Lateo.net - Flux RSS en pagaille (pour en ajouter : @ moi)

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Hier — 24 avril 2024Informatique & geek

8 AI Business Trends in 2024, According to Stanford Researchers

TechRepublic digs into the business implications of artificial intelligence trends highlighted in Stanford’s AI Index Report, with help from co-authors Robi Rahman and Anka Reuel.

Comment éviter les arnaques en ligne : une check-list pour vos achats sur Internet

À l'heure où les réseaux sociaux se transforment en véritables places de marché, il est devenu essentiel de faire preuve de prudence avant de craquer pour des produits alléchants. Voici une liste de points à vérifier avant de faire confiance à une boutique en ligne, ce qu'il ne faut pas oublier pour...

Incident de cybersécurité à l’Ordre des infirmières et infirmiers du Québec

Un récent incident de cybersécurité survenu à l'Ordre des infirmières et infirmiers du Québec (OIIQ) inquiète les professionnels de santé. Le 19 avril dernier, les systèmes informatiques de l'OOIQ se sont retrouvé face à une intrusion informatique....

6 séries à voir après la fin de Shōgun sur Disney+

Le drame épique, situé dans un Japon féodal implacable, vient de tirer sa révérence avec un ultime épisode sur Disney+. Pour prolonger le plaisir, voici donc 6 séries similaires à Shōgun, à voir en streaming : Succession, Blue Eye Samurai, Vikings, Le Temps des Samouraïs, Tokyo Vice ainsi que Giri/Haji.

Hackers infect users of antivirus service that delivered updates over HTTP

Par : Dan Goodin
Hackers infect users of antivirus service that delivered updates over HTTP

Enlarge (credit: Getty Images)

Hackers abused an antivirus service for five years in order to infect end users with malware. The attack worked because the service delivered updates over HTTP, a protocol vulnerable to attacks that corrupt or tamper with data as it travels over the Internet.

The unknown hackers, who may have ties to the North Korean government, pulled off this feat by performing a man-in-the-middle (MitM) attack that replaced the genuine update with a file that installed an advanced backdoor instead, said researchers from security firm Avast today.

eScan, an AV service headquartered in India, has delivered updates over HTTP since at least 2019, Avast researchers reported. This protocol presented a valuable opportunity for installing the malware, which is tracked in security circles under the name GuptiMiner.

Read 10 remaining paragraphs | Comments

Microsoft’s Phi-3 shows the surprising power of small, locally run AI language models

An illustration of lots of information being compressed into a smartphone with a funnel.

Enlarge (credit: Getty Images)

On Tuesday, Microsoft announced a new, freely available lightweight AI language model named Phi-3-mini, which is simpler and less expensive to operate than traditional large language models (LLMs) like OpenAI's GPT-4 Turbo. Its small size is ideal for running locally, which could bring an AI model of similar capability to the free version of ChatGPT to a smartphone without needing an Internet connection to run it.

The AI field typically measures AI language model size by parameter count. Parameters are numerical values in a neural network that determine how the language model processes and generates text. They are learned during training on large datasets and essentially encode the model's knowledge into quantified form. More parameters generally allow the model to capture more nuanced and complex language-generation capabilities but also require more computational resources to train and run.

Some of the largest language models today, like Google's PaLM 2, have hundreds of billions of parameters. OpenAI's GPT-4 is rumored to have over a trillion parameters but spread over eight 220-billion parameter models in a mixture-of-experts configuration. Both models require heavy-duty data center GPUs (and supporting systems) to run properly.

Read 8 remaining paragraphs | Comments

8 AI Business Trends in 2024, According to Stanford Researchers

TechRepublic digs into the business implications of artificial intelligence trends highlighted in Stanford’s AI Index Report, with help from co-authors Robi Rahman and Anka Reuel.

Qui est la grande méchante du film Deadpool & Wolverine ?

Le deuxième trailer du film Deadpool & Wolverine montre davantage d'images de la grande méchante, incarnée par Emma Corrin. Elle incarnera Cassandra Nova, qui est un peu la jumelle maléfique du Professeur Xavier.

Usurpation : le virus était dans l’hôpital

L'histoire de Matthew Kierans, un administrateur hospitalier de l'Iowa, illustre l'un des cas les plus extrêmes d'usurpation d'identité ayant duré plus de trente ans. Cette affaire met en lumière les failles des systèmes de vérification d'identité et les conséquences tragiques pour les personnes imp...
À partir d’avant-hierInformatique & geek

5 films d’action ensoleillés à voir sur Prime Video

Pour partir en vacances par procuration avec une bonne dose d’adrénaline en supplément, voici 5 films qui font rimer spectaculaire avec solaire : Road House, Sirènes, 22 Jump Street, Shotgun Wedding ainsi que Freelance.

Microsoft’s VASA-1 can deepfake a person with one photo and one audio track

A sample image from Microsoft for

Enlarge / A sample image from Microsoft for "VASA-1: Lifelike Audio-Driven Talking Faces Generated in Real Time." (credit: Microsoft)

On Tuesday, Microsoft Research Asia unveiled VASA-1, an AI model that can create a synchronized animated video of a person talking or singing from a single photo and an existing audio track. In the future, it could power virtual avatars that render locally and don't require video feeds—or allow anyone with similar tools to take a photo of a person found online and make them appear to say whatever they want.

"It paves the way for real-time engagements with lifelike avatars that emulate human conversational behaviors," reads the abstract of the accompanying research paper titled, "VASA-1: Lifelike Audio-Driven Talking Faces Generated in Real Time." It's the work of Sicheng Xu, Guojun Chen, Yu-Xiao Guo, Jiaolong Yang, Chong Li, Zhenyu Zang, Yizhong Zhang, Xin Tong, and Baining Guo.

The VASA framework (short for "Visual Affective Skills Animator") uses machine learning to analyze a static image along with a speech audio clip. It is then able to generate a realistic video with precise facial expressions, head movements, and lip-syncing to the audio. It does not clone or simulate voices (like other Microsoft research) but relies on an existing audio input that could be specially recorded or spoken for a particular purpose.

Read 11 remaining paragraphs | Comments

LLMs keep leaping with Llama 3, Meta’s newest open-weights AI model

A group of pink llamas on a pixelated background.

Enlarge (credit: Getty Images | Benj Edwards)

On Thursday, Meta unveiled early versions of its Llama 3 open-weights AI model that can be used to power text composition, code generation, or chatbots. It also announced that its Meta AI Assistant is now available on a website and is going to be integrated into its major social media apps, intensifying the company's efforts to position its products against other AI assistants like OpenAI's ChatGPT, Microsoft's Copilot, and Google's Gemini.

Like its predecessor, Llama 2, Llama 3 is notable for being a freely available, open-weights large language model (LLM) provided by a major AI company. Llama 3 technically does not quality as "open source" because that term has a specific meaning in software (as we have mentioned in other coverage), and the industry has not yet settled on terminology for AI model releases that ship either code or weights with restrictions (you can read Llama 3's license here) or that ship without providing training data. We typically call these releases "open weights" instead.

At the moment, Llama 3 is available in two parameter sizes: 8 billion (8B) and 70 billion (70B), both of which are available as free downloads through Meta's website with a sign-up. Llama 3 comes in two versions: pre-trained (basically the raw, next-token-prediction model) and instruction-tuned (fine-tuned to follow user instructions). Each has a 8,192 token context limit.

Read 8 remaining paragraphs | Comments

LastPass users targeted in phishing attacks good enough to trick even the savvy

Par : Dan Goodin
LastPass users targeted in phishing attacks good enough to trick even the savvy

Enlarge (credit: Getty Images)

Password-manager LastPass users were recently targeted by a convincing phishing campaign that used a combination of email, SMS, and voice calls to trick targets into divulging their master passwords, company officials said.

The attackers used an advanced phishing-as-a-service kit discovered in February by researchers from mobile security firm Lookout. Dubbed CryptoChameleon for its focus on cryptocurrency accounts, the kit provides all the resources needed to trick even relatively savvy people into believing the communications are legitimate. Elements include high-quality URLs, a counterfeit single sign-on page for the service the target is using, and everything needed to make voice calls or send emails or texts in real time as targets are visiting a fake site. The end-to-end service can also bypass multi-factor authentication in the event a target is using the protection.

LastPass in the crosshairs

Lookout said that LastPass was one of dozens of sensitive services or sites CryptoChameleon was configured to spoof. Others targeted included the Federal Communications Commission, Coinbase and other cryptocurrency exchanges, and email, password management, and single sign-on services including Okta, iCloud, and Outlook. When Lookout researchers accessed a database one CryptoChameleon subscriber used, they found that a high percentage of the contents collected in the scams appeared to be legitimate email addresses, passwords, one-time-password tokens, password reset URLs, and photos of driver’s licenses. Typically, such databases are filled with junk entries.

Read 11 remaining paragraphs | Comments

Faudra-t-il attendre 25 ans pour une suite de Baldur’s Gate 3 ?

Baldur's Gate III

Larian Studios ne s'occupera pas de la suite de Baldur's Gate III. Mais Hasbro, qui est propriétaire de l'univers de Donjons et Dragons, lorgne sur l'après. Cette fois, pas question d'attendre 25 ans pour un autre jeu.

OpenAI winds down AI image generator that blew minds and forged friendships in 2022

An AI-generated image from DALL-E 2 created with the prompt

Enlarge / An AI-generated image from DALL-E 2 created with the prompt "A painting by Grant Wood of an astronaut couple, american gothic style." (credit: AI Pictures That Go Hard / X)

When OpenAI's DALL-E 2 debuted on April 6, 2022, the idea that a computer could create relatively photorealistic images on demand based on just text descriptions caught a lot of people off guard. The launch began an innovative and tumultuous period in AI history, marked by a sense of wonder and a polarizing ethical debate that reverberates in the AI space to this day.

Last week, OpenAI turned off the ability for new customers to purchase generation credits for the web version of DALL-E 2, effectively killing it. From a technological point of view, it's not too surprising that OpenAI recently began winding down support for the service. The 2-year-old image generation model was groundbreaking for its time, but it has since been surpassed by DALL-E 3's higher level of detail, and OpenAI has recently begun rolling out DALL-E 3 editing capabilities.

But for a tight-knit group of artists and tech enthusiasts who were there at the start of DALL-E 2, the service's sunset marks the bittersweet end of a period where AI technology briefly felt like a magical portal to boundless creativity. "The arrival of DALL-E 2 was truly mind-blowing," illustrator Douglas Bonneville told Ars in an interview. "There was an exhilarating sense of unlimited freedom in those first days that we all suspected AI was going to unleash. It felt like a liberation from something into something else, but it was never clear exactly what."

Read 42 remaining paragraphs | Comments

Kremlin-backed actors spread disinformation ahead of US elections

Par : Dan Goodin
Kremlin-backed actors spread disinformation ahead of US elections

Enlarge (credit: da-kuk/Getty)

Kremlin-backed actors have stepped up efforts to interfere with the US presidential election by planting disinformation and false narratives on social media and fake news sites, analysts with Microsoft reported Wednesday.

The analysts have identified several unique influence-peddling groups affiliated with the Russian government seeking to influence the election outcome, with the objective in large part to reduce US support of Ukraine and sow domestic infighting. These groups have so far been less active during the current election cycle than they were during previous ones, likely because of a less contested primary season.

Stoking divisions

Over the past 45 days, the groups have seeded a growing number of social media posts and fake news articles that attempt to foment opposition to US support of Ukraine and stoke divisions over hot-button issues such as election fraud. The influence campaigns also promote questions about President Biden’s mental health and corrupt judges. In all, Microsoft has tracked scores of such operations in recent weeks.

Read 13 remaining paragraphs | Comments

Broadcom says “many” VMware perpetual licenses got support extensions

The logo of American cloud computing and virtualization technology company VMware is seen at the Mobile World Congress (MWC), the telecom industry's biggest annual gathering, in Barcelona on March 2, 2023.

Enlarge (credit: Getty)

Broadcom CEO Hock Tan this week publicized some concessions aimed at helping customers and partners ease into VMware’s recent business model changes. Tan reiterated that the controversial changes, like the end of perpetual licensing, aren't going away. But amid questioning from antitrust officials in the European Union (EU), Tan announced that the company has already given support extensions for some VMware perpetual license holders.

Broadcom closed its $69 billion VMware acquisition in November. One of its first moves was ending VMware perpetual license sales in favor of subscriptions. Since December, Broadcom also hasn't sold Support and Subscription renewals for VMware perpetual licenses.

In a blog post on Monday, Tan admitted that this shift requires "a change in the timing of customers' expenditures and the balance of those expenditures between capital and operating spending." As a result, Broadcom has "given support extensions to many customers who came up for renewal while these changes were rolling out." Tan didn't specify how Broadcom determined who is eligible for an extension or for how long. However, the executive's blog is the first time Broadcom has announced such extensions and opens the door to more extension requests.

Read 10 remaining paragraphs | Comments

Tech Worker Salary Growth in Australia Has Normalised

Par : Ben Abbott
Some indicators suggest Australian technology sector salary growth is flatlining, but this is better seen in the context of strong growth in salaries over the long term and great prospects for the future.

GenAI : face à NVIDIA, Intel se tourne vers l’open source

Intel se greffe au projet OPEA (Open Enterprise Platform for AI) et y pousse des implémentations GenAI optimisées pour ses accélérateurs Gaudi.

4 séries à voir après Anthracite sur Netflix

Alors que la série policière française avec Hatik, Noémie Schmidt et Camille Lou cartonne sur Netflix, voici 4 séries similaires à Anthracite à découvrir sur la plateforme de streaming : Entrapped, La Forêt, Disparu à jamais ainsi qu’Apocalypse à Waco.

Linus Torvalds reiterates his tabs-versus-spaces stance with a kernel trap

Tab soda displayed on a grocery shelf

Enlarge / Cans of Tab diet soda on display in 2011. Tab was discontinued in 2020. There has never been a soda named "Spaces" that had a cult following. (credit: Getty Images)

Anybody can contribute to the Linux kernel, but any person's commit suggestion can become the focus of the kernel's master and namesake, Linus Torvalds. Torvalds is famously not overly committed to niceness, though he has been working on it since 2018. You can see glimpses of this newer, less curse-laden approach in how Torvalds recently addressed a commit with which he vehemently disagreed. It involves tabs.

The commit last week changed exactly one thing on one line, replacing a tab character with a space: "It helps Kconfig parsers to read file without error." Torvalds responded with a commit of his own, as spotted by The Register, which would "add some hidden tabs on purpose." Trying to smooth over a tabs-versus-spaces matter seemed to awaken Torvalds to the need to have tab-detecting failures be "more obvious." Torvalds would have added more, he wrote, but didn't "want to make things uglier than necessary. But it *might* be necessary if it turns out we see more of this kind of silly tooling."

If you've read this far and don't understand what's happening, please allow me, a failed CS minor, to offer a quick explanation: Tabs Versus Spaces will never be truly resolved, codified, or set right by standards, and the energy spent on the issue over time could, if harnessed, likely power one or more small nations. Still, the Linux kernel has its own coding style, and it directly cites "K&R," or Kernighan & Ritchie, the authors of the coding bible The C Programming Language, which is a tabs book. If you are submitting kernel code, it had better use tabs (eight-character tabs, ideally, though that is tied in part to teletype and line-printer history).

Read 4 remaining paragraphs | Comments

Attackers are pummeling networks around the world with millions of login attempts

Par : Dan Goodin
Attackers are pummeling networks around the world with millions of login attempts

Enlarge (credit: Matejmo | Getty Images)

Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s indiscriminately assailing networks with login attempts aimed at gaining unauthorized access to VPN, SSH, and web application accounts.

The login attempts use both generic usernames and valid usernames targeted at specific organizations. Cisco included a list of more than 2,000 usernames and almost 100 passwords used in the attacks, along with nearly 4,000 IP addresses sending the login traffic. The IP addresses appear to originate from TOR exit nodes and other anonymizing tunnels and proxies. The attacks appear to be indiscriminate and opportunistic rather than aimed at a particular region or industry.

“Depending on the target environment, successful attacks of this type may lead to unauthorized network access, account lockouts, or denial-of-service conditions,” Talos researchers wrote Tuesday. “The traffic related to these attacks has increased with time and is likely to continue to rise.”

Read 9 remaining paragraphs | Comments

L’Hôpital de Cannes victime d’une cyberattaque

L'hôpital Simone Veil à Cannes est actuellement touché par une cyberattaque. En conséquence, les interventions non urgentes ont été différées et une cellule de crise a été mise en place....

Loi italienne : restreindre le partage en ligne de la vie des enfants

L'Italie envisage de limiter le partage en ligne de la vie des enfants à travers une nouvelle législation, inspirée par des préoccupations croissantes concernant la vie privée des jeunes sur les réseaux sociaux....

Framework’s software and firmware have been a mess, but it’s working on them

The Framework Laptop 13.

Enlarge / The Framework Laptop 13. (credit: Andrew Cunningham)

Since Framework showed off its first prototypes in February 2021, we've generally been fans of the company's modular, repairable, upgradeable laptops.

Not that the company's hardware releases to date have been perfect—each Framework Laptop 13 model has had quirks and flaws that range from minor to quite significant, and the Laptop 16's upsides struggle to balance its downsides. But the hardware mostly does a good job of functioning as a regular laptop while being much more tinkerer-friendly than your typical MacBook, XPS, or ThinkPad.

But even as it builds new upgrades for its systems, expands sales of refurbished and B-stock hardware as budget options, and promotes the re-use of its products via external enclosures, Framework has struggled with the other side of computing longevity and sustainability: providing up-to-date software.

Read 30 remaining paragraphs | Comments

Save $152 on This Intuitive Document Scanner for iPhone

Create high-quality scans right from your mobile device with the top-rated SwiftScan VIP, now just $48 for a lifetime subscription with coupon code ENJOY20.

Salesforce, d’actionnaire à propriétaire d’Informatica ?

Salesforce songerait à s'emparer d'Informatica après en avoir été un temps investisseur.

Change Healthcare faces another ransomware threat—and it looks credible

Par : WIRED
Medical Data Breach text write on keyboard isolated on laptop background

Enlarge (credit: iStock / Getty Images Plus)

For months, Change Healthcare has faced an immensely messy ransomware debacle that has left hundreds of pharmacies and medical practices across the United States unable to process claims. Now, thanks to an apparent dispute within the ransomware criminal ecosystem, it may have just become far messier still.

In March, the ransomware group AlphV, which had claimed credit for encrypting Change Healthcare’s network and threatened to leak reams of the company’s sensitive health care data, received a $22 million payment—evidence, publicly captured on bitcoin’s blockchain, that Change Healthcare had very likely caved to its tormentors’ ransom demand, though the company has yet to confirm that it paid. But in a new definition of a worst-case ransomware, a different ransomware group claims to be holding Change Healthcare’s stolen data and is demanding a payment of its own.

Read 6 remaining paragraphs | Comments

4 films sur la musique à voir sur Netflix

Pour garder le rythme en toutes circonstances, voici 4 films musicaux disponibles sur Netflix : Rocketman, Maestro, Angèle ainsi que Tick, Tick… Boom !.

“Highly capable” hackers root corporate networks by exploiting firewall 0-day

Par : Dan Goodin
The word ZERO-DAY is hidden amidst a screen filled with ones and zeroes.

Enlarge (credit: Getty Images)

Highly capable hackers are rooting multiple corporate networks by exploiting a maximum-severity zero-day vulnerability in a firewall product from Palo Alto Networks, researchers said Friday.

The vulnerability, which has been under active exploitation for at least two weeks now, allows the hackers with no authentication to execute malicious code with root privileges, the highest possible level of system access, researchers said. The extent of the compromise, along with the ease of exploitation, has earned the CVE-2024-3400 vulnerability the maximum severity rating of 10.0. The ongoing attacks are the latest in a rash of attacks aimed at firewalls, VPNs, and file-transfer appliances, which are popular targets because of their wealth of vulnerabilities and direct pipeline into the most sensitive parts of a network.

“Highly capable” UTA0218 likely to be joined by others

The zero-day is present in PAN-OS 10.2, PAN-OS 11.0, and/or PAN-OS 11.1 firewalls when they are configured to use both the GlobalProtect gateway and device telemetry. Palo Alto Networks has yet to patch the vulnerability but is urging affected customers to follow the workaround and mitigation guidance provided here. The advice includes enabling Threat ID 95187 for those with subscriptions to the company’s Threat Prevention service and ensuring vulnerability protection has been applied to their GlobalProtect interface. When that’s not possible, customers should temporarily disable telemetry until a patch is available.

Read 11 remaining paragraphs | Comments

Words are flowing out like endless rain: Recapping a busy week of LLM news

An image of a boy amazed by flying letters.

Enlarge / An image of a boy amazed by flying letters. (credit: Getty Images)

Some weeks in AI news are eerily quiet, but during others, getting a grip on the week's events feels like trying to hold back the tide. This week has seen three notable large language model (LLM) releases: Google Gemini Pro 1.5 hit general availability with a free tier, OpenAI shipped a new version of GPT-4 Turbo, and Mistral released a new openly licensed LLM, Mixtral 8x22B. All three of those launches happened within 24 hours starting on Tuesday.

With the help of software engineer and independent AI researcher Simon Willison (who also wrote about this week's hectic LLM launches on his own blog), we'll briefly cover each of the three major events in roughly chronological order, then dig into some additional AI happenings this week.

Gemini Pro 1.5 general release

(credit: Google)

On Tuesday morning Pacific time, Google announced that its Gemini 1.5 Pro model (which we first covered in February) is now available in 180-plus countries, excluding Europe, via the Gemini API in a public preview. This is Google's most powerful public LLM so far, and it's available in a free tier that permits up to 50 requests a day.

Read 14 remaining paragraphs | Comments

Aujourd’hui, il est possible de mettre la main sur un TV QLED de 50 pouces pour moins de 400 €

[Deal du Jour] Le fabricant TCL propose de nombreux téléviseurs qui n'ont pas à rougir de la concurrence, et possèdent de plus un très bon rapport qualité/prix. Ce modèle QLED de 50 pouces revient à moins de 400 € en promotion.

Après Irish Wish, 3 films romantiques à voir sur Netflix

Pour plonger dans un océan de bons sentiments et d’histoires d’amour qui finissent bien, voici 4 romances à voir sur Netflix : Irish Wish, Mon inconnue, Prise au jeu, ainsi que Toi chez moi et vice versa.

German state gov. ditching Windows for Linux, 30K workers migrating

many penguins

Enlarge (credit: Getty)

Schleswig-Holstein, one of Germany’s 16 states, on Wednesday confirmed plans to move tens of thousands of systems from Microsoft Windows to Linux. The announcement follows previously established plans to migrate the state government off Microsoft Office in favor of open source LibreOffice.

As spotted by The Document Foundation, the government has apparently finished its pilot run of LibreOffice and is now announcing plans to expand to more open source offerings.

In 2021, the state government announced plans to move 25,000 computers to LibreOffice by 2026. At the time, Schleswig-Holstein said it had already been testing LibreOffice for two years.

Read 19 remaining paragraphs | Comments

Ivanti CEO pledges to “fundamentally transform” its hard-hit security model

Red unlocked icon amidst similar blue icons

Enlarge (credit: Getty Images)

Ivanti, the remote-access company whose remote-access products have been battered by severe exploits in recent months, has pledged a "new era," one that "fundamentally transforms the Ivanti security operating model" backed by "a significant investment" and full board support.

CEO Jeff Abbott's open letter promises to revamp "core engineering, security, and vulnerability management," make all products "secure by design," formalize cyber-defense agency partnerships, and "sharing information and learning with our customers." Among the details is the company's promise to improve search abilities in Ivanti's security resources and documentation portal, "powered by AI," and an "Interactive Voice Response system" for routing calls and alerting customers about security issues, also "AI-powered."

Ivanti CEO Jeff Abbott addresses the company's "broad shift" in its security model.

Ivanti and Abbott seem to have been working on this presentation for a while, so it's unlikely they could have known it would arrive just days after four new vulnerabilities were disclosed for its Connect Secure and Policy Secure gateway products, two of them rated for high severity. Those vulnerabilities came two weeks after two other vulnerabilities, rated critical, with remote code execution. And those followed "a three-week spree of non-stop exploitation" in early February, one that left security directors scrambling to patch and restore services or, as federal civilian agencies did, rebuild their servers from scratch.

Read 4 remaining paragraphs | Comments

Besoin d’un TV polyvalent pour les films/séries et les jeux vidéo ? Ce Mini LED de 55 pouces est en promotion

[Deal du Jour] TCL propose une grande gamme de téléviseurs avec de bonnes fiches techniques et un bon rapport qualité/prix. Ce modèle Mini LED polyvalent de 55 pouces, déjà à un bon prix, est encore plus intéressant en promotion.

Fake AI law firms are sending fake DMCA threats to generate fake SEO gains

Face composed of many pixellated squares, joining together

Enlarge / A person made of many parts, similar to the attorney who handles both severe criminal law and copyright takedowns for an Arizona law firm. (credit: Getty Images)

If you run a personal or hobby website, getting a copyright notice from a law firm about an image on your site can trigger some fast-acting panic. As someone who has paid to settle a news service-licensing issue before, I can empathize with anybody who wants to make this kind of thing go away.

Which is why a new kind of angle-on-an-angle scheme can seem both obvious to spot and likely effective. Ernie Smith, the prolific, ever-curious writer behind the newsletter Tedium, received a "DMCA Copyright Infringement Notice" in late March from "Commonwealth Legal," representing the "Intellectual Property division" of Tech4Gods.

The issue was with a photo of a keyfob from legitimate photo service Unsplash used in service of a post about a strange Uber ride Smith once took. As Smith detailed in a Mastodon thread, the purported firm needed him to "add a credit to our client immediately" through a link to Tech4Gods, and said it should be "addressed in the next five business days." Removing the image "does not conclude the matter," and should Smith not have taken action, the putative firm would have to "activate" its case, relying on DMCA 512(c) (which, in many readings, actually does grant relief should a website owner, unaware of infringing material, "act expeditiously to remove" said material). The email unhelpfully points to the main page of the Internet Archive so that Smith might review "past usage records."

Read 7 remaining paragraphs | Comments

AI hype invades Taco Bell and Pizza Hut

A pizza hut sign in London, England.

Enlarge (credit: Getty Images)

Depending on who you ask about AI (and how you define it), the technology may or may not be useful, but one thing is for certain: AI hype is dominating corporate marketing these days—even in fast food. According to a report in The Wall Street Journal, corporate fast food giant Yum Brands is embracing an "AI-first mentality" across its restaurant chains, including Taco Bell, Pizza Hut, KFC, and Habit Burger Grill. The company's chief digital and technology officer, Joe Park, told the WSJ that AI will shape nearly every aspect of how these restaurants operate.

"Our vision of [quick-service restaurants] is that an AI-first mentality works every step of the way," Park said in an interview with the outlet. "If you think about the major journeys within a restaurant that can be AI-powered, we believe it’s endless."

As we've discussed in the past, artificial intelligence is a nebulous term. It can mean many different things depending on the context, including computer-controlled ghosts in Pac-Man, algorithms that play checkers, or large language models that give terrible advice on major city websites. But most of all in this tech climate, it means money, because even talking about AI tends to make corporate share prices go up.

Read 6 remaining paragraphs | Comments

Microsoft blamed for “a cascade of security failures” in Exchange breach report

Microsoft logo on a wide sign

Enlarge (credit: Getty Images)

A federal Cyber Safety Review Board has issued its report on what led to last summer's capture of hundreds of thousands of emails by Chinese hackers from cloud customers, including federal agencies. It cites "a cascade of security failures at Microsoft" and finds that "Microsoft's security culture was inadequate" and needs to adjust to a "new normal" of cloud provider targeting.

The report, mandated by President Biden in the wake of the far-reaching intrusion, details the steps that Microsoft took before, during, and after the breach and in each case finds critical failure. The breach was "preventable," even though it cites Microsoft as not knowing precisely how Storm-0558, a "hacking group assessed to be affiliated with the People's Republic of China," got in.

"Throughout this review, the board identified a series of Microsoft operational and strategic decisions that collectively points to a corporate culture that deprioritized both enterprise security investments and rigorous risk management," the report reads.

Read 15 remaining paragraphs | Comments

TSMC “still assessing” chipmaking facilities after 7.4-magnitude quake hits Taiwan

TSMC's headquarters, seen here, are in Hsinchu, Taiwan.

Enlarge / TSMC's headquarters, seen here, are in Hsinchu, Taiwan. (credit: Sam Yeh via Getty Images)

Chipmaking operations at Taiwan Semiconductor Manufacturing Co. (TSMC) were briefly paused today following a 7.4-magnitude earthquake that hit Taiwan, according to a company statement provided to Bloomberg and others.

TSMC says that workers were evacuated as part of its earthquake safety protocols and that they have already returned to work. Bloomberg reports that the company is still "examining impact" to its operations, but it "expects to resume production overnight."

The quake's epicenter was on Taiwain's east coast and has prompted tsunami warnings in Japan, China, and the Philippines, according to The New York Times. The quake was followed by a long series of over 200 aftershocks, including one 6.5-magnitude aftershock. It's the strongest earthquake to affect Taiwan since the 7.7-magnitude Jiji earthquake in 1999. As of this writing, the NYT reports that at least nine people have died, and 1,011 have reported injuries.

Read 4 remaining paragraphs | Comments

The fine art of human prompt engineering: How to talk to a person like ChatGPT

A person talking to friends.

Enlarge / With these tips, you too can prompt people successfully.

In a break from our normal practice, Ars is publishing this helpful guide to knowing how to prompt the "human brain," should you encounter one during your daily routine.

While AI assistants like ChatGPT have taken the world by storm, a growing body of research shows that it's also possible to generate useful outputs from what might be called "human language models," or people. Much like large language models (LLMs) in AI, HLMs have the ability to take information you provide and transform it into meaningful responses—if you know how to craft effective instructions, called "prompts."

Human prompt engineering is an ancient art form dating at least back to Aristotle's time, and it also became widely popular through books published in the modern era before the advent of computers.

Read 36 remaining paragraphs | Comments

Le modèle 65 pouces du plus beau des téléviseurs baisse son prix de plus de 500 €

[Deal du jour] The Frame de Samsung est un téléviseur pour celles et ceux qui n'aiment pas avoir un gros rectangle noir dans leur salon. Son apparence de tableau permet en effet d’afficher une œuvre d’art lorsque vous ne l'utilisez pas. Le grand modèle 65 pouces est actuellement en promotion.

7 animés cultes comme Spy x Family à voir sur Netflix

Le catalogue Netflix regorge de séries indispensables, dont de nombreux animés. En voici 7 à découvrir en streaming : Spy x Family, Naruto, GTO, Avatar, le dernier maître de l'air, Hunter x Hunter, Demon Slayer ainsi qu’Assassination Classroom.

Missouri county declares state of emergency amid suspected ransomware attack

Par : Dan Goodin
Downtown Kansas City, Missouri, which is part of Jackson County.

Enlarge / Downtown Kansas City, Missouri, which is part of Jackson County. (credit: Eric Rogers)

Jackson County, Missouri, has declared a state of emergency and closed key offices indefinitely as it responds to what officials believe is a ransomware attack that has made some of its IT systems inoperable.

"Jackson County has identified significant disruptions within its IT systems, potentially attributable to a ransomware attack," officials wrote Tuesday. "Early indications suggest operational inconsistencies across its digital infrastructure and certain systems have been rendered inoperative while others continue to function as normal."

The systems confirmed inoperable include tax and online property payments, issuance of marriage licenses, and inmate searches. In response, the Assessment, Collection and Recorder of Deeds offices at all county locations are closed until further notice.

Read 10 remaining paragraphs | Comments

Billie Eilish, Pearl Jam, 200 artists say AI poses existential threat to their livelihoods

Billie Eilish attends the 2024 Vanity Fair Oscar Party hosted by Radhika Jones at the Wallis Annenberg Center for the Performing Arts on March 10, 2024 in Beverly Hills, California.

Enlarge / Billie Eilish attends the 2024 Vanity Fair Oscar Party hosted by Radhika Jones at the Wallis Annenberg Center for the Performing Arts on March 10, 2024, in Beverly Hills, California. (credit: Getty Images)

On Tuesday, the Artist Rights Alliance (ARA) announced an open letter critical of AI signed by over 200 musical artists, including Pearl Jam, Nicki Minaj, Billie Eilish, Stevie Wonder, Elvis Costello, and the estate of Frank Sinatra. In the letter, the artists call on AI developers, technology companies, platforms, and digital music services to stop using AI to "infringe upon and devalue the rights of human artists." A tweet from the ARA added that AI poses an "existential threat" to their art.

Visual artists began protesting the advent of generative AI after the rise of the first mainstream AI image generators in 2022, and considering that generative AI research has since been undertaken for other forms of creative media, we have seen that protest extend to professionals in other creative domains, such as writers, actors, filmmakers—and now musicians.

"When used irresponsibly, AI poses enormous threats to our ability to protect our privacy, our identities, our music and our livelihoods," the open letter states. It alleges that some of the "biggest and most powerful" companies (unnamed in the letter) are using the work of artists without permission to train AI models, with the aim of replacing human artists with AI-created content.

Read 10 remaining paragraphs | Comments

❌