Category:

Editor’s Pick

On Monday, the US government announced a new round of regulations on global AI chip exports, dividing the world into roughly three tiers of access. The rules create quotas for about 120 countries and allow unrestricted access for 18 close US allies while maintaining existing bans on China, Russia, Iran, and North Korea.

AI-accelerating GPU chips, like those manufactured by Nvidia, currently serve as the backbone for a wide variety of AI model deployments, such as chatbots like ChatGPT, AI video generators, self-driving cars, weapons targeting systems, and much more. The Biden administration fears that those chips could be used to undermine US national security.

According to the White House, “In the wrong hands, powerful AI systems have the potential to exacerbate significant national security risks, including by enabling the development of weapons of mass destruction, supporting powerful offensive cyber operations, and aiding human rights abuses.”

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

While worrying about AI takeover might seem like a modern idea that sprung from War Games or The Terminator, it turns out that a similar concern about machine dominance dates back to the time of the American Civil War, albeit from an English sheep farmer living in New Zealand. Theoretically, Abraham Lincoln could have read about AI takeover during his lifetime.

On June 13, 1863, a letter published in The Press newspaper of Christchurch warned about the potential dangers of mechanical evolution and called for the destruction of machines, foreshadowing the development of what we now call artificial intelligence—and the backlash against it from people who fear it may threaten humanity with extinction. It presented what may be the first published argument for stopping technological progress to prevent machines from dominating humanity.

Titled “Darwin among the Machines,” the letter recently popped up again on social media thanks to Peter Wildeford of the Institute for AI Policy and Strategy. The author of the letter, Samuel Butler, submitted it under the pseudonym Cellarius, but later came to publicly embrace his position. The letter drew direct parallels between Charles Darwin’s theory of evolution and the rapid development of machinery, suggesting that machines could evolve consciousness and eventually supplant humans as Earth’s dominant species.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit content using the company’s platform for AI-generated content.

The foreign-based defendants developed tools specifically designed to bypass safety guardrails Microsoft has erected to prevent the creation of harmful content through its generative AI services, said Steven Masada, the assistant general counsel for Microsoft’s Digital Crimes Unit. They then compromised the legitimate accounts of paying customers. They combined those two things to create a fee-based platform people could use.

A sophisticated scheme

Microsoft is also suing seven individuals it says were customers of the service. All 10 defendants were named John Doe because Microsoft doesn’t know their identity.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

On Wednesday, the World Economic Forum (WEF) released its Future of Jobs Report 2025, with CNN immediately highlighting the finding that 40 percent of companies plan workforce reductions due to AI automation. But the report’s broader analysis paints a far more nuanced picture than CNN’s headline suggests: It finds that AI could create 170 million new jobs globally while eliminating 92 million positions, resulting in a net increase of 78 million jobs by 2030.

“Half of employers plan to re-orient their business in response to AI,” writes the WEF in the report. “Two-thirds plan to hire talent with specific AI skills, while 40% anticipate reducing their workforce where AI can automate tasks.”

The survey collected data from 1,000 companies that employ 14 million workers globally. The WEF conducts its employment analysis every two years to help policymakers, business leaders, and workers make decisions about hiring trends.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical vulnerability that gives them complete control over the network-connected devices.

Hardware maker Ivanti disclosed the vulnerability, tracked as CVE-2025-0283, on Wednesday and warned that it was under active exploitation against some customers. The vulnerability, which is being exploited to allow hackers to execute malicious code with no authentication required, is present in the company’s Connect Secure VPN, and Policy Secure & ZTA Gateways. Ivanti released a security patch at the same time. It upgrades Connect Secure devices to version 22.7R2.5.

Well-written, multifaceted

According to Google-owned security provider Mandiant, the vulnerability has been actively exploited against “multiple compromised Ivanti Connect Secure appliances” since December, a month before the then zero-day came to light. After exploiting the vulnerability, the attackers go on to install two never-before-seen malware packages, tracked under the names DRYHOOK and PHASEJAM on some of the compromised devices.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

The Internet has become the most prevalent communications technology the world has ever seen. Though there are more fixed and mobile telephone connections, even they use Internet technology in their core. For all the many uses the Internet allows for today, its origins lie in the cold war and the need for a defence communications network that could survive a nuclear strike. But that defence communications network quickly became used for general communications and within only a few years of the first transmission, traffic on the predecessor to today’s Internet was already 75% email.

In the beginning

Arpanet was the vital precursor of today’s Internet, commissioned by the US Defence Advanced Research Projects Agency (Darpa) in 1969. In his interesting account of why Arpanet came about, Stephen Lukasic, Director of Darpa from 1970-75, wrote that if its true nature and impact had been realised it would never have been permitted under the US government structure of the time. The concept for a decentralised communications technology that would survive a nuclear attack would have placed it outside Darpa’s remit (as defence communications specifically were assigned to a different agency), so the focus changed to how to connect computers together so that major applications could be run on the most appropriate system available.

This was in the era of time-sharing computers. Today’s familiar world of the ubiquitous “personal computer” on each desk was decades away. Computers of this time were generally very large, filling entire rooms, and comparatively rare. Users working at connected terminals would submit jobs to the computer which would allocate processing time for the job when available. The idea went that if these computers were networked together, an available remote computer could process a job even when the computers closer to the users were full. The resulting network was called Arpanet and the first packets of data traversed the network in September 1969.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

The people overseeing the security of Google’s Chrome browser explicitly forbid third-party extension developers from trying to manipulate how the browser extensions they submit are presented in the Chrome Web Store. The policy specifically calls out search-manipulating techniques such as listing multiple extensions that provide the same experience or plastering extension descriptions with loosely related or unrelated keywords.

On Wednesday, security and privacy researcher Wladimir Palant revealed that developers are flagrantly violating those terms in hundreds of extensions currently available for download from Google. As a result, searches for a particular term or terms can return extensions that are unrelated, inferior knockoffs, or carry out abusive tasks such as surreptitiously monetizing web searches, something Google expressly forbids.

Not looking? Don’t care? Both?

A search Wednesday morning in California for Norton Password Manager, for example, returned not only the official extension but three others, all of which are unrelated at best and potentially abusive at worst. The results may look different for searches at other times or from different locations.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

On Monday, Nvidia announced Project DIGITS, a small desktop computer aimed at researchers, data scientists, and students who want to experiment with AI models—such as chatbots like ChatGPT and image generators—at home. The $3,000 device, which contains Nvidia’s new GB10 Grace Blackwell Superchip, debuted at CES 2025 in Las Vegas. It will launch in May and can operate as a standalone PC or connect to a Windows or Mac machine.

At CES on Monday, Nvidia CEO Jensen Huang described the new system as “a cloud computing platform that sits on your desk.” The company also designed Project DIGITS as a bridge between desktop development and cloud deployment. Developers can create and test AI applications locally on Project DIGITS, then move them to cloud services or data centers that use similar Nvidia hardware.

The GB10 chip inside the Project DIGITS computer combines an Nvidia Blackwell GPU with a 20-core Grace CPU based on Arm architecture. Nvidia developed the chip in partnership with MediaTek, and it connects to 128GB of memory and up to 4TB of storage inside the Project DIGITS enclosure.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

In 2012, an industry-wide coalition of hardware and software makers adopted Secure Boot to protect Windows devices against the threat of malware that could infect the BIOS and, later, its predecessor the UEFI, the firmware that loaded the operating system each time a computer booted up.

Firmware-dwelling malware raises the specter of malware that infects the devices before the operating system even loads, each time they boot up. From there, it can remain immune to detection and removal. Secure Boot uses public-key cryptography to block the loading of any code that isn’t signed with a pre-approved digital signature.

2018 calling for its BIOS

Since 2016, Microsoft has required all Windows devices to include a strong trusted platform module that enforces Secure Boot. To this day organizations widely regard Secure Boot as an important, if not essential, foundation of trust in securing devices in some of the most critical environments.

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail

On Sunday, OpenAI CEO Sam Altman offered two eye-catching predictions about the near-future of artificial intelligence. In a post titled “Reflections” on his personal blog, Altman wrote, “We are now confident we know how to build AGI as we have traditionally understood it.” He added, “We believe that, in 2025, we may see the first AI agents ‘join the workforce’ and materially change the output of companies.”

Both statements are notable coming from Altman, who has served as the leader of OpenAI during the rise of mainstream generative AI products such as ChatGPT. AI agents are the latest marketing trend in AI, allowing AI models to take action on a user’s behalf. However, critics of the company and Altman immediately took aim at the statements on social media.

We are now confident that we can spin bullshit at unprecedented levels, and get away with it,” wrote frequent OpenAI critic Gary Marcus in response to Altman’s post. “So we now aspire to aim beyond that, to hype in purest sense of that word. We love our products, but we are here for the glorious next rounds of funding. With infinite funding, we can control the universe.”

Read full article

Comments

0 comment
0 FacebookTwitterPinterestEmail