Sdorn Provides Timely and Accurate Technology News, Covering APP, AI, IoT, Cybersecurity, Startup and Innovation.
⎯ 《 Sdorn • Com 》
Germany Expects TSMC to Approve Dresden Chip Plant Tuesday
Germany Expects TSMC to Approve Dresden Chip Plant Tuesday
The German government expects Taiwan Semiconductor Manufacturing Co. to give the go-ahead for the construction of a €10
2023-08-08 00:58
Moon landing anticipation builds for India after Russia's crash
Moon landing anticipation builds for India after Russia's crash
By Nivedita Bhattacharjee BENGALURU India's space agency on Monday released images its spacecraft took of the far side
2023-08-21 15:52
MGM Resorts Hackers Broke in After Tricking IT Service Desk
MGM Resorts Hackers Broke in After Tricking IT Service Desk
The online attack that disrupted MGM Resorts International resorts and casinos across the country began with a social
2023-09-16 08:46
T-Mobile Now Serving Up High-Performance 5G 'Network Slicing'
T-Mobile Now Serving Up High-Performance 5G 'Network Slicing'
Serving up something good one slice at a time isn’t just for pizza; it’s also
2023-08-29 04:26
Scientists receive powerful ‘fast radio burst’ from the depths of the universe
Scientists receive powerful ‘fast radio burst’ from the depths of the universe
The Earth has been hit by a powerful blast of energy from the very depths of the universe. The fast radio burst is the most distant of its kind of ever seen, coming from so far away that it has travelled eight billion years to get to Earth. It is also astonishingly powerful, one of the most energetic of its kind ever seen. In less than a second, it released the same energy that comes out of the Sun in more than 30 years. Fast radio bursts are intense, short bursts of energy that come from unknown but extreme activity in space. Scientists are still unsure of how they are formed, but explanations have included everything from extraterrestrial technology to neutron stars. The newly discovered burst appears to come from a small group of merging galaxies, scientists say, which helps support current theories about where they come from. But the intensity of the burst is harder to explain, which challenges our understanding of how they are actually emitted. “While we still don’t know what causes these massive bursts of energy, the paper confirms that fast radio bursts are common events in the cosmos and that we will be able to use them to detect matter between galaxies, and better understand the structure of the Universe,” said Ryan Shannon, from the Swinburne University of Technology. The blasts could be useful ways of answering some of the deepest questions about our cosmos, such as how much it actually weighs. At the moment, attempts to answer that have led to confusing results. “If we count up the amount of normal matter in the Universe — the atoms that we are all made of — we find that more than half of what should be there today is missing,” said Professor Shannon. “We think that the missing matter is hiding in the space between galaxies, but it may just be so hot and diffuse that it’s impossible to see using normal techniques. “Fast radio bursts sense this ionised material. Even in space that is nearly perfectly empty they can ‘see’ all the electrons, and that allows us to measure how much stuff is between the galaxies.” The blast was spotted last year, using a telescope in Japan. Researchers then used other telescopes to verify the find and examine it in more detail. “Using ASKAP’s array of dishes, we were able to determine precisely where the burst came from,” said Stuart Ryder, the first author on the paper. “Then we used the European Southern Observatory (ESO) Very Large Telescope (VLT) in Chile to search for the source galaxy, finding it to be older and further away than any other FRB source found to date, and likely within a small group of merging galaxies.” The findings are reported in a new paper, ‘A luminous fast radio burst that probes the Universe at redshift 1’, published in the journal Science. Read More Scientists unveil radical new ‘missing law’ to explain the universe India’s Modi declares goal to land human on Moon by 2040 Researchers reveal source of largest ever Mars quake
2023-10-20 02:23
CEO of AI company warns his tech has a large chance of ending the world
CEO of AI company warns his tech has a large chance of ending the world
The boss of one of the biggest artificial intelligence firms in the world has estimated the chance that his technology could end human civilisation is up to 25 per cent. Dario Amodei, chief executive of Anthropic AI, said in an interview that a catastrophic end result of advanced AI technology could come from the tech going wrong itself, or humans misusing it. He said: “My chance that something goes really quite catastrophically wrong on the scale of human civilisation might be somewhere between 10 per cent and 25 per cent. “Put together the risk of something going wrong with the model itself with something going wrong with people or organisations or nation states misusing the model or it inducing conflict among them.” Amodei is a co-founder of Anthropic AI and previously worked for OpenAI, the company which developed ChatGPT. It comes as concerns ramp up across the world about the power of AI, and whether it could eventually lead to catastrophe for humanity. The release of the most recent version of ChatGPT, which illustrated writing skills which, in some capacities such as legal and technical writing, are comparable to that of a human, but at much higher speeds. Amodei added: “That means there is a 75 per cent to 90 per cent chance that this technology is developed and everything goes fine. “In fact if everything goes fine it’ll go not just fine, it’ll go really really great. “If we can avoid the downsides then this stuff about curing cancer, extending human lifespan, solving problems like mental illness… This all sounds utopian but I don’t think it’s outside the scope of what this technology can do.” Amodei did not elaborate on his speculation of how AI could “cure” cancer or “solve” mental illness. A handful of early-stage AI projects have shown promise in early diagnosis of hard-to-detect tumours like some types of lung cancer. But doctors have cautioned against over-optimism of AI’s ability to curer or detect diseases, pointing out that it could also lead to over-diagnosis, potentially making the process even less efficient, rather than more streamlined. Meanwhile, earlier this year, hundreds of AI industry leaders signed an open letter calling for more robust regulations of the technology to lessen the risk that it ultimately leads to the extinction of humanity. The letter, signed by OpenAI founder Sam Altmann and others, said: “Advanced AI could represent a profound change in the history of life on Earth, and should be planned for and managed with commensurate care and resources.” Sign up to our free Indy100 weekly newsletter Have your say in our news democracy. Click the upvote icon at the top of the page to help raise this article through the indy100 rankings.
2023-10-09 19:26
PayPal Sees Stablecoin Generating Revenue From Payment Flows
PayPal Sees Stablecoin Generating Revenue From Payment Flows
PayPal Holdings Inc., which became the first global payments firm to launch a stablecoin on Monday, plans to
2023-08-09 02:18
Jury finds teenager responsible for computer hacking spree
Jury finds teenager responsible for computer hacking spree
A teenager has been found responsible for a hacking spree in which victims’ savings were stolen and major companies, including the maker of the best-selling Grand Theft Auto video games, were blackmailed. Arion Kurtaj, 18, and a 17-year-old who cannot be named for legal reasons, were described by the prosecution as the “key players” in the LapsusS hacking group. Psychiatrists had assessed Kurtaj as unfit to stand trial so the role of the jury in his case was to decide whether he had committed the acts alleged against him. On Wednesday, following a two-month trial at London’s Southwark Crown Court plus nine hours and 19 minutes of deliberations, a jury unanimously found Kurtaj had carried out 12 offences in his spree of innovative hacks. These offences included six counts of carrying out an unauthorised act to impair the operation of a computer, three counts of blackmail, two fraud offences, and of failing to comply with a section 49 notice to disclose a key when he did not give up the password to his mobile phone when asked to by police. He tried to blackmail Rockstar Games by threatening to “leak the stolen source code for the Grand Theft Auto sequel onto internet forums”, the indictment stated. Kurtaj and the youth were also accused of hacking software company Nvidia in February 2022 before threatening to “release Nvidia Corporation’s intellectual property on to the web” if it did not pay them. The 17 year-old showed no emotion as he was found guilty of one count of fraud, a charge of blackmail and also of having carried out an unauthorised act to impair the operation of a computer. His mother wept uncontrollably after the verdicts were read out. Keep in mind Arion Kurtaj's psychological make-up, and in particular his psychological condition, his education or lack thereof - could he be the highly intelligent, competent genius that the prosecution set out at the beginning? Arion Kurtaj's defence counsel David Miller Prosecutors alleged Kurtaj and the 17-year-old, aided by unknown associates, hacked the servers and data files of broadband provider BT and mobile operator EE before demanding a four million US dollar ransom on August 1 2021. But the 17-year-old was found not guilty of a charge of have carried out an unauthorised act to impair the operation of a computer and a further charge of blackmail in relation to BT. He previously pleaded guilty to one offence under the Computer Misuse Act and one count of fraud. Neither defendant gave evidence during the jury trial. Sentencing dates at the same court have yet to be fixed for either defendant. This has been a complex and sensitive investigation involving a multi-agency response and there have been a number of challenges throughout the police investigation and judicial process Detective Superintendent Richard Waight A case management hearing has been set for Kurtaj on September 21, while it is hoped that a sentencing date may be fixed for the 17 year-old on November 9. During the trial, the court was told that Kurtaj had been living in care since the age of 14 and had been housed for a period in a Travelodge “for his own protection”. Kurtaj’s defence counsel David Miller described the youngster as “the most vulnerable of adolescents” who was now pitted against huge companies and corporations worth billions, who had unlimited funds and unlimited resources including the FBI, National Crime Agency, Interpol and City of London Police. During closing speeches, he told the jury: “Keep in mind Arion Kurtaj’s psychological make-up, and in particular his psychological condition, his education or lack thereof – could he be the highly intelligent, competent genius that the prosecution set out at the beginning?” After the verdicts, Detective Superintendent Richard Waight, of the City of London Police, said: “This has been a complex and sensitive investigation involving a multi-agency response and there have been a number of challenges throughout the police investigation and judicial process. “We thank the judge and jury for being patient throughout the trial, during deliberations and for the subsequent verdicts.” Read More Charity boss speaks out over ‘traumatic’ encounter with royal aide Ukraine war’s heaviest fight rages in east - follow live Social media firms should reimburse online purchase scam victims – Barclays Hozier would consider striking over AI threat to music industry Snapchat experiences ‘temporary outage’ as My AI chatbot posts own Story
2023-08-23 22:24
ISACA Welcomes New CEO Erik Prusch
ISACA Welcomes New CEO Erik Prusch
SCHAUMBURG, Ill.--(BUSINESS WIRE)--Jun 12, 2023--
2023-06-12 23:27
Bitcoin Nears One-Year High as Fidelity Reportedly Eyes Spot ETF
Bitcoin Nears One-Year High as Fidelity Reportedly Eyes Spot ETF
Bitcoin is hovering around its one-year high as asset manager Fidelity reportedly readies its filing for a spot
2023-06-28 00:51
Why Apple is working hard to break into its own iPhones
Why Apple is working hard to break into its own iPhones
Last summer, Apple’s iPhones got a new feature that it hopes you never need to use and which mostly makes them harder to use. Named Lockdown Mode, Apple stresses that it is not for everyone, calling it an “optional, extreme protection” aimed at “very few individuals” that will be irrelevant to most people. Many people will never know that the feature exists. But it is just one part of a range of features that Apple and other companies have been forced to add to their devices as phones and other personal devices become an increasingly important part of geopolitics. Lockdown Mode is just one part of Apple’s response: it sits alongside other security features as well as detailed security work that aims to stop people breaking into its devices. That work has largely been done quietly, with Apple focusing much more on its privacy work than on security. But recently it opened up on some of that work, as well as the thinking that led Apple to put so much focus onto a set of features that nobody ever wants to use. Some of that work is happening now in Paris. The city has a long history of work on security technology – including work on smart cards that saw the early widespread introduction of secure debit cards in France – but the activity at Apple’s facilities in the city is looking far ahead, towards iPhones and other devices that are secret for now and will not appear for years. As part of that work in Paris, Apple’s engineers are working hard to break its phones. Using a vast array of technology including lasers are finely tuned sensors, they are trying to find gaps in their security and patch them up before they even arrive in the world. Unlike with software, where even significant security holes can be fixed relatively simply with a security update, hardware is out of Apple’s hands once a customer buys it. That means that it must be tested years in advance with every possible weakness probed and fixed up before the chip even makes it anywhere near production. Apple’s chips have to be relied upon to encrypt secure data so that it cannot be read by anyone else, for instance; pictures need to be scrambled before they are sent up to be backed up on iCloud, for instance, to ensure that an attacker could not grab them as they are transferred. That requires using detailed and complicated mathematical work to make the pictures meaningless without the encryption key that will unlock them. There are various ways that process might be broken, however. The actual chip doing the encryption can show signs of what it is doing: while processors might seem like abstract electronics, they throw out all sorts of heats and signals that could be useful to an attacker. If you asked someone to keep a secret number in their head and let you try and guess it, for instance, you might tell them to multiply the number by two and see how long it takes and how hard they are thinking; if it’s a long time, it suggests the number might be especially big. the same principle is true of a chip, it’s just that the signs are a little different. And so Apple gets those chips and probes them, blasts them with precisely targeted lasers, heats them up and cools them down, and much more besides. The engineers in its Paris facilities doing this work are perhaps the most highly capable and well resourced hackers of Apple’s products in the world; they just happen to be doing it to stop everyone else doing the same. If they find something, that information will be distributed to colleagues who will then work to patch it up. Then the cycle starts all over again. It is complicated and expensive work. But they are up against highly compensated hackers: in recent years, there has grown up to be an advanced set of companies offering cyber weapons to the highest bidder, primarily for use against people working to better the world: human rights activists, journalists, diplomats. No piece of software better exemplifies the vast resources that are spent in this shadow industry than Pegasus, a highly targeted piece of spyware that is used to hack phones and surveil their users, though it has a host of competitors. Pegasus has been around since at least 2016, and since then Apple has been involved in a long and complicated game of trying to shut down to the holes it might exploit before attackers find and market another one. Just as with other technology companies, Apple works to secure devices against more traditional attacks, such as stolen passwords and false websites. But Pegasus is an entirely different kind of threat, targeted at specific people and so expensive that it would only be used in high-grade attacks. Fighting it means matching its complexity. It’s from that kind of threat that Lockdown Mode was born, though Apple does not explicitly name Pegasus in its materials. It works by switching off parts of the system, which means that users are explicitly warned when switching it on that they should only do so with good reason, since it severely restricts the way the phone works; FaceTime calls from strangers will be blocked, for instance, and so will most message attachments. But Lockdown Mode is not alone. Recent years have seen Apple increase the rewards in its bug bounty programme, through which it pays security researchers for finding bugs in its software, after it faced sustained criticism over its relatively small payouts. And work on hardware technologies such as encryption – and testing it in facilities such as those in Paris – mean that Apple is attempting to build a phone that is safe from attacks in both hardware and software. Apple says that work is succeeding, believing it is years ahead of its hackers and proud of the fact that it has held off attacks without forcing its users to work harder to secure their devices or compromising on features. But recent years have also seen it locked in an escalating battle: Lockdown Mode might have been a breakthrough of which it is proud, but it was only needed because of an unfortunate campaign to break into people’s phones. Ivan Krstić, Apple’s head of security engineering and architecture, says that is partly just a consequence of the increasing proliferation of technology. “I think what’s happening is that that there are more and more avenues of attack. And that’s partly a function of wider and wider deployment of technology. More and more technology is being used in more and more scenarios.,” says Krstić, pointing not only to personal devices such as phones but also to industry and critical infrastructure. “That is creating more opportunity for more attackers to come forward to develop some expertise to pick a niche that they want to spend their time attacking. “There was a time that that I still well remember when data breaches were seemingly not a wide problem. But of course, they have exploded over the last 10 years or so – more than tripled, between 2013 and 2021. In 2021, the number of personal records breached 1.1 billion personal records. “During the same amount of time a number of other attackers have been pursuing new kinds of attack, or different kinds of attacks – against devices, against Internet of Things devices, against really anything that is that is connected in in some way to the internet. “And I think in a lot of these cases, attackers were will go where there is money to be made or some other benefits to be obtained and the nature of the fight for security is to keep pushing the defences forward to keep trying to stay one step ahead of not just where the attacks are today, but also where they’re going.” Apple doesn’t reveal exactly how much of its money is spent on security work. But it must be significant, both in terms of raw money as well as the extra thought and design required on any given device. What’s the justification for investing so many resources on ensuring that a very small number of people are protected from the most advanced attacks? “There are two,” says Krstić. “One is that attacks that are the most sophisticated attacks today may over time start to percolate down and become more widely available. Being able to understand what the absolute most sophisticated most grave threats look like today lets us build defences before any of that has a chance to percolate down and become more widely available. But I think that’s the smaller of the two reasons. “When we look at how some of this state grade mercenary spyware is being abused, the kinds of people being hit with it – it’s journalists, diplomats, people fighting to make the world a better place. And we think it’s wrong for this kind of spyware to be abused in this way. We think that that those users deserve trustworthy, safe technology, and the ability to communicate safely and freely, just as all our other users. “So this was, for us, not a business decision. It was… doing what’s right.” Apple’s focus on security places it into a difficult geopolitical situation of the kind it has often studiously avoided. Late last month, for instance, Indian opposition leaders started receiving threat notifications warning them that their devices might be attacked. Neither the notifications or Apple more generally named who was doing it, and Apple says that the warnings could be a false alarm – but nonetheless the Indian government pushed back, launching a probe of the security of Apple’s devices. It is not the kind of difficulty that comes even with other security work; those stealing passwords or scamming people out of money don’t have lobbyists and government power. The kind of highly targeted, advanced attacks that Lockdown Mode and other features guard against however are costly and complicated, meaning they will often be done by governments that could cause difficulties for Apple and other technology companies. How is Apple guided in situations where it could potentially be up against governments and other powerful agencies? “We do not see ourselves as set against governments,” says Krstić. “That is not what any of this work is about. But we do see ourselves as having a duty to defend our users from threats, whether common or in some cases, truly grave. He declines to give precise details about how the company has dealt with those difficulties in the past. “But I think when you look at what’s been driving it, when you look at these cases that I’ve pointed to and when you look at what the response has been to the defences we built and how we’ve been able to protect some of these users, we feel very strongly like we’re doing the right thing.” Threat notifications are not the only part of Apple’s security work that have caused issues with authorities. Another much larger debate is coming, and might potentially bring a much more substantial change. The European Union’s recently signed Digital Markets Act requires that what it calls gatekeepers – Apple and other operators of app stores – must allow for sideloading, or letting people put apps on their phones from outside of those App Stores. At the moment, iPhones can only download and run apps downloaded from the official store; Apple says that is an important protection, but critics argue that it gives it too much power over the device. The introduction of sideloading is just one of the many controversial parts of the Digital Markets Act. But if it goes through as planned, the company will be forced to let people head to a website and download a third-party app, without standing in the way. The European Commission has made very clear that it believes that is required for fair competition, and that it thinks that will give users more choice about what apps they use and how they get them. Krstić does not agree, and Apple has been explicit in its opposition to sideloading. The idea that people are being given an extra choice – including the choice of sticking with the App Store and keeping its protections – is a false one, he says with some frustration. “That’s a great misunderstanding – and one we have tried to explain over and over. The reality of what the alternative distribution requirements enable is that software that users in Europe need to use – sometimes business software, other times personal software, social software, things that they want to use – may only be available outside of the store, alternatively distributed. “In that case, those users don’t have a choice to get that software from a distribution mechanism that they trust. And so, in fact, it is simply not the case that users will retain the choice they have today to get all of their software from the App Store.” Read More Disney, Apple suspend ads on Musk’s X after he agrees with antisemitic tweet Apple to adopt system to improve texting between iPhones and Android devices Users of iPhones can now check bank balance from Wallet app TikTok launches feature to save songs to music apps like Spotify Apple answers one of the big mysteries about the iPhone – for now You can finally use one feature of the Apple Vision Pro headset – sort of
2023-11-18 18:29
Pokimane asserts Sykkuno is treated like 'K-Pop idol' as streamer boasts 'highest female demo' fan base
Pokimane asserts Sykkuno is treated like 'K-Pop idol' as streamer boasts 'highest female demo' fan base
Pokimane saw how Sykkuno was treated by his adoring fans while attending CONQuest Festival 2023 in the Phillipines
2023-06-12 13:16