• WWW.WIRED.COM
    How Fans Saved Sexypedia From Being Erased From the Internet
    The wiki paid homage to the Tumblr Sexyman phenomenon. After hosting site Fandom deleted it, fans scrambled to collect its archive and find a new home.
    0 Commentaires 0 Parts 3 Vue
  • WWW.NYTIMES.COM
    Physicist Who Made Superconductor Claims Exits University of Rochester
    Journals had retracted papers on superconductors that worked at room temperature and materials science that involved Ranga Dias.
    0 Commentaires 0 Parts 57 Vue
  • WWW.NYTIMES.COM
    Severing of Baltic Sea Cables Was Sabotage, Germany Says
    Germanys defense minister said damage to two fiber-optic cables on the sea floor appeared deliberate, but a culprit was not known.
    0 Commentaires 0 Parts 57 Vue
  • WWW.MACWORLD.COM
    PSA: Update your Mac right now to patch this actively exploited zero-day flaw
    MacworldAhead of the eagerly anticipated macOS 15.2 update, Apple on Tuesday released the macOS Sequoia 15.1.1 emergency update to patch a pair of scary vulnerabilities that have already been used in remote attacks.The two patches fix flaws in JavaScript and WebKit, and were both discovered by Googles Threat Analysis Group. Apple says both vulnerabilities may have been actively exploited on Intel-based Mac systems. Apple doesnt specifically say whether Apple silicon Macs are affected, but the same flaws were patched in iOS 18.1.1.JavaScriptCoreImpact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.Description: The issue was addressed with improved checks.WebKit Bugzilla: 283063CVE-2024-44308: Clment Lecigne and Benot Sevens of Googles Threat Analysis GroupWebKitImpact: Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.Description: A cookie management issue was addressed with improved state management.WebKit Bugzilla: 283095CVE-2024-44309: Clment Lecigne and Benot Sevens of Googles Threat Analysis GroupWhile the update is available for all Macs running macOS 15.1, there is no release for Macs running macOS Sonoma 14.7.1 or Ventura 13.7.1. Apple will likely patch the same vulnerabilities in those systems when macOS 15.2 arrives in December.To update your Mac, head over to System Settings, then General, Software Update, and select Update Now. Then follow the prompts to restart.
    0 Commentaires 0 Parts 27 Vue
  • WWW.MACWORLD.COM
    Download iOS 18.1.1 right now to fix these two critical security flaws
    MacworldThere are some iOS updates you can wait on, and there are some you should absolutely grab right away. This is one of the latter.Theres not much in the iOS 18.1.1 and iPadOS 18.1.1 update other than a pair of critical security vulnerabilities. But these are important updates to the JavaScript Core framework and WebKit that have been actively exploited already (on Intel-based Macs), according to Apple. The JavaScript vulnerability allows malicious web content to potentially execute arbitrary code, which is very bad. The WebKit flaw opens it up to cross-site scripting attacks.The Apple security page says that it is aware of both of them being used on Intel-based Macs, though that doesnt mean they only affect Intel-based Macs. If you want to trust in the security of your devices, update your iPhones and iPads right now.How to update to iOS 18.1.1 or iPadOS 18.1.1To update your device, follow these steps when connected to Wi-Fi:Open SettingsTap GeneralTap Software UpdateTap Update Now and follow the on-screen instructions.
    0 Commentaires 0 Parts 30 Vue
  • WWW.COMPUTERWORLD.COM
    CMA gives Googles $2B Anthropic investment the green light
    It took the UKs Competition and Markets Authority (CMA) less than a month to decide that there is no need to proceed further with a merger investigation after Googles purchase of a $2 billion stake in Anthropic.In a statement released on Oct. 24, the CMA indicated that it had obtained sufficient information to launch a preliminary investigation into the investment by Google, which was first announced last year and involved an initial sum of $500 million, with the remainder to be invested at a later date.The regulator was then scheduled to announce on Dec. 19 whether or not a more detailed phase 2 probe would take place, a move that ended up being fast forwarded.Scott Bickley, advisory fellow at Info-Tech Research Group, said when the initial investigation was announced that the probe sounded like a precautionary investigation across the board to me, primarily due to the fact that the CMA just recently approved Amazons Anthropic investment and partnership.Last March, Amazon announced it was investing $2.75 billion in Anthropic, bringing its total investment in the AI startup to $4 billion.As part of this partnership, Anthropic said it would use Amazon Web Services (AWS) as its main cloud provider for key operations, including AI safety research and the development of foundation models. Anthropic will also use AWS Trainium and Inferentia chips for building, training, and deploying future models.The CMA ruling on that investment was released on Sept. 27, and stated that the regulator does not believe that a relevant merger situation has been created.Phil Brunkard, executive counselor at Info-Tech Research Group, UK, said last month that both Google and Amazon are trying to compete with OpenAI, but its interesting that the CMA is focusing on Google when Amazon was just cleared, which raises some questions about consistency.While investigations do create some uncertainty, he said, Amazons clearance hints that Google could have a similar outcome. It seems the CMA is just being thorough, but these investments will likely continue.Brunkard said Tuesday he was not surprised by the ruling issued by the CMA, a non-ministerial department in the UK government that oversees business activities and flags potentially unfair competition.As I had mentioned previously, the CMA appeared to have been conducting a thorough review, and the latest report confirms they were satisfied after assessing their criteria, he said, adding, its essential that the CMA continues this consistent approach to ensure a fair and competitive marketplace.This kind of oversight, said Brunkard, is especially important in the exponentially evolving AI sector, where investments from tech giants like Google and Amazon have the potential to shape the market significantly.The CMA first launched an initial review into the market for AI systems in May 2023, and in a statement announced it would focus in on three key areas: how the competitive markets for foundation models and their use could evolve; the opportunities and risks these scenarios could bring for competition and consumer protection; and what guiding principles should be introduced to support competition and protect consumers as AI models develop.The organization said that the review is in line with the UK governments aim to support open, competitive markets.
    0 Commentaires 0 Parts 32 Vue
  • WWW.COMPUTERWORLD.COM
    Business Internet Security: Everything You Need to Consider
    Cyber-attacks can cost companies millions of dollars in lost revenue, legal fees, and recovery efforts. A security breach can severely tarnish a companys reputation and customer trust, making comprehensive internet security crucial for your small business.Investing in effective cybersecurity measures, especially regarding business internet and email security, acts as a shield against potential threats. These internet security solutions will protect your sensitive data and maintain the trust and safety of your clients and partners.Business Internet Security ChecklistBuilding a robust internet security strategy for your business may seem complex. To help you prioritize your cybersecurity threats and build a strong security solution, weve created an extensive checklist.1. Secure Your Network InfrastructureThe foundation of good internet security relies on a strong, secure network infrastructure. Your network is like your office; strong walls, locked doors, and vigilant guards keep it secure.Firewall Protection: Your First Line of DefenseFirewalls act as a barrier between your network and the outside world, blocking unauthorized access and malicious traffic. Think of it as your businesss security guard, carefully checking everyone who tries to enter. Firewalls can filter incoming and outgoing network traffic, enforcing your security rules through threat detection.Network Segmentation for Damage ControlImagine dividing your office into sections with different security clearancesthats what network segmentation does. By separating your network into smaller, isolated segments, you limit the reach of any potential breach.Even if one part of your network is compromised, the others remain safe, containing the damage and preventing a complete shutdown. Network segmentation is one of the most important security features a business can implement, even if you run a small business.2. Strengthen Your Devices and Access PointsEach device on your businesss network, from computers to mobile phones, represents a potential point of entry for hackers. Treat connected devices as a door to your Wi-Fi networks, ensuring each one is secure enough to protect the entire structure.Robust Passwords and Multi-Factor Authentication (MFA)Using weak or easily guessable passwords is like leaving your office unlocked, allowing online threats to gain access. Its an open invitation for trouble. Implement a strong password policy requiring employees to use complex passwords.You should encourage use of a password manager and implement multi-factor authentication (MFA) on all accounts to add another layer of protection. Strong passwords are one of the easiest ways to strengthen your business cybersecurity.Regular Software UpdatesSoftware updates often include vital security patches that address identified vulnerabilities. Delaying updates on your security software is like ignoring a leaky roof; if left unattended, it will only get worse. Patch management and regularly updating all software on all your devices, including antivirus software and operating systems, will minimize the risk of exploitation.Schedule updates and educate your employees about the importance of keeping their systems current. Regularly updating your software is one of the best free security solutions for your business.Endpoint Detection and Response (EDR) SolutionsEDR solutions are your networks security team that continuously monitors for suspicious activity. They then respond to this activity in real-time. Consider implementing an EDR solution that proactively detects, isolates, and responds to threats on individual devices within your network.3. Safeguarding Your DataYour businesss datacustomer information, financial records, and intellectual propertyis invaluable. Protecting your business data should be a top priority.Data EncryptionImagine losing access to all your essential documents; thats the chaos data loss can cause. Having secure backups of your crucial data ensures business continuity, even if a cyber incident occurs.Implement a secure data backup and recovery plan that includes regular backups, offsite storage, and disaster recovery testing. It is also vital to make sure your internet connection is secure before backing up data to the cloud.Implement a Data Loss Prevention (DLP) StrategyA robust DLP strategy helps detect, monitor, and prevent the unauthorized use or transmission of sensitive data. This strategy acts as a safeguard against both accidental data leaks and intentional theft.4. Educating Your WorkforceYour employees play a critical role in maintaining strong business internet security. Equip them with the knowledge and tools they need to act as an added layer of defense through security awareness training workshops. Human error causes many data leaks and security risks.Cybersecurity TrainingConduct regular and comprehensive cybersecurity training for all employees. Training should focus on common cyber threats like malicious sites, phishing scams, and social engineering attacks. It is also important to educate employees about security awareness and best practices for online security, especially on public networks.Password ManagementEncouraging the use of strong and unique passwords for all business accounts, such as Microsoft Exchange, is key to fortifying your first line of defense. Implement a business-wide password manager for secure storage and effortless access for your employees.Establish Clear Communication ChannelsEstablishing clear communication protocols for reporting security incidents and concerns helps you address issues more rapidly and effectively. This will help mitigate potential damage. Encourage employees to use these communication channels if they have accessed any inappropriate or malicious websites on company devices.Your Businesss Cybersecurity Journey Starts NowWith cyber threats continuing to evolve and become more sophisticated, businesses can never be complacent about internet security and protecting their private network and data.Taking proactive steps toward securing your digital infrastructure and safeguarding sensitive data is a critical business decision. Prioritizing robust internet security measures safeguards your small business and ensures youre well-equipped to face whatever kind of threat may come your way.While implementing these security measures may seem daunting, partnering with the right internet service provider like Optimum can give you a head start on your cybersecurity journey.Want Internet service with cybersecurity built in? Try Optimum Business Internet.Frequently Asked Questions About Business Internet SecurityHow can we protect IoT devices from becoming the entry point for security vulnerabilities into a network?IoT devices can be particularly vulnerable to security breaches, but several measures can help protect your network:Change default passwords immediately and use strong, unique passwords for each deviceRegularly update IoT device firmware to patch security vulnerabilitiesImplement network segmentation to isolate IoT devices on a separate network from critical business systemsDisable unnecessary features and ports that could be exploitedMonitor IoT device activity for unusual patterns that might indicate a breachUse a dedicated firewall for IoT devices to control their internet accessWhich security measure limits the access of outsiders to the internal network of a business?Firewalls are the primary security measure that controls external access to your internal network. They act as a barrier between your trusted internal network and untrusted external networks, like the internet. Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules, effectively limiting unauthorized access while allowing legitimate business communications to continue.Who in a business should be responsible for cybersecurity?While a designated IT security team or professional may lead cybersecurity efforts, security is everyones responsibility. Heres how responsibility can be distributed:Leadership: Set security policies and allocate resourcesIT Department: Implement and maintain security measuresDepartment Managers: Ensure compliance within their teamsEmployees: Follow security protocols and report suspicious activityExternal Partners: Comply with security requirements when accessing company resourcesHowever, if you dont have the benefit of a dedicated IT department, you can turn to Optimum for help and support.What can we do to stay on top of cybersecurity threats?Keeping strong cybersecurity is all about staying alert and taking proactive steps. Organizations should consider signing up for threat intelligence feeds to stay updated on new vulnerabilities and regularly assess their security to spot potential issues.Having an ongoing routine of software updates and security patches, along with ongoing employee training on security awareness, can help build a strong cybersecurity foundation. Many organizations also find it helpful to team up with cybersecurity experts who can offer advice on new threats and suggest the best security practices.Learn more about what Optimum can do for your business.
    0 Commentaires 0 Parts 31 Vue
  • WWW.TECHNOLOGYREVIEW.COM
    Roundtables: Whats Next for Mixed Reality: Glasses, Goggles, and More
    Recorded on November 19, 2024Whats Next for Mixed Reality: Glasses, Goggles, and More.Speakers: Mat Honan, Editor in Chief, and James ODonnell, AI hardware reporter.We are barreling toward the next big consumer device category: smart glasses. After years of trying, augmented-reality specs are at last a thing. Facebook recently showed off its Orion smart glasses, and Snap has introduced its second-generation pair. The Pentagon is also working on mixed-reality headsets that can be used on the battlefield. Hear fromMIT Technology Revieweditor in chief Mat Honan and AI hardware reporter James ODonnell for a conversation about where our AR experiences are heading.Related CoveragePalmer Luckey on the Pentagons future of mixed realityHeres what I made of Snaps new augmented-reality Spectacles.The coolest thing about smart glasses is not the AR. Its the AI.
    0 Commentaires 0 Parts 55 Vue
  • WWW.TECHNOLOGYREVIEW.COM
    The Download: police AI, and mixed realitys future
    This is todays edition ofThe Download,our weekday newsletter that provides a daily dose of whats going on in the world of technology.How the largest gathering of US police chiefs is talking about AIJames ODonnellThe International Association of Chiefs of Police bills itself as the largest gathering of its type in the United States. Leaders from many of the countrys 18,000 police departments and even some from abroad convene for product demos, discussions, parties, and awards.I went along last month to see how artificial intelligence was being discussed, and the message to police chiefs seemed crystal clear: If your department is slow to adopt AI, fix that now. From the expo hall, talks, and interviews, it seems theyre already enthusiastically heeding the call. Read the full story.This story is from The Algorithm, our weekly AI newsletter. Sign up to receive it in your inbox every Monday.Roundtables: Whats Next for Mixed Reality: Glasses, Goggles, and MoreAfter years of trying, augmented-reality specs are at last a thing.If you want to learn more about where AR experiences are heading, join our editor-in-chief Mat Honan and AI hardware reporter James ODonnell for a Roundtables conversation streamed online at 2pm ET/11am PT today. Its for subscribers only but good news: this week our subscriptions are half price. Dont miss out!Read more about mixed reality:+ We interviewed Palmer Luckey, founder of Oculus, about his plans to bring mixed-reality goggles to soldiers. Heres what he had to say.+ The coolest thing about smart glasses is not the AR. Its the AI.+ Snap has launched new augmented-reality Spectacles. Heres what we made of them.The must-readsIve combed the internet to find you todays most fun/important/scary/fascinating stories about technology.1 The FBI is investigating threats texted to Latino and LGBTQ+ peopleThey claim recipients will be deported or sent to a re-education camp. (WP$)+ ICE can already sidestep sanctuary city laws through data-sharing centers. (Wired$)+Trump has confirmed he plans to use the military for mass deportations.(NYT$)2 Chinese tech groups are building AI teams in Silicon ValleyDespite Washingtons best efforts to stymie their work. (FT$)+How a US ban on investing in Chinese startups could escalate under Trump.(Wired$)3 How Apple will cope with looming tariffsThe fact CEO Tim Cook already has a relationship with Trump will surely help. (Bloomberg$)4 Two undersea cables in the Baltic Sea have been disruptedIt looks like Russia is trying to interfere with global undersea infrastructure. (CNN)+A Russian spy ship had to be escorted out of the Irish Sea last weekend too.(The Guardian)5 An AI tool could help solve math problems humans are stuck onIts a good example of how blending human and machine intelligence can produce positive results. (New Scientist$)+This AI system makes human tutors better at teaching children math. (MIT Technology Review)6 Robots still struggle to match warehouse workers on some tasksFor all the advances robots have made, picking things up and moving them around remains a big challenge. (NYT$)+AI is poised to automate todays most mundane manual warehouse task.(MIT Technology Review)7 Perplexitys AI search engine can now buy stuff for youHow long until Google follows? (The Verge)8 Dozens of states are begging Congress to pass the kids online safety actIt has currently stalled in the House of Representatives due to censorship concerns. (The Verge)+Roblox is adding more controls to let parents set daily usage limits, block access to certain game genres, and more.(WSJ$)+ Why child safety bills are popping up all over the US9 The US Patent and Trademark Office banned staff from using generative AIIt cited security concerns plus the fact some tools exhibit bias, unpredictability, and malicious behavior. (Wired$)10 NASA might have killed life on MarsA new paper suggests that adding water to Martian soil might have been a bad move. (Quartz$)+ The ISS has been leaking air for 5 years, and engineers still cant agree why.(Ars Technica)Quote of the dayWe are bleeding cash as an industry.Thomas Laffont, co-founder of investment firm Coatue Management, says venture capital firms are struggling to make money amid a boom in AI investments, theWall Street Journalreports.The big storyHow mobile money supercharged Kenyas sports betting addictionBRIAN OTIENOApril 2022Mobile money has mostly been hugely beneficial for Kenyans. But it has also turbo-charged the countrys sports betting sector.Experts and public figures across the African continent are sounding the alarm over the growth of the sector increasingly loudly. Its produced tales of riches, but it has also broken families, consumed college tuitions, and even driven some to suicide. Read the full story.Jonathan W. RosenWe can still have nice thingsA place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or tweet em at me.)+ I just learned a pertinent word for this season:abscission.+ Only some people will getthis but if youre one of them, youll enjoy it.+ Why Late of the Pier were one of the mostexciting UK bandsof the 2000s.+ Whether you call them crisps or chips, theyre goddamndelicious.
    0 Commentaires 0 Parts 54 Vue
  • WWW.APPLE.COM
    Apple shares the most popular podcasts of 2024
    Today, Apple shared the most popular podcasts of 2024, with year-end charts localized for listeners in nearly 100 countries and regions.
    0 Commentaires 0 Parts 39 Vue