Regulators said the subscription service introduced last year is a “pay or consent” method to collect personal data and bolster advertising.
3 million iOS and macOS apps were exposed to potent supply-chain attacks
Enlarge (credit: Aurich Lawson) Vulnerabilities that went undetected for a decade left thousands of macOS and iOS apps susceptible to supply-chain attacks. Hackers could have added malicious code compromising the security of millions or billions of people who installed them, researchers said Monday. The vulnerabilities, which were fixed last October, resided in a “trunk” server...
Facial Recognition Led to Wrongful Arrests. So Detroit Is Making Changes.
The Detroit Police Department arrested three people after bad facial recognition matches, a national record. But it’s adopting new policies that even the A.C.L.U. endorses.
The Voices of A.I. Are Telling Us a Lot
Even as the technology advances, stubborn stereotypes about women are re-encoded again and again.
Inside a violent gang’s ruthless crypto-stealing home invasion spree
Enlarge (credit: Malte Mueller / Getty) Cryptocurrency has always made a ripe target for theft—and not just hacking, but the old-fashioned, up-close-and-personal kind, too. Given that it can be irreversibly transferred in seconds with little more than a password, it’s perhaps no surprise that thieves have occasionally sought to steal crypto in home-invasion burglaries and...
Researchers craft smiling robot face from living human skin cells
Enlarge / A movable robotic face covered with living human skin cells. (credit: Takeuchi et al.) In a new study, researchers from the University of Tokyo, Harvard University, and the International Research Center for Neurointelligence have unveiled a technique for creating lifelike robotic skin using living human cells. As a proof of concept, the team...
(BPRW) Digital Promise Releases New Report for Supporting Black Learners and Workers in Tech
JUNE 27, 2024 | Washington, D.C. – (Black PR Wire) Global education nonprofit, Digital Promise has released a new report, Lift Every Voice in Tech: Co-Designed Recommendations to Support Black Workers and Learners Seeking to Enter and Advance in Technolog…
Campaign Tied to China Are Harassing a Dissident’s Teenage Daughter
A covert campaign to target a writer critical of the country’s Communist Party has extended to sexually suggestive threats against his 16-year-old daughter.
OpenAI’s new “CriticGPT” model is trained to criticize GPT-4 outputs
Enlarge / An illustration created by OpenAI. (credit: OpenAI) On Thursday, OpenAI researchers unveiled CriticGPT, a new AI model designed to identify mistakes in code generated by ChatGPT. It aims to enhance the process of making AI systems behave in ways humans want (called “alignment”) through Reinforcement Learning from Human Feedback (RLHF), which helps human...
Mac users served info-stealer malware through Google ads
Enlarge (credit: Getty Images) Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely used ad platform has been abused to infect web surfers. The latest ads, found by security firm Malwarebytes on Monday,...