• Steve Jobs famous third device may not have much time left
    9to5mac.com
    When Steve Jobs first introduced the iPad, he called it a third category of device. One that would do certain things better than a laptop or smartphone. But what happens when foldable iPhones can operate as both smartphone and iPad equivalents? Does that third device disappear?Apples first foldable iPhone has been on my mind lately.Im especially excited by the idea of the iPhone Fold offering iPad mini-like utility.For years, I owned and loved the iPad mini. But a decade ago when I made the iPad Pro my full-time computer, I wasnt keen on the idea of using two iPads, and the iPad mini fell out of my life.My 13-inch M4 iPad Pro is basically a laptop though, since I keep it in the Magic Keyboard 24/7. So I dont benefit from the tablet part of the iPad very much.As a result, theres something I very much miss about my tiny iPad mini.It kind of gets to Steve Jobs core proposition when he first introduced the iPad.Back in 2010, on the heels of the iPhones early success, Jobs proposed that there was space for a third category of device that fits between the smartphone and laptop.This device was the iPad.Jobs demonstrated on stage how iPad was better than both the iPhone and Mac for certain tasks. For example, light web browsing, watching videos, and checking email.He made a compelling case for the iPads existence, but it hung on this argument.If theres going to be a third category of device, its going to have to be better at these kinds of tasks than a laptop or a smartphone, otherwise it has no reason for being.Over the years, many have questioned the iPads reason for being.Some users, like myself, rely on it as their main computer. For others, its a casual device for entertainment and light tasks.As iPhones have gotten larger, and Macs have gotten sleeker, the iPad has had to fight harder to set itself apart.And soon, with foldable iPhones, that could become a much tougher battle.The iPads not going anywhere any time soon.For starters, the first iPhone Fold will almost certainly be a niche device. Its ultra-premium price tagwhich some expect to hit $2,000will leave plenty of room for the $349 iPad to keep selling well.But what happens five years from now?If foldables prove successful, Apple will likely offer a lot more of them, and at much more appealing price points.Next years iPhone Fold is expected to have a 5.5-inch outer display and 7.8-inch inner one.This will make it moderately small compared to current iPhones when folded, and similar to an iPad mini when unfolded.But history has repeatedly shown that users love big iPhones.It wouldnt surprise me to see several different foldable iPhones in a variety of sizes in the years ahead, replacing more of Apples current iPhone lineup, but also potentially its iPads.Over time, the iPad may continue on as a niche, budget-friendly device. Or get its own ultra-premium, huge foldable version. But for most people? I suspect the need for an iPad will disappear, as the product gets absorbed into foldable iPhones.I am an artist. I paint on my big iPad. It has to have an absolutely flat, solid, smooth surface. Put a hinge in it and it wont. A folding phone will not ever replace an iPad for me. View all commentsWhen Steve Jobs was around, that third category of device truly did have value. But with folding smartphones, the game could change.I love the iPad, but we may soon enter the early stages of its logical end.Do you think foldable iPhones will eventually cause the iPad to fade away? Let us know in the comments.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comentários ·0 Compartilhamentos ·49 Visualizações
  • Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
    thehackernews.com
    Mar 31, 2025Ravie LakshmananData Theft / Website SecurityThreat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites.mu-plugins, short for must-use plugins, refers to plugins in a special directory ("wp-content/mu-plugins") that are automatically executed by WordPress without the need to enable them explicitly via the admin dashboard. This also makes the directory an ideal location for staging malware."This approach represents a concerning trend, as the mu-plugins (Must-Use plugins) are not listed in the standard WordPress plugin interface, making them less noticeable and easier for users to ignore during routine security checks," Sucuri researcher Puja Srivastava said in an analysis.In the incidents analyzed by the website security company, three different kinds of rogue PHP code have been discovered in the directory -"wp-content/mu-plugins/redirect.php," which redirects site visitors to an external malicious website"wp-content/mu-plugins/index.php," which offers web shell-like functionality, letting attackers execute arbitrary code by downloading a remote PHP script hosted on GitHub"wp-content/mu-plugins/custom-js-loader.php," which injects unwanted spam onto the infected website, likely with an intent to promote scams or manipulate SEO rankings, by replacing all images on the site with explicit content and hijacking outbound links to malicious sitesThe "redirect.php," Sucuri said, masquerades as a web browser update to deceive victims into installing malware that can steal data or drop additional payloads."The script includes a function that identifies whether the current visitor is a bot," Srivastava explained. "This allows the script to exclude search engine crawlers and prevent them from detecting the redirection behavior."The development comes as threat actors are continuing to use infected WordPress sites as staging grounds to trick website visitors into running malicious PowerShell commands on their Windows computers under the guise of a Google reCAPTCHA or Cloudflare CAPTCHA verification a prevalent tactic called ClickFix and deliver the Lumma Stealer malware.Hacked WordPress sites are also being used to deploy malicious JavaScript that can redirect visitors to unwanted third-party domains or act as a skimmer to siphon financial information entered on checkout pages.It's currently not known how the sites may have been breached, but the usual suspects are vulnerable plugins or themes, compromised admin credentials, and server misconfigurations.According to a new report from Patchstack, threat actors have routinely exploited four different security vulnerabilities since the start of the year -CVE-2024-27956 (CVSS score: 9.9) - An unauthenticated arbitrary SQL execution vulnerability in WordPress Automatic Plugin - AI content generator and auto poster pluginCVE- 2024-25600 (CVSS score: 10.0) - An unauthenticated remote code execution vulnerability in Bricks themeCVE-2024-8353 (CVSS score: 10.0) - An unauthenticated PHP object injection to remote code execution vulnerability in GiveWP pluginCVE-2024-4345 (CVSS score: 10.0) - An unauthenticated arbitrary file upload vulnerability in Startklar Elementor Addons for WordPressTo mitigate the risks posed by these threats, it's essential that WordPress site owners keep plugins and themes up to date, routinely audit code for the presence of malware, enforce strong passwords, and deploy a web application firewall to malicious requests and prevent code injections.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comentários ·0 Compartilhamentos ·45 Visualizações
  • Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine
    thehackernews.com
    Mar 31, 2025Ravie LakshmananThreat Intelligence / MalwareEntities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT."The file names use Russian words related to the movement of troops in Ukraine as a lure," Cisco Talos researcher Guilherme Venere said in a report published last week. "The PowerShell downloader contacts geo-fenced servers located in Russia and Germany to download the second stage ZIP file containing the Remcos backdoor."The activity has been attributed with moderate confidence to a Russian hacking group known as Gamaredon, which is also tracked under the monikers Aqua Blizzard, Armageddon, Blue Otso, BlueAlpha, Hive0051, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, UAC-0010, UNC530, and Winterflounder. The threat actor, assessed to be affiliated with Russia's Federal Security Service (FSB), is known for its targeting of Ukrainian organizations for espionage and data theft. It's operational since at least 2013.The latest campaign is characterized by the distribution of Windows shortcut (LNK) files compressed inside ZIP archives, disguising them as Microsoft Office documents related to the ongoing Russo-Ukrainian war to trick recipients into opening them. It's believed these archives are sent via phishing emails.The links to Gamaredon stem from the use of two machines that were used in creating the malicious shortcut files and which were previously utilized by the threat actor for similar purposes.The LNK files come fitted with PowerShell code that's responsible for downloading and executing the next-stage payload cmdlet Get-Command, as well as fetching a decoy file that's displayed to the victim to keep up the ruse.The second stage is another ZIP archive, which contains a malicious DLL to be executed via a technique referred to as DLL side-loading. The DLL is a loader that decrypts and runs the final Remcos payload from encrypted files present within the archive.The disclosure comes as Silent Push detailed a phishing campaign that uses website lures to gather information against Russian individuals sympathetic to Ukraine. The activity is believed to be the work of either Russian Intelligence Services or a threat actor aligned with Russia.The campaign consists of four major phishing clusters, impersonating the U.S. Central Intelligence Agency (CIA), the Russian Volunteer Corps, Legion Liberty, and Hochuzhit "I Want to Live," a hotline for receiving appeals from Russian service members in Ukraine to surrender themselves to the Ukrainian Armed Forces.The phishing pages have been found to be hosted on a bulletproof hosting provider, Nybula LLC, with the threat actors relying on Google Forms and email responses to gather personal information, including their political views, bad habits, and physical fitness, from victims."All the campaigns [...] observed have had similar traits and shared a common objective: collecting personal information from site-visiting victims," Silent Push said. "These phishing honeypots are likely the work of either Russian Intelligence Services or a threat actor aligned to Russian interests."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comentários ·0 Compartilhamentos ·24 Visualizações
  • What Happens When AI Is Used as an Autonomous Weapon
    www.informationweek.com
    Lisa Morgan, Freelance WriterMarch 31, 20259 Min ReadAndrea Danti via Alamy StockThreat actors are using AI to launch more cyberattacks faster. Recently, theyve employed autonomous AI to raise the bar even further, putting more businesses and people at risk.And as more agentic models are rolled out, the malware threats will inevitably increase, putting CISOs and CIOs on alert to prepare.The increased throughput in malware is a real threat for organizations. So too is the phenomenon of deep fakes, automatically generated by AI from video clips online, or even from photographs, which are then used in advanced social engineering attacks, says Richard Watson, EY global and Asia-Pacific cybersecurity consulting leader. We are starting to see clients suffer these types of attacks. With agentic AI, the ability for malicious code to be produced without any human involvement becomes a real threat, Watson adds. We are already seeing deepfake technology evolve at an alarming rate, comparing deepfakes from six months ago with those of today, with a staggering improvement in authenticity, he says. As this continues, the ability to discern whether the image on the video screen is real or fake will become increasing harder, and proof of human will become even more critical.Autonomous AI is a serious threat to organizations across the globe, according to Doug Saylors, partner and cybersecurity practice lead at global technology research and advisory firm ISG. Related:As a new zero-day vulnerability is discovered, attackers [can] use AI to quickly develop multiple attack types and release them at scale, says Saylors. AI is also being used by attackers to analyze large scale cybersecurity protections and look for patterns that can be exploited, then developing the exploit, he adds. How AI Attacks Can Get WorseI believe it will get worse as GenAI models become more commonly available and the ability to train them quickly improves. Nation-state adversaries are using this technology today, but when it becomes available to a larger group of bad actors, it will be substantially more difficult to protect against, Saylors says. For example, common social engineering protections simply dont work on GenAI-produced attacks because they don't act like human attackers.Though malicious tools like FraudGPT have existed for a while, Mandy Andress, CISO at search AI company Elastic, warns the new GhostGPT AI model is a prime example of the tools that help cybercriminals generate code and create malware at scale. Like any emerging technology, the impacts of AI-generated code will require new skills for cybersecurity professionals, so organizations will need to invest in skilled teams and deeply understand their companys business model to balance risk decisions, says Andress.Related:The threat to enterprises is already substantial, according to Ben Colman, co-founder and CEO at deepfake and AI-generated media detection platform Reality Defender. Were seeing bad actors leverage AI to create highly convincing impersonations that bypass traditional security mechanisms at scale. AI voice cloning technology is enabling fraud at unprecedented levels, where attackers can convincingly impersonate executives in phone calls to authorize wire transfers or access sensitive information, Colman says. Meanwhile, deepfake videos are compromising verification processes that previously relied on visual confirmation, he adds. These threats are primarily coming from organized criminal networks and nation-state actors who recognize the asymmetric advantage AI offers. Theyre targeting communication channels first because theyre the foundation of trust in business operations.How Threats Are EvolvingAttackers are using AI capabilities to automate, scale, and disguise traditional attack methods. According to Casey Corcoran, field CISO at SHI company Stratascale, examples include creating more convincing phishing and social engineering attacks to automatically modify malware so that it is unique to each attack, thereby defeating signature-based detection.Related:As AI technology continues to advance, we are sure to see more evasive and adaptive attacks such as deepfake image and video impersonation, AI-guided automated complex attack vector chains, or even the ability to create financial and social profiles of target organizations and personnel at scale to target them more accurately and effectively for and with social engineering attacks, says Corcoran. An emerging threat is AI-enhanced botnets that will be able to coordinate attacks to challenge DDoS prevention and protection capabilities, he adds.How CIOs and CISOs Can Better Protect the OrganizationOrganizations need to embrace AI for Cyber, using AI particularly in threat detection and response, to identify anomalies and indicators of compromise, according to EY's Watson.New technologies should be deployed to monitor data in motion more closely, as well as to better classify data to enable it to be protected, says Watson. Organizations that have invested in security awareness and are moving accountability for certain cyber risks out of IT and into the business are the ones who stand to be better protected in the age of generative AI, he adds.As cybercriminals evolve their tactics, organizations must be adaptable, agile and ensure they are following security fundamentals.Security teams that have full visibility into their assets, enforce proper configurations, and stay up to date on patches can mitigate 90% of threats, says Elastics Andress. While it may seem contradictory, AI-powered tools can take this one step further, providing self-healing capabilities and helping security teams proactively address emerging risks.Reality Defenders Colman believes the best protection strategy is a layered defense that combines technological solutions with human judgment and organizational protocols.Critical communication channels need consistent verification methods, whether automated or manual, with clear escalation paths for suspicious interactions, says Colman. Security teams should establish processes that adapt to emerging threats and regularly test their resilience against new AI capabilities rather than relying on static defenses.Stratascales Corcoran says well-resourced organizations will be well-served by leveraging AI across vendor products and services to stitch telemetry and response together. They also need to focus on cyber hygiene. Organizations should ensure they protect their people and give them the tools, processes and training needed to combat social engineering traps, Corcoran says. "AI-enhanced automated vulnerability exploitation only works if there are vulnerabilities, he adds. Shoring up vulnerability and patch management programs, and pen-testing for unknown gaps will go a long way toward defending against these types of attacks.Finally, Corcoran recommends a zero-trust mindset that narrows the aperture of access any attack can achieve, regardless of the sophistication of AI-enabled tactics and techniques. ISGs Saylors recommends continuous vigilance of an organizations perimeter using attack surface management (ASM) platforms, and the adoption and maintenance of defense-in-depth strategies. Common Mistakes to AvoidOne big mistake is believing generative AI is nowhere in the organization yet, when employees are already using open-source models. Another is believing autonomous threats arent real.Companies often get a false sense of security because they have a SOC, for example, but if the technology in the SOC has not been refreshed in the last three years, the chances are its out of date and you are missing attacks, EYs Watson says. [You should] conduct a thorough capability review of your security operations function and identify the highest priority use cases for your organization to leverage AI in cyber defense."Over-reliance on point solutions, regardless of their capabilities, leads to blind spots where adversaries can exploit using AI-enhanced techniques.Defending against AI-based threats, like any other, requires a system of systems approach that involves integrating multiple independent threat detection, and response capabilities and processes to create more complex and capable defenses, says Corcoran. Organizations should have a risk and controls assessment done with an eye on AI-enhanced threats. An independent assessor who isnt bound to any technology or framework will be best positioned to help identify weaknesses in an organization's defenses and look at solutions for processes, and technology.Elastics Andress says companies often underestimate the severity of AI-enabled threats and dont invest in the proper tools or protocols to identify and protect against potential risks.Having the right guardrails in place and understanding the overall threat landscape, while also properly training employees, allows companies to anticipate and address threats before they impact the business, says Andress. Threats dont wait for companies to be ready. Leaders must be prepared with the proper defenses to identify and mitigate risks quickly. Security teams can [also] leverage GenAI, he adds. It gives us an ability to be proactive, better understand the content of our environments, and anticipate what threat actors can do.Aditya Saxena, founder at no-code chatbot builder Pmfm.ai,says organizations are unnecessarily creating vulnerabilities by relying more on AI generated code and implementing it without review.LLMs arent infallible, and we risk inadvertently introducing vulnerabilities that could take down systems at scale, says Saxena. Additionally, bad actors could train models around subtly exploiting vulnerabilities. For example, we could have a version of DeepSeek that intentionally corrupts the code while still making it work, he adds.Up until last year, we were mostly using AI as an assistant to speed up the work, but lately, as agentic AI becomes more common, we could be inadvertently trusting software, like Devin, with sensitive information, such as API keys or company secrets, to take over end-to-end development and deployment processes.The biggest mistake companies can make is underestimating the evolving nature of threats or relying on outdated security measures, says Amit Chadha, CEO at L&T Technology Services (LTTS).Our advice is clear: Adopt a proactive and cybersecure AI-driven approach, invest in critical infrastructure and threat intelligence tools, and collaborate with trusted technology partners to build a resilient digital ecosystem, says Chadha. But the most important factor is the human element as [most] cybercrimes happen due to human errors and mistakes. So workshops must be conducted for all employees to educate them on cybercrime prevention and ensuring they do not become the unwitting agents of a leak or data breach. In this case prevention is the cure. ISGs Saylors warns that organizations are not prioritizing basic maintenance of their cybersecurity stack and taking basic precautions, such as running VM scans and patching at least critical issues immediately.We have seen multiple examples of very large companies that are months to years behind on patching because the apps team wont let us do it, or they are running N-3 versions of software because it is too hard to upgrade, says Saylors. Those are the organizations that have already been hacked. AI attacks will just increase the speed and severity of the damage if they become a serious target.He also thinks boards of directors should be educated on the continually advancing nature of cyberattacks being generated by AI and GenAI platforms. The board of directors has the responsibility to prioritize funding for cyber transformation, says Saylors. Start a quantum resiliency plan now, and ensure you have multiple copies of immutable backups.About the AuthorLisa MorganFreelance WriterLisa Morgan is a freelance writer who covers business and IT strategy and emergingtechnology for InformationWeek. She has contributed articles, reports, and other types of content to many technology, business, and mainstream publications and sites including tech pubs, The Washington Post and The Economist Intelligence Unit. Frequent areas of coverage include AI, analytics, cloud, cybersecurity, mobility, software development, and emerging cultural issues affecting the C-suite.See more from Lisa MorganWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 Comentários ·0 Compartilhamentos ·22 Visualizações
  • Why Isnt Spider-Man in Avengers: Doomsday?
    screencrush.com
    Marvel has announced more than two dozen members of theAvengers: Doomsdaycast. And yet out of all those names, the one we were most confidentwould be in there Tom Hollands Spider-Man was MIA. So where is Spider-Man? Hes Marvels most popular superhero and Holland is one of Marvels biggest stars. So why isnt he inAvengers: Doomsday?In our latest MCU video, well discuss this very surprising absence. Is Spider-Man being saved forSecret Wars? Will he make a surprise cameo in Doomsday?Will the upcomingSpider-Man 4 explain his absence (and set up a more important role inSecret Wars)?Has Tom Holland simply not finalized his contract for the film yet and are we just getting way too ahead of ourselves? Watch the video below to see all the potential theories:READ MORE: The Worst Marvel Comics EverIf you liked that video on why Spider-Man isnt among the announced cast of Avengers: Doomsday, check out more of our videos below, including one on what we can expect from every member of the Avengers: Doomsday cast, and why RDJr. shushed everyone, one on how the Marvel Cinematic Universes Multiverse Saga should have played out, and one on the potential for a secret X-Men movie from Marvel. Plus, theres tons more videos over atScreenCrushs YouTube channel. Be sure to subscribe to catch all our future episodes. Avengers: Doomsday is scheduled to open in theaters on May 1, 2026.Sign up for Disney+ here.Get our free mobile appEvery Marvel Cinematic Universe Movie, Ranked From Worst to BestIt started with Iron Man and its continued and expanded ever since. Its the Marvel Cinematic Universe, with 35 movies and counting. But whats the best and the worst? We ranked them all.
    0 Comentários ·0 Compartilhamentos ·29 Visualizações
  • Matthew Lillard Terrified to Make Scream Return
    screencrush.com
    Matthew Lillard is slightly terrified to return to the Scream franchise.The 55-year-old actor appeared in the original 1996 slasher as the villainous Stu Macher, AKA one of the Ghostfaces, and has now admitted he is somewhat dreading coming back to the series for Scream 7 because he doesnt want to screw up a legacy that [they] have.Speaking at 90s Con alongside his fellow Scream castmates David Arquette, Jamie Kennedy, Dermot Mulroney and Skeet Ulrich, Lillard said: I will say, I cant say anything about it, obviously. But I am very excited and slightly terrified to be back because all I can do is really screw up a legacy that we have.I could really suck, and so thats my fear. My fear is that I come back and sort of punish something that I could never have touched and been just fine. I hope I dont eff it up for everyone.ParamountParamountloading...READ MORE: EveryScreamFilm Ranked From Worst to BestWhile Lillard is set to return to the horror series in the 2026 movie, the actor previously revealed there was a version of Scream 3 in which his Stu Macher returned, despite the character meeting a grizzly end in the original film.The Five Nights At Freddys star explained to Vulture in 2022: I was supposed to do Scream 3. I got paid for 3. Not really well, but I ended up getting paid for something I didnt do because the idea was that Id be running high-school killers from jail.Look, its a horror movie! Crazy things happen all the time. Have you seen Friday the 13th? Jason comes back like Stu still could come back.In addition to Lillard, Scream 7, which is being directed by Kevin Williamson, will see the return of Neve Campbells Sidney Prescott, Courteney Coxs Gale Weathers, Scott Foleys Roman Bridger and reportedly even David Arquettes police officer Dewey Riley, who was brutally killed off in the 2022 revival.Alongside the returning stars, Scream 7 will bring a swathe of new actors into the series, including Joel McHale, Anna Camp, Celeste OConnor, Asa Germann, Mckenna Grace, Sam Rechner, Michelle Randolph and Jimmy Tatro.Get our free mobile app12 Pairs of Wildly Different Movies With the Exact Same TitleYou'll be very confused if you get any of these movies mixed up.Gallery Credit: Emma Stefansky
    0 Comentários ·0 Compartilhamentos ·29 Visualizações
  • The Download: generative AI therapy, and the future of 23andMes genetic data
    www.technologyreview.com
    This is today's edition ofThe Download,our weekday newsletter that provides a daily dose of what's going on in the world of technology. The first trial of generative AI therapy shows it might help with depression The first clinical trial of a generative AI therapy bot suggests it was as effective as human therapy for people with depression, anxiety, or risk for developing eating disorders. Even so, it doesnt give a go-ahead to the dozens of companies hyping such technologies while operating in a regulatory gray area. Read the full story. James O'Donnell How a bankruptcy judge can stop a genetic privacy disaster Keith Porcaro The fate of 15 million peoples genetic data rests in the hands of a bankruptcy judge now that 23andMe has filed for bankruptcy. But theres still a small chance of writing a better ending for usersand its a simple fix. Read the full story. The must-reads Ive combed the internet to find you todays most fun/important/scary/fascinating stories about technology. 1 Meet the online activists fighting back against ICE raids Their networks are warning migrants about ICE officer hotspots in major cities. (WP $)+ Noncitizens are growing increasingly anxious. (NPR)2 US health experts were ordered to bury a measles forecastThe assessment warned the risk of catching the virus was high in areas with lower vaccination rates. (ProPublica) + The former US covid chief has called the outbreak wholly preventable. (Politico)+ How measuring vaccine hesitancy could help health professionals tackle it. (MIT Technology Review)3 Donald Trump is confident a TikTok deal is forthcoming Ahead of the impending deadline on Saturday. (Reuters)4 Chinas efforts to clean up air pollution are accelerating global warming Its dirty air had been inadvertently cooling the planet. (New Scientist $)+ Whos to blame for climate change? Its surprisingly complicated. (MIT Technology Review)5 Brands are spending small amounts on X to appease Elon Musk Theyre doing what they can to avoid triggering a public fallout with the billionaire. (FT $)+ Musks X has a new ownerits, err, Musks xAI. (CNBC)The Oxevision system remotely tracks patients breathing and heart rates. (6 Campaigners are calling to pause a mental health inpatient monitoring systemThe Guardian)+ This AI-powered black box could make surgery safer. (MIT Technology Review)7 The US and China are locked in a race to produce the first useful humanoid robotThe first to succeed will dominate the future of many labor-intensive industries. (WSJ $) + Beijing is treating humanoid robots as a major future industry. (WP $)8 Data center operators are inking solar power dealsIts a proven, clean technology that is relatively low-cost. (TechCrunch) + The cost of AI services is dropping. (The Information $)+ Why the US is still trying to make mirror-magnified solar energy work. (MIT Technology Review) 9 H&M plans to create digital replicas of its models Which means the retailer could outsource entire photoshoots to AI. (NYT $)+ The metaverse fashion stylists are here. (MIT Technology Review)10 What its like to drive a Tesla Cybertruck in Washington DC Expect a whole lot of abuse. (The Atlantic $)+ Protestors are gathering at Tesla showrooms across America. (Insider $)Quote of the day Viruses dont need a passport. Dr William Schaffner, an infectious disease expert at Vanderbilt University Medical Center, warns CNN that the US measles outbreak could spread widely to other countries. The big story Marseilles battle against the surveillance state June 2022 Across the world, video cameras have become an accepted feature of urban life. Many cities in China now have dense networks of them, and London and New Delhi arent far behind. Now France is playing catch-up.Concerns have been raised throughout the country. But the surveillance rollout has met special resistance in Marseille, Frances second-biggest city.Its unsurprising, perhaps, that activists are fighting back against the cameras, highlighting the surveillance systems overreach and underperformance. But are they succeeding? Read the full story.Fleur Macdonald We can still have nice things A place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or skeet 'em at me.) + The online pocket computer museum is exceptionally charming.+ Theres an entirely new cat color emerging, and scientists have finally worked out why.+ Experiencing Bluesky skeets posted in real time is a seriously trippy business.+ Never underestimate the power of a good deed.
    0 Comentários ·0 Compartilhamentos ·28 Visualizações
  • BIG Architecture Festival will be held on May 2223, 2025 in Portoro, Slovenia
    worldarchitecture.org
    html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"The BIG Architecture Festival, recognized as one of the most impactful architectural events in South-East Europe, will bring together prominent figures in architecture and interior design from the region and beyond.The BIG Architecture Festival 2025 will take place on May 2223 at the stunning coastal venue of Grando, Obala 10 in Portoro, Slovenia.The festival provides a platform for forward-thinking professionals to talk about the future of the built environment, all while celebrating architectural excellence and innovation.MAA Architects founder Melike Altinisik, DataDrivenAEC founder Shicong Cao, CSWADI, China Southwest Architectural Design and Research Institute's Deputy Chief Architect Huang Huaihai, Liberec-based firm Mjlk architekti co-founders Jan Mach and Jan Vondrk, Austrian construction firm Lehm Ton Erde founder Martin Rauch, are among this year's speakers.This year's theme is Common Sense / Space / Responsibility in Architecture.Prominent architects and visionary thought leaders will engage in dynamic discussions centered on responsible, sustainable, and context-driven design principles. This carefully curated program will tackle urgent global challenges, including climate resilience, circular construction, adaptive reuse, and the ethical implications of AI in architectural practice, inspiring innovative solutions for a better future.The World Architecture Community is an official media partner of the 2025 BIG Architecture Festival.Read more about the event on WAC.The top image in the article courtesy of BIG Architecture Festival.> via BIG Architecture Festivalarchitecture event
    0 Comentários ·0 Compartilhamentos ·30 Visualizações
  • Apple's AI Doctor May See You in 2026
    www.cnet.com
    Apple is working on an AI-driven health coach that would push the company further into health data and wellness, according to reports.
    0 Comentários ·0 Compartilhamentos ·27 Visualizações
  • Doom: The Dark Ages Preview: Hands-On With a Heavy Metal Album-Turned-Shooter
    www.cnet.com
    The next action-packed FPS in the vaunted Doom franchise slows down the pace for a different flavor of gothic carnage.
    0 Comentários ·0 Compartilhamentos ·26 Visualizações