Item 1 – Apple is reported to be in negotiations with news companies and other publishers (like NBC and Conde Nast) to “license” their back catalog of content for their AI projects. Apple is offering, supposedly, up to $50 million to license their content, but, at least for now, the content creators were not fans […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I don’t usually blog about an individual hacker takedown but this one – it is worth talking about. Certainly not the end of hacking but a significant win for the federales. Last month Interpol talked about Operation HAECHI IV. It was a six month takedown effort that involved 34 countries and funding from South Korea. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
But AI is really the buzzword, so if the writer puts AI in the title then maybe more people will read it. Specifically this is designed to help banks prevent token fraud, which is hard to do anyway. Token fraud happens when a merchant “tokenizes” a credit card transaction so that the merchant doesn’t have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No big surprise here. Researchers have gotten full read and write access to Meta’s Bloom, Meta-Llama and Pythia large language models in a typical example of supply chain risk. If they had been hackers or a non-friendly nation, they could have poisoned the training data, stolen the models and datasets and other unfriendly things. AI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing theĀ U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]