS-like news feed. They will be alerted if someone mentions or begins following them."
"Why do some people get so upset, especially in an age where many people are taking digital detoxes for mental-health breaks, and others are busy juggling life tasks?
People still communicate in different ways; some are constantly attached to their phones, while others want to disengage from them for chunks of time. But tensions over reply times may also come down to social norms - or the lack thereof. New developments in digital technology have outpaced the formulation of mutually agreed new communication paradigms, so when a text is sent, we're not all responding according to the same 'rules'."
"The university presidents' council said this morning that the security of its central admissions system has been upgraded after the personal data of around 23,000 students was advertised for sale on the dark web.
The university presidents' council insisted that the leaked admissions data, which included personal information and examination results, was only current through last May after anger erupted over the data breach. #BanTCAS was surging on Thai Twitter this morning in reference to the Thai University Central Admission System, or TCAS."
"Cybersecurity researchers say the My2022 mobile app - the official app of the Beijing Winter Olympics - has serious security vulnerabilities and that "all Olympian audio is being collected, analyzed and saved on Chinese servers."
Why This Matters: The Chinese government is mandating all Olympic athletes, coaches, and attendees use the My2022 app and, as of Thursday morning, the app is still available in the Apple and Android U.S. app stores where Americans can download it too."