• WWW.FOXNEWS.COM
    Chinese hackers target US telecoms: What you need to know to protect your data
    Published December 10, 2024 10:00am EST close Chinese hackers tried to breach Trump, Vance phones: report Fox News correspondent David Spunt has more on the "sophisticated penetration" of several carriers on "Special Report." U.S. telecom giants are under constant attack from Chinese hackers. A federal investigation has uncovered a massive cyber espionage campaign by the Chinese government, targeting U.S. telecommunications networks to steal Americans' information. A top White House official confirmed that at least eight U.S. telecom companies have been affected by this hacking spree.To combat this, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) have released advice for telecom companies to help them detect and block the hackers while preventing future attacks. I break down the details of this Chinese hacking campaign and share tips on how to keep your data safe. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What you need to know about the China hacking campaignAccording to the FBI, hackers linked to Beijing have infiltrated the networks of "multiple" telecom companies, gaining access to customer call records and private communications of "a limited number of individuals." Since this is an espionage campaign, theyre not interested in the average Joes texts or call history. Instead, their targets are Americans involved in government and politics.The hackers also tried to copy "certain information that was subject to U.S. law enforcement requests pursuant to court orders," according to the FBI. This suggests they might have been attempting to breach programs like those under the Foreign Intelligence Surveillance Act, which allows U.S. spy agencies to monitor the communications of individuals suspected of working for foreign powers.Earlier this month, Deputy National Security Advisor Anne Neuberger shared new details about the scale of the Chinese hacking campaign. According to Neuberger, the U.S. believes the hackers managed to access communications from senior government officials and prominent political figures.She explained that while the hackers were focused on a relatively small group of individuals, a limited number of Americans phone calls and texts were compromised. Neuberger also mentioned that the affected telecom companies are working to address the breaches, but none have been able to completely remove the Chinese hackers from their networks yet.This campaign is believed to have started a year or two ago, according to theAssociated Press. Authorities suspect a Chinese hacking group known as Salt Typhoon to be behind the operation. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)How are hackers able to access sensitive information?Salt Typhoon managed to access call records and private communications by exploiting decades-old back doors in major telecom providers, including AT&T and Verizon, experts believe."The irony here is that the back doors exploited by the Chinese are, in fact, the same back doors that are utilized by federal law enforcement for purposes of conducting legal surveillance," John Ackerly, CEO and co-founder of Virtru, a data-centric security company, told CyberGuy.The vulnerabilities are a result of the Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates back doors in critical telecommunications infrastructure. CALEA enables law enforcement agencies to access phone records and metadata, including facilitating wiretaps, as part of authorized investigations."The problem with back doors is simple. They're not selective. A back door created for law enforcement is, by its very nature, a vulnerability in the system. And vulnerabilities, once they exist, can be exploited by anyone who discovers them. Both good guys and bad guys can enter back doors," said Ackerly, who previously served as a White House technology adviser. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)The solution is end-to-end encryptionTo protect private conversations and phone calls, cybersecurity experts recommend using end-to-end encrypted platforms. Jeff Greene, executive assistant director of cybersecurity at CISA, urged Americans to prioritize encrypted communication tools."Use your encrypted communications where you have it," Greene advised, emphasizing the importance of secure platforms. He added, "We definitely need to do that, kind of look at what it means long term, how we secure our networks."An FBI official warned that citizens should be "using a cellphone that automatically receives timely operating system updates, responsibly managed encryption and phishing resistant MFA for email, social media and collaboration tool accounts."However, cybersecurity experts warn that these measures are not foolproof. The term "responsibly managed encryption" is problematic, as it intentionally leaves room for "lawful access," such as the back doors required by CALEA."Its clear that encryption with back doors is not actually responsible at all," Ackerly said. "Its time for the U.S. government to acknowledge and support end-to-end encryption as a stronger protection against foreign adversaries." Illustration of a cybersecurity expert at work (Kurt "CyberGuy" Knutsson)10 ways to protect your personal information against cybersecurity threatsNow that we've discussed the threat, lets take a look at the solutions. Here are 10 ways you can keep your personal information safe.1) Use end-to-end encrypted platforms:For private communications, prioritize platforms that offer end-to-end encryption. This ensures that only you and the intended recipient can access your messages or calls, preventing unauthorized access by hackers or other third parties."Anyone can take control of their own data and protect themselves from security threats by using applications that provide end-to-end encryption. Whether youre emailing, sending messages and files or video chatting, the only way to truly ensure your data is safe from bad actors is to encrypt it as it travels," Ackerly said. "Choose an app or tool that is easy to use, so that you will actually use it."For texting, consider apps likeSignal or WhatsApp. For email services, look for ones that offer easy-to-use end-to-end encryption. These platforms ensure that your private communications remain secure from unauthorized access.See my review of the best secure and private email services here.2) Keep your device's operating system updated:Make sure your cellphone and other devices automatically receive timely operating system updates. These updates often include important security patches that protect against new vulnerabilities exploited by hackers. For reference, see my guide onhow to keep all your devices updated.3) Enable two-factor authentication (2FA):Set up phishing-resistant2FA on your email, social media and collaboration tool accounts. This adds an extra layer of protection, requiring more than just a password to access your accounts, making it harder for cybercriminals to steal your information.4) Use strong antivirus software: Be aware of phishing techniques and remain skeptical of suspicious links, emails or phone calls asking for personal information. Cybercriminals often use these methods to gain access to your sensitive data.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5) Encrypt sensitive data:Encrypt data on USB drives, SIM cards and laptops to protect information if devices are lost or stolen. Also, be sure to password-protect your sensitive files or folders by followingthese steps.6) Implement strong password practices: Use unique, complex passwords for each account and consider using apassword manager.7) Regularly backup your data: Backing up your data helps protect against data loss from ransomware or device failure. You'll want to back up yourmobile device,Mac andWindows computers.8) Be cautious with public Wi-Fi: Use aVPN (virtual private network) when connecting topublic Wi-Fi networks to encrypt your internet traffic. This makes it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies..9) Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach.Check out my top picks for data removal services here.10) Use identity theft protection: Identity theft protection services monitor your accounts for unusual activity, alert you to potential threats and can even assist in resolving issues if your data is compromised.See my tips and best picks on how to protect yourself from identity theft.Kurts key takeawayTheres no denying that the U.S. is facing a serious cyberattack that puts millions at risk. Whats even more concerning is that hackers continue to exploit telecom providers even after the issue has been made public. The government and the affected companies must prioritize addressing this threat and patching the back doors these cybercriminals are using. Were witnessing one of the largest intelligence compromises in U.S. history.Do you believe the current laws around encryption and lawful access are enough to protect your privacy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Комментарии 0 Поделились 66 Просмотры
  • WWW.FOXNEWS.COM
    How to delete multiple emails at once on iPhone
    Published December 10, 2024 6:00am EST close 'CyberGuy': How to delete multiple emails at once on iPhone Tech expert Kurt Knutsson shows iPhone users how to easily delete multiple emails and manage their inboxes to reduce digital clutter. Managing your inbox can quickly become a daunting task. Many of us find ourselves drowning in a sea of unread emails, making it challenging to stay organized. Dale from Lowell, Arizona, recently reached out with a common frustration:"My iPhone 13; How do I erase multiple emails from my inbox? Deleting each one individually is time consuming and tedious. Currently 1900 plus."Dont worry, Dale. You're not alone in this struggle. Let's dive into some easy steps to declutter your inbox. If you want to delete multiple emails at once on Android,here's how to do it. Mail app on iPhone (Kurt "CyberGuy" Knutsson)The Mail app method to delete multiple emails on iPhoneThe built-in Mail app on your iPhone 13 offers a straightforward way to delete multiple emails at once:Open theMail appNavigate toyour inbox and tap on itTapSelect in top-right cornerSelect theemails you want to delete by tapping thecircles next to them.For a quick selection, tap the first email, then slide your finger down the list.Once you've chosen your emails, tapTrash at the bottom right. Steps to delete emails in the iPhone Mail app (Kurt "CyberGuy" Knutsson)Bulk deletion: Tackling thousands of emails at once on iPhoneWhen faced with an overwhelming number of emails, try this method:Open theMail appNavigate toyour inbox and tap on itTapSelect in top-right cornerTapSelect All at top-leftHitTrashConfirm your decision by clickingTrash All Steps to bulk delete emails in the iPhone Mail app (Kurt "CyberGuy" Knutsson)The web browser approach to bulk deleting emails on iPhoneFor even more control over bulk deletions, consider using your iPhone's web browser:Open SafariGo to youremail provider's websiteandlog in to your account.Look for anEdit or Select optionChooseSelect All or a similar functionFind theDelete orTrash button and tap itIt will ask you to confirm your decision by clicking Delete all.This method is particularly effective for quickly clearing out large numbers of emails. The web browser approach to bulk deleting emails on iPhone (Kurt "CyberGuy" Knutsson)Set trash or archive as the default on iPhoneTo ensure that deleted emails are automatically sent to your preferred location, follow these simple steps to configure your iPhone settings. This setting helps you efficiently organize your emails by automatically directing deleted messages to the appropriate folder, saving time and reducing inbox clutter.Go toSettingsScroll down and tapAppsClickMailClickMail AccountsSelectYour Account Steps to set trash or archive as the default on iPhone (Kurt "CyberGuy" Knutsson)Scroll down toAccount Settings and click itThen clickAdvancedSelectDeleted Mailbox orArchive Mailboxto streamline your email management Steps to set trash or archive as the default on iPhone (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysManaging a cluttered inbox can feel overwhelming, but with these techniques, you'll be on your way to a more organized inbox. Remember, it's not just about deleting emails. It's about creating habits that prevent inbox overload in the future. Consider setting up filters for recurring emails. By implementing these strategies, Dale and other iPhone users can transform their email management from a tedious chore into a quick and efficient task.What's the most overwhelming digital clutter challenge you're currently facing, and how is it impacting your daily productivity? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Комментарии 0 Поделились 83 Просмотры
  • WWW.COMPUTERWEEKLY.COM
    Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
    Microsoft has issued fixes for 71 new Common Vulnerabilities and Exposures (CVEs) to mark the final Patch Tuesday of 2025, with a solitary zero-day that enables privilege elevation through the Windows Common Log File System Driver stealing the limelight.Assigned designation CVE-2024-49138 and credited to CrowdStrikes Advanced Research Team, the flaw stems from a heap-based buffer overflow in which improper bounds checking lets an attacker overwrite memory in the heap.It is considered relatively trivial to exploit by an attacker who to execute arbitrary code and gain system-level privileges that could be used to execute deeper and more impactful attacks, such as ransomware. Microsoft said it had observed CVE-2024-49138 being exploited in the wild.The CLFS driver is a core Windows component used by applications to write transaction logs, explained Mike Walters, president and co-founder of patch management specialist Action1.This vulnerability enables unauthorised privilege elevation by manipulating the driver's memory management, culminating in system-level access the highest privilege in Windows. Attackers gaining system privileges can perform actions such as disabling security protections, exfiltrating sensitive data, or installing persistent backdoors, he said.Walters explained that any Windows system dating back to 2008 that uses the standard CLFS component is vulnerable to this flaw, making it a potential headache across enterprise environments if not addressed quickly.The vulnerability is confirmed to be exploited in the wild and some information about the vulnerability has been publicly disclosed, but that disclosure may not include code samples, said Ivanti vice president of security products, Chris Goettl.The CVE is rated Important by Microsoft and has a CVSSv3.1 score of 7.8. Risk-based prioritisation would rate this vulnerability as Critical which makes the Windows OS update this month your top priority.In a year that saw Microsoft push over 1,000 bug fixes across 12 months, the second highest volume ever after 2020, as Dustin Childs of the Zero Day Initiative observed, December 2024 will stand out for a notably high volume of Critical vulnerabilities, 16 in total and all, without exception, leading to remote code execution (RCE).A total of nine of these vulnerabilities affect Windows Remote Desktop Services, while three are to be found in the Windows Lightweight Directory Access Protocol (LDAP), two in Windows Message Queuing (MSMQ) and one apiece in Windows Local Security Authority Subsystem Service (LSASS) and Windows Hyper-V.Of these, it is CVE-2024-49112 in Windows LDAP that probably warrants the closest attention, carrying an extreme CVSS score of 9.8 and affecting all versions of Windows since Windows 7 and Server 2008 R2. Left unaddressed, it allows an unauthenticated attacker to achieve RCE on the underlying server.LDAP is commonly seen on servers acting as Domain Controllers in a Windows network and the feature needs to be exposed to other servers, and clients, in an environment in order for the domain to function.Immersive Labs principal security engineer Rob Reeves explained: Microsoft has indicated that the attack complexity is low and authentication is not required.Furthermore, they advise that exposure of this service either via the internet or to untrusted networks should be stopped immediately.An attacker can make a series of crafted calls to the LDAP service and gain access within the context of that service, which will be running with System privileges, said Reeves.Because of the Domain Controller status of the machine account, it is assessed this will instantly allow the attacker to get access to all credential hashes within the domain. It is also assessed that an attacker will only need to gain low privileged access to a Windows host within a domain or a foothold within the network in order to exploit this service gaining complete control over the domain.Reeves told Computer Weekly that threat actors, particularly ransomware gangs, will be keenly trying to develop exploits for this flaw in the coming days because taking complete control of a Domain Controller in an Active Directory environment can get them access to every Windows machine on that domain.Environments which make use of Windows networks using Domain Controllers should patch this vulnerability as a matter of urgency and ensure that Domain Controllers are actively monitored for signs of exploitation, he warned.Read more about Patch TuesdayNovember 2024: High-profile vulns in NTLM, Windows Task Scheduler, Active Directory Certificate Services and Microsoft Exchange Server should be prioritised from Novembers Patch Tuesday update.October 2024: Stand-out vulnerabilities in Microsofts latest Patch Tuesday drop include problems in Microsoft Management Consoleand the Windows MSHTML Platform.September 2024: Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilitieswill keep admins busy.August 2024: Microsoft patches six actively exploited zero-days among over 100 issuesduring its regular monthly update.July 2024: Microsoft has fixed almost 140 vulnerabilities in its latest monthly update, with a Hyper-V zero-daysingled out for urgent attention.June 2024: An RCE vulnerability in a Microsoft messaging feature and a third-party flaw in a DNS authentication protocol are the most pressing issues to address inMicrosofts latest Patch Tuesday update.May 2024: A critical SharePoint vulnerability warrants attention this month, but it is another flaw that seems to be linked to the infamous Qakbot malwarethat is drawing attention.April 2024: Support for the Windows Server 2008 OS ended in 2020, but four years on and there's a live exploit of a security flawthat impacts all Windows users.March 2024: Two critical vulnerabilities in Windows Hyper-V stand out onan otherwise unremarkable Patch Tuesday.February 2024: Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket,among more than 70 issues.January 2024: Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulnerabilities to be alert to, including a number ofman-in-the-middle attack vectors.Finally, one little-regarded bug stands out this month, a flaw in Microsoft Muzic, tracked as CVE-2024-49063.The MicrosoftMuzicAI project is an interesting one, observed Ivantis Goettl.CVE-2024-49063is a remote code execution vulnerability in MicrosoftMuzic. To resolve this, CVE developers would need to take the latest build from GitHub to update their implementation.The vulnerability stems from deserialisation of untrusted data, leading to remote code execution if an attacker can create a malicious payload to execute.For those unfamiliar with the project, Microsoft Muzic is an ongoing research project looking at understanding and generating music using artificial intelligence (AI). Some of the projects features include automatic lyric transcription, song-writing and lyric generation, accompaniment generation and singing voice synthesis.
    0 Комментарии 0 Поделились 104 Просмотры
  • WWW.COMPUTERWEEKLY.COM
    iOS vuln leaves user data dangerously exposed
    A bypass flaw in the FileProvider Transparency, Consent and Control (TCC) subsystem within Apples iOS operating system could leave users data dangerously exposed, according to researchers at Jamf Threat Labs.Assigned CVE-2024-44131, the issue was successfully patched by Apple in September 2024 and Jamf, whose researchers are credited with its discovery, is formally disclosing it today. It also affects macOS devices, although Jamfs researchers have focused on the mobile ecosystem since these estates are more often neglected during updates.CVE-2024-44131 is of particular interest to threat actors because if successfully exploited, it can enable them to access sensitive information held on the target device, including contacts, location data and photos.TCC is a critical security framework, the Jamf team explained, which prompts users to grant or deny requests from specific applications to access their data, and CVE-2024-44131 enables a threat actor to sidestep it completely if they can convince their victim to download a malicious app.This discovery highlights a broader security concern as attackers focus on data and intellectual property that can be accessed from multiple locations, allowing them to focus on compromising the weakest of the connected systems, said the team.Services like iCloud, which allow data to sync across devices of many form factors, enable attackers to attempt exploits across a variety of entry points as they look to accelerate their access to valuable intellectual property and data.Open to abuseThis is not the first time that Apple's TCC subsystem has been shown to be at risk of compromise. Earlier in 2024, Cisco Talos researchers detailed eight vulnerabilities in Microsoft applications, including Excel, PowerPoint and Teams, that enable a threat actor to exploit TCC by abusing the applications' enhanced privileges to slip a malicious code library into the application's running space. The researcher who discovered it said that because Apple's operating systems trust applications to self-police their permissions, a failure in this responsibility effectively breaks down the entire permission model.At the core of the problem sits the interaction between the Apple Files.app and the FileProvider system process when managing file operations.In the exploit demonstrated, when an unwitting user moves or copies files or directories with Files.app within a directory that the malicious app running in the background can access, the attacker gains the ability to manipulate a symbolic link, or symlink a file that exists solely specify a path to the target file.Usually, file operation APIs will check for symlinks, but they usually appear at the final portion of the path prior to beginning the operation, so if they appear earlier which is the case in this exploit chain the operation will bypass these checks.In this way, the attacker can use the malicious app to abuse the elevated privileges provided by FileProvider to either move or copy data into a directory they control without being spotted. They can then hide these directories, or upload them to a server they control.Crucially, said the Jamf team, this entire operation occurs without triggering any TCC prompts.The most effective defence against this flaw is to apply the patches from Apple, which have been available for a couple of months. Security teams may also wish to implement additional monitoring of application behaviour and endpoint protection.Jamfs strategy vice president Michael Covington warned that because the updates also included support for Apple Intelligence, a series of artificial intelligence (AI) features for iOS devices, wariness around this feature might have led some organisations to hold off applying the updates with the necessary patch, leaving the attack vector open to exploitation.This discovery is a wake-up call for organisations to build comprehensive security strategies that address all endpoints, said the team.Mobile devices, as much as desktops, are critical parts of any security framework.Extending security practices to include mobile endpointsis essential in an era where mobile attacks are increasingly sophisticated.Read more about Apple securityIt can be difficult for Apple admins to adapt to every new OS release and the respective compliance changes. Thats where the macOS Security Compliance Projectcomes into play.There are lots of universal security controls that can apply to any type of desktops, but IT teams need to look at the specific features native to desktopssuch as macOS.Macs are known for their security, but that doesn't mean they're safe from viruses and other threats. IT teams can look into third-party antivirus toolsto bolster macOS security.
    0 Комментарии 0 Поделились 103 Просмотры
  • WWW.ZDNET.COM
    Why I pick this ultraportable Lenovo tablet over the iPad Air for entertainment - and it's on sale
    ZDNET's key takeaways Lenovo's Tab Plus is a mid-range tablet currently selling for $330 on Best Buy. Contrary to its small size, the model houses a booming eight-speaker system and a long-lasting battery. The MediaTek Helio chipset and dim display won't be winning any awards. more buying choices What's the deal?Even though the Lenovo Tab Plus is new, it's already been discounted. The tablet has dropped down $250 on Best Buy and Lenovo'sdigital store.It's the end of the year, and that means a lot of people are looking for holiday presents. If you're having a hard time deciding what to gift, may I recommend the Lenovo Tab Plus? This is Lenovo's latest lightweight tablet, capable of doubling as a mini-home theater. Everything that you could want in an entertainment system is here.Also: Why the iPad Mini 7 is the ultraportable tablet to beat in 2024The Lenovo Tab Plus is compact, measuring 11.5 inches and weighing about 1.4 pounds. It's similar in size to an iPad Air, but unlike Apple's device, this tablet doesn't have a smooth back as the bottom half juts out. The lower section measures 13.58 mm thick, while the upper half is only 7.7 mm. There's a good reason Lenovo designed its tablet with this unique look as the bottom half houses two of the model's outstanding features. details View at Best Buy First, there is the integrated kickstand that sits flush with the tablet's rear. Popping it out provides a stable base and lets the device tilt up to 175 degrees. Praising a kickstand may seem silly, but remember that most tablets -- without the addition of a protective case --don't have a way to prop themselves up. It's a great quality-of-life feature that enhances the viewing experience, and it's one I wish other manufacturers capitalized on.Also, when combined with smartphone support, the Tab Plus can double as a powerful Bluetooth speaker. Cesar Cadenas/ZDNETSpeaking of audio, the sound system is my favorite feature of the Tab Plus. It has eight JBL speakers consisting of four tweeters and four woofers, all finetuned by Dolby Atmos. In comparison, the M4 iPad Pro, Apple's current premium tablet, only has four speakers.I found the system's audio performance outstanding. As part of the testing, I watched the entire second season of Arcane on Netflix. From the first episode to the last, I enjoyed crystal-clear sounds powerful enough to fill a room. That said, the bass is a little lacking -- it's nowhere near as punchy as bass from a soundbar.The screen quality is great, too. It's a 2K display running at a refresh rate of 90Hz, delivering bright colors and smooth animations. It performed well across most applications. However, I didn't like how dim it looked. The screen's brightness peaks at 400 nits, which is fine for indoor viewing but not outdoors. The display struggled to shine in a bright environment.Under the hood is the MediaTek Helio G99 SoC (system on a chip), along with 8GB of RAM -- hardware that's typical in budget devices. The G99 isn't a very powerful chipset, and it's a couple of years old, but it gets the job done. I never once ran into performance drops while casually browsing with Google Chrome or playing mobile games. Cesar Cadenas/ZDNETThe Lenovo Tab Plus functions decently well as a work tablet. You can connect accessories like keyboards via Bluetooth. Thanks to Android 14, there's a desktop mode for mimicking desktop setups. The operating system also delivers engaging gesture controls. My favorite is where swiping up sends you to a carousel of open apps, and you can hop between any one of them. Smartphones have similar functionality.Android 14 brings with it years of updates. Lenovo has pledgedto continuously roll out security patches to the Tab Plus until June 2028. Cesar Cadenas/ZDNETMultiple accessories are available, but even with all those gadgets equipped, don't expect Lenovo's machine to be a powerhouse. I ran the PCMark Work 3.0 benchmark tests to see how well the tablet would perform across multiple workflows. At the time I performed the tests, the Lenovo Tab Plus did pretty well, earning 32nd place out of 200 on the developer'sbest tablets list for November 2024. However, it fell far behind contemporaries like the Samsung Galaxy Tab S9 FE and the OnePlus Pad 2.Also: Save $225 on the 8TB T5 SSD at Samsung for Black FridayThese numbers tell me that the Tab Plus may not be amazing at tackling tough workloads like video editing, but it won't be terrible either. Hardware performance may be middling, but the battery sure isn't. On average, the tablet lasts 15 hours on a single charge. I left it running one afternoon and was pleasantly surprised to see it still playing the test livestream the following morning.The storage space is unsurprisingly small, at 256GB. It would've been nice to have access to a bigger drive, but with a tablet this cheap, you have to expect some cuts. Luckily, you can expand storage by inserting a 1TB mini SD card into the slot at the top.ZDNET's buying adviceLenovo's Tab Plus normally retails for $330 at Best Buy. Even at its full price, I would recommend this device. Luckily, you can purchase this model from Lenovo's storefront at a discounted $288. This is a great Christmas present for loved ones who enjoy watching the latest shows on Netflix or want a multimedia tablet.The MediaTek Helio G99 isn't the best work device. Those looking for a tablet with muscle should check out Samsung's Galaxy Tab S10 Plus. The OnePlus Pad 2 is another solid, midrange option for those who don't mind spending extra cash.Featured reviews
    0 Комментарии 0 Поделились 76 Просмотры
  • WWW.ZDNET.COM
    LG's G4 OLED TV is my pick for best picture quality, and it's $800 off for the holiday season
    Adam Breeden/ZDNETZDNET's key takeawaysThe LG G4 OLED is on sale at Amazon and Best Buy for $2,597.LG has come a long way with its OLED picture quality, and this model is truly exceptional.The regular price might be a turn-off since you can buy great TVs for half the price. But $800 off really sweetens the deal.I'm not usually a fan of LG TVs, but I've tested the LG G4 OLED TV this year, and I have to admit that it has the most impressive picture quality of any TV I've ever bought, used, or tested.Also: Neo QLED vs OLED: Which TV technology is right for you?Though Cyber Monday is over, you can still find the65-inch LG G4 on sale for over $800 off its retail price of $3,399 at both Amazon and Best Buy as retailers amp up their holiday savings opportunities. At $2,597, it's still an expensive TV (the best price we saw during Black Friday and Cyber Monday was $2,297). For that price, you could get two 65-inch Sony X90L TVs -- my pick for the best TV for the money.But if picture quality is your No. 1 priority and you have the budget, there's no TV on the planet with a better picture than the LG G4. And the opportunity to get it for 24% off during holiday sales is super timely since most people ramp up their content consumption over the winter months.What makes the LG G4 OLED picture so good? Several things.First of all, there are the things that make all OLED screens great -- and it's especially true for LG OLEDs because they are one of the leading innovators of the technology. We're talking about true blacks (as opposed to washed-out dark grays from LCD TVs), deep contrast, more vibrant colors, and amazing dynamic range in shots that have both dark and light elements. The LG G4 has all of those qualities -- and at the highest levels I've seen on any TV -- because it is LG's flagship OLED TV for 2024.So what's new in this year's LG G4? The biggest leap forward is in picture processing and that's made possible by the new 11 AI Processor 4K. I've always considered Sony the king of picture processing, and it was a long way back to LG and Samsung essentially tied for second place, with budget TV makers TCL and Hisense lagging the crowd. However, with the 2024 11 AI Processor, LG is now pushing Sony for the top spot in picture processing -- and that's saying a lot.Where this really matters is when it comes to out-of-the-box picture settings, upscaling older and lower-quality 720p and 1080p content, and the TV automatically adjusting the picture to make today's HDR content look amazing. In all of those areas, the LG G4 now rivals Sony.And because LG has always arguably made the highest-quality OLED TV panels, this upgrade in picture processing lifts the LG G4 to the top of the class in picture quality. For movies, shows, gaming, and virtually any other content, the LG G4 brings them to life in vibrant color, smooth motion, and incredible contrast -- more than any other TV you can buy right now.I tried it with some of my favorite content that has challenging visuals, including Dune, Avengers: End Game, and several other cutting-edge cinematic marvels. All of the content looked better than I've ever seen on any TVs I've used, bought, or tested -- and that includes some of the best TVs from Sony, Samsung, LG, TCL, and Hisense over the past few years.So what's the catch?There are a few drawbacks to note about the LG G4. First, of course, is the premium price. As I've already mentioned, you could buy two 65-inch Sony X90L TVs for the price of one 65-inch LG G4. And I think most people would be extremely happy with the mid-range Sony X90L. But you're not most people if you're considering the LG G4.The other drawbacks are the remote and LG's built-in webOS software. Both are mediocre at best. I consider LG's remote to be the worst of any of the big five TV makers. It's large, chunky, and has a confusing number of buttons. A TV this good and with such a premium design that is svelte and beautiful deserves a better-designed remote.LG's built-in webOS software is nearly as disappointing as the remote control. It works fine, but it's not very intuitive, and it is nowhere close to being as well-thought-out as the TV hardware. The icons for content are small and sometimes hard to select, the menu system is a bit convoluted, and there are built-in ads running in the software, which makes it feel unnecessary for a TV this expensive. Adam Breeden/ZDNETThat said, in testing the 83-inch LG G4 in ZDNET's TV lab, I simply never used the remote or the built-in software. I attached an Apple TV 4K and used that remote and its interface to access all of the streaming services and content that I wanted. The combination of the LG G4 and Apple TV was glorious. So, if you buy an LG G4, I'd recommend adding a high-end streaming box like the Apple TV 4K, Google TV Streamer (4K), Amazon Fire TV Cube, or Nvidia Shield.The built-in sound in the LG G4 is fine but not great -- like virtually every other high-end or budget TV. So if you're buying a TV this expensive, I'm going to assume you're going to add a soundbar. At the very least, I'd recommend getting the Hisense AX5125H 5.1.2-channel soundbar -- my pick for best budget soundbar at $299 after Cyber Monday. And if you really want to kick into high gear, then I'd recommend the Sony Bravia Theater Quad, which automatically calibrates itself to your room. Or, even better, the Lovesac Sactional + Stealthech gives you surround sound built into your couch and makes you truly feel the cinematic experience much more like a real theater.Lastly, if you'd prefer a high-quality OLED TV with a great remote and great software built-in so that you don't have to run a separate streaming box, then I'd recommend the Sony A95L OLED TV, which runs Google TV and has a very premium remote. And if your TV is going to be in a very bright room with lots of windows or lights, then I'd recommend the Samsung S95D, which nearly matches the LG G4 in picture quality but comes with an incredible glare-free screen that looks amazing in any room.ZDNET's buying adviceWhile Sony and Samsung offer OLED TVs with similar price points, the flagshipLG G4 OLED is unmatched in picture quality, making it a solid recommendation at this sale price. Its powerful 11 AI Processor is on par with the vibrant colors, true blacks, and dynamic range displayed on its sleek panel. For a more immersive, theatre-like sound experience, consider adding a soundbar, as I mentioned above.Take advantage of these holiday discounts at either Amazon or Best Buy, whether you're gifting someone a smart TV with an exquisite picture or upgrading your home entertainment center.How we test TVsWhile testing and researching the TVs featured on this list, I and other ZDNET experts kept these criteria in mind:Price:Not all budgets are created equal. And if you're working with a limited budget, that shouldn't mean you have to settle for a sub-par TV. Each TV model on this list has been chosen across a variety of price points to help accommodate different needs.Screen size:The most important factor to consider, after price, when shopping for a new TV is whether or not it will fit into your space. Each best TV on this list was chosen because they are available in a wide variety of sizes to suit different rooms.Picture and audio quality:A new TV doesn't mean much, even if it costs an arm and a leg, if it doesn't provide a great picture and clear audio. Each TV on this list has been ensured to support various HDR codecs, including HDR10+ and Dolby Vision, as well as enhanced audio software like Dolby Atmos, Dolby Digital Plus, and object-tracking sound.For a more detailed look, check outour extensive TV testing methodology.Featured reviews
    0 Комментарии 0 Поделились 72 Просмотры
  • WWW.FORBES.COM
    Sora Is Out Kind Of Capabilities Evaluated
    Demand for Sora catalytic computing power is continuing to soar, further benefiting infrastructure ... [+] vendors in Suqian, Jiangsu Province, China, on February 19, 2024. (Photo Illustration by Costfoto/NurPhoto via Getty Images)NurPhoto via Getty ImagesThe world is getting a sneak peek at a major transformative technology of our time one thats probably going to displace more resources than some of the other multimedia models that weve seen in the past.With the capability to create full video from prompts, Sora is going to make all kinds of casting, staging and expensive film operations obsolete. And its supposed to be available right now! At least to ChatGPT Plus and Pro users.A Big ShiftThink about all of the work involved in manufacturing, using and developing physical film for pictures. Think about what the digital camera did to that industry.Sora is going to be so much more transformative, on such a scale, that its really worth paying a lot of attention as it gets into the hands of a wider group of users.Marques Brownlee is a YouTuber who has quite a lot of influence and got a front row seat to early Sora exploration.In a YouTube critique, Brownlee points out how capable and adapt the program is at generating realistic looking footage, while admitting that it still has a way to go.Was it Gandhi or Stalin? MORE FOR YOUFor those used to play the game where you guess which person said something, Brownlee shows us a series of short videos, and asks us to figure out whether they are real or AI-generated.What you see is that it can be pretty hard to tell.There arent a lot of blatant cues to let us know which videos were made with AI and which werentNot Many CluesThere are a few obvious tells when it comes to AI video, but theyre mostly based on our knowledge of the world around us.Here are three that popped out to me:Not factual one way you can tell that video is AI-generated is if it has factually wrong elements in a picture, such as a landscape that youve seen before.If you know, for example, that there is not a dilapidated shack on the top of some hill, youll note the difference when the AI shows you an aerial view.Not ugly enough it seems that Sora products still adhere to the same tendency as still image and General AI technologies in general they tend to produce produce glitzy, beautiful results. In other words, one of the few tells that you have is that the program doesnt tend to create mediocre-looking film with actual composition or lighting problems, or subjects that arent telegenic and prepped for film.However, you could presumably generate this kind of thing with more prompting.Not credible another way to tell AI video is if you see tentacle monsters or other unreal things cropping up in the margins. But again, that has more to do with our knowledge of the world than anything we can assess visually. If you see a tentacle god arise from a lake in a Sora video, its going to look real.Now, after I wrote these down, I watched the rest of Brownlees video, and he lays out some additional lapses in Sora hyper-realism, so check these out:First, there is the lack of object permanence, where items or characters can appear and disappear randomly. Theres also a sort of ghost image phenomenon where an object is going to have a lack of substance for example, in Brownlees video, we see cars passing through another car in what is supposed to be a real-life street video.In general, Brownlee points out, Sora struggles with physics. It doesnt always know how objects behave in motion, or what direction they were going in, if its working based off of a still image.Then there is are some issues with speed, where a video may slow down and speed up for no reason.All of this aside, some of the videos will be so realistic that we have trouble telling them apart from live footage.Access to Sora Right NowOver at OpenAIs site, it looks like Sora access has been temporarily paused due to high traffic volumes.Brownlee talks about this eventuality in his video:I kind of wonder how long it will take when its open for everyone to use, he says, noting that a 1080 P film of about 10 seconds takes a couple of minutes for him to generate.Use Cases for SoraAs Brownlee points out, Sora may be more useful for a lot of people who want to create cartoon or claymation features.Thats because the physics is really hard to get right in real life, but cartoons and stop action footage are more forgiving. Theyre more abstract, and thats going to be one of the first realms that Sora becomes most useful in, although Brownlee also cites fake CCTV camera footage as a desirable way to use the platform.He shows off a Santa versus Frosty Mortal Kombat game video completely made up by the AIand a job interview scene, in which Sora shows some of the details that the model can provide without any additional prompting.However, he suggests there are some big unknowns with this technology, and were moving through uncharted waters.When we all start using Sora, what will we use it for? How will it affect our lives?People are wondering about whats going to happen to those major industries that are often centered around places in Southern California like Burbank and Hollywood.But the effect of the technology will likely go far beyond that. Stay tuned as I continue to document whats coming out now at the end of whats been a banner year for large language models.
    0 Комментарии 0 Поделились 65 Просмотры
  • WWW.FORBES.COM
    Sneaky Shiftiness On The Boundaries Between AI Versus AGI And Ultimately AI Superintelligence
    Be forewarned that trickery is happening when headlines and predictions are being made about AI, ... [+] AGI, and ASI.gettyIn todays column, I examine the emerging attempts to surreptitiously blur the distinctions between contemporary AI and the vaunted but not-yet-attained artificial general intelligence (AGI). As if thats not enough, there is also a concerted effort to further overstretch into proclaiming the imminent realization of artificial superintelligence (ASI).The shenanigans are happening right before our eyes, yet seemingly remain out of sight.Lets talk about it.This analysis of an innovative proposition is part of my ongoing Forbes column coverage on the latest in AI including identifying and explaining various impactful AI complexities (see the link here).Thought Experiment On The Value Of Defining ThingsSocrates famously said that the beginning of wisdom is the definition of terms.Definitions make a world of difference. They are vital for how we communicate and what we mean when we communicate with each other. You see, without agreeing to specific definitions, people can speak right past each other, oftentimes not even realizing they are doing so.MORE FOR YOUOne of my favorite examples of this kind of definitional dilemma is the following riddle.Two people are standing and facing each other. They are both holding something behind their backs. One of them says that they have an apple behind their back. The other remarks that they too have an apple behind their back. Upon a count of three, they both reposition their respective objects and hold them straight out in front of them. Hey, one of them loudly exclaims, you told a lie, angrily declaring that the person isnt holding an apple but instead is holding a tangerine.I ask you this question which of the two is holding an apple?Well, the answer is that you cant say for sure. You might be tempted to contend that the person calling the other one a liar must be the one with the apple. The thing is all of this is dependent on exactly what the word apple means. It could be that the person holding the proclaimed tangerine believes that an apple is defined as a small citrus fruit having an orange-red color. Thus, they truly believe they are holding an apple.The two people had not discussed and agreed beforehand as to what the definition of an apple consisted of. I realize this seems farfetched because we all commonly know what an apple is. But suppose we are faced with something that doesnt have a hard-and-fast definition. In such an instance, the loosey-goosey facets might allow for a great deal of confusion, finger-pointing, and slippery contrivances.Yes, indeed, that takes us to the definitional dilemma entailing the meaning of bandied-around terminology consisting of artificial intelligence (AI), artificial general intelligence (AGI), and artificial superintelligence (ASI).Formally Defining AI, AGI, And ASII have previously explored the formalized legal definitions associated with AI, AGI, and ASI, see the link here.Heres why the legal definitions are crucial. All kinds of new federal, state, and local laws are being written that ostensibly are intended to oversee and regulate AI of any kind (the same goes for international laws encompassing AI). The principled basis for these laws is that we need to try and rein in AI before we suffer adverse consequences and especially before AI becomes a said-to-be existential risk. For more on the latest AI-related laws, see my coverage at the link here.There is a twist that might seem surprising and spur a tad bit of dismay.By and large, these burgeoning wanton sets of AI-related laws tend to define AI in their own idiosyncratic way. Each definition of AI that is contained in a respective law is often devised from scratch. Sometimes an already spread-around definition is used, but even there the AI definition is typically tweaked quite extensively. It is a mess.Why care?Because the hodge-podge of AI definitions means that this law or that law might be referring to apples when it really intends to cover tangerines or inadvertently covers tangerines when it was meant to oversee apples.That is a seriously troubling situation.Ive predicted that we are ultimately going to find ourselves in a legal quagmire on this.Any organization or person brought up on charges associated with a law that has an AI definition will legally fight tooth and nail in the following manner. They will first contend that the AI as defined in the law is not the AI that they made use of, and ergo the law doesnt apply to them. That might provide sufficient wiggle room to escape the AI-focused law. Second, they will undoubtedly claim that the AI definition is wrong, and that AI is properly defined in some other way likely proffering a definition that will swing to their advantage.Boom, drop the mic.The gist is that rather than those laws making clear what they encompass, the lack of an all-together commonly agreed definition across the board for AI, AGI, and ASI is setting in stone a legal time bomb of sorts. Whereas lawmakers might think they are doing good and are going to curtail those baddies that go too far with AI, the chances are that the courts will be overburdened with trying to nail down thorny legal issues of what is meant in the law as to a reasonable and acceptable definition of AI, AGI, and ASI.Whoa, you might be thinking, if that legal morass is pending, why hasnt it already happened?The answer is that we are still so new to these AI-focused laws that there arent yet sufficient cases to have this become a noticeable issue. It will take a smidgen of time for AI systems to get companies in real trouble. Once that occurs, you can bet that the legal mechanisms will start to grind and savvy lawyers will take any shot they can to undercut the law that allegedly their client broke.Time will tell.Societal Definitions Of AI, AGI, ASILets shift away from formalized legal definitions and discuss informal societal definitions.You indubitably see references made to AI, AGI, and ASI in the media. Artificial intelligence is hot, and brazen headlines make this or that proclamation about breathtaking breakthroughs in AI. I dare say you would be hard-pressed to find postings and articles that dont refer to AI in one fashion or another. It is a ubiquitous topic these days.The rub is this.Societal definitions for AI, AGI, and ASI are just as messed up and even worse than the mess associated with their presumptive legal definitions. Anybody can readily get away with using the terminology of AI, AGI, and ASI in just about whatever wild or sneaky way that they desire. No one seems to be policing this. Stretching the terminology to fit a desired purpose has become the norm.Allow me to give you a strawman to see what this portends.A brisk definition of AI that you might find in an everyday dictionary is this:AI is a system that exhibits intelligent behavior.Id ask you to take a reflective moment and mull over that definition of AI.Does the definition seem airtight and ironclad?Regrettably, no. It is full of ill-defined terms and an imperfect conglomeration of loopholes. For example, what does intelligence behavior mean? How are we to judge whether a system purportedly meeting this definition is exhibiting intelligent behavior? There is a wide variety and heatedly debated theoretical tests that are floating around, such as the famed Turing Test, see my analysis at the link here.Currently, intelligent behavior is in the eye of the beholder.How We Got From AI To AGI DefinitionsAnother big problem with the foregoing definition of AI is that it doesnt stipulate the level or degree of intelligence when it comes to exhibiting intelligent behavior.Heres what I mean. Would you be willing to say that a dog or a cat exhibits intelligent behavior? I think we can generally and collegially agree that yes, it is fair to say that a dog or a cat does things sometimes that we would declare as being intelligent. Not all the time, but certainly some of the time.Returning to the strawman definition of AI, many AI researchers became concerned that just about any system could be construed as exhibiting intelligent behavior. The reason this can happen is that the level of intelligence is not specified in the definition. Just like my bringing up dogs and cats, I think we could agree that on the whole humans are more intelligent than those beloved animals (a smarmy person might disagree, but I trust that you get the overarching drift that humans are by and large considered more intelligent than dogs and cats).AI researchers pushing the limits of so-called conventional AI were rightfully upset that their advanced AI was being lumped into the less impressive AI. Again, this is the case because the level of intelligence exhibited is up for grabs. A presumed AI system that controls a toaster seems to be on par with an AI system that runs an entire factory. They are both said to be AI.Voila, a new piece of terminology evolved and gained traction, namely the moniker of artificial general intelligence and the associated acronym of AGI. The beauty was that AI researchers could say that their more advanced AI was closer to AGI and not mired in the less-stellar conventional AI.Lets use this as a strawman definition for AGI:AGI or artificial general intelligence is an AI system that exhibits intelligent behavior of both a narrow and general manner on par with that of humans, in all respects.You can see that the level of intelligence is now defined as being associated with that of humans.Human-level intelligent behavior is the AGI demarcation. Furthermore, this includes narrow kinds of intelligence such as specialties of repairing a car engine, knowing how to operate a crane, being able to fly a plane, etc. It also includes general facets of intelligence that we might think of as common-sense aspects and overall day-to-day intelligence as a functioning human.The Next Move Was AGI To ASI DefinitionsThe tale isnt over.AI researchers are aiming to exceed human-level intelligence in AI. The problem then with the definition of AGI is that though it specifies a lower bound, namely a minimum of achieving human-level intelligence, it lacks any specificity above that level. Imagine the consternation. If you went to the hard work of devising AI that could beat every human at chess, you would say it attained AGI in the niche of chess, but this is somewhat underplaying the accomplishment. You would be eager to say that AGI chess playing not only met the level of the requirement, it notably exceeded human capacities as well. It was said to be superhuman with respect to playing chess.How are we to describe AI that goes beyond human-level intelligence?Another strawman is needed:ASI or artificial superintelligence is an AI or AGI system that exhibits intelligent behavior of both a narrow and general manner that exceeds that of humans, in all respects.Unfortunately, this opens another can of worms. You might keenly note that this again has no leveling above that of exceeding human intelligence. In other words, I make an ASI that is 2x the capabilities of humans, while someone else devises an ASI that is 5x. Both of those systems are going to be labeled as ASI. We probably will get into debates about having something that means a substantive leap over ASI, maybe well call it super-duper AI (ASDI or ASUI). Im not sure thats catchy enough, so maybe it needs more work on catchiness.The Moment Of TruthI dragged you through those three definitions of AI, AGI, and ASI to arrive at a notable point.Here it goes.Because those are slippery definitions that are just strawmen for purposes of this discussion, and we dont have any ironclad societal definitions for AI, AGI, or ASI per se, the societal claims about AI, AGI, and ASI are all over the map. This raises a potpourri of very weighty AI ethics concerns, see my coverage at the link here.You can declare that something is AI or AGI or ASI, and nearly get away with doing so scot-free.Go along on a bumpy ride with me on this conundrum.A person or company trying to grab attention announces they have devised AI that is AGI. Are they giving the straight scoop? Well, it could be that they are describing an apple while the rest of us are thinking of a tangerine. In that sense, lets say that they genuinely believe they have achieved AGI, though, upon closer inspection, others discern it is not AGI, at least as pertains to a definition of AGI such as the strawman listed herein.That is slippery slope #1: Conflating AI with AGI.There is a slippery slope #2: Conflating AI with ASI, or conflating AGI with ASI.Someone announces that they have devised AI which is ASI. Wow! Amazing! Are they giving the straight scoop? Again, they might believe they have achieved ASI. Upon closer inspection, others discern it is not ASI, at least as pertains to a definition of ASI such as the strawman listed herein.Be wary and highly skeptical about any of the spewing forth claims about AI, AGI, and ASI. It is murky. It might be underhanded.Those Plentiful Predictions Of AGI And ASI ArrivalSome final comments before I conclude this discussion.A popular trend these days consists of pundits and soothsayers predicting when we will reach AGI, and when we will reach ASI. A gambit of one-upmanship is occurring. Someone declares that AGI will be reached by the year 2035. This then becomes old news. To get headlines, the next declaration will up the ante and proclaim that AGI will be achieved by the year 2030.And on it goes.The same applies to ASI predictions. In fact, it gets extremely convoluted because someone might be thinking of a prediction for AGI, but it gets portrayed as a prediction for ASI. Heck, you might as well lump them all into one bucket and be done with it, some of the media seems to suggest. No need to have a dividing line between AGI and ASI. Dont make things complicated.Lets just mush together AGI and ASI if thats what sells.There is a whole lot of sneaky shiftiness going on concerning AI, AGI, and ASI.Ive tried to bring you up to speed on the trickeries and mischiefs underway. Whenever you see any claims or pronouncements regarding AI, AGI, or ASI, I sincerely hope that your spidey sense will start tingling and youll give suitable scrutiny to the matters at hand.Keep in mind the words of Abraham Lincoln that dutifully defined for us the nature of human behavior: You can fool all the people some of the time and some of the people all the time, but you cannot fool all the people all the time.
    0 Комментарии 0 Поделились 69 Просмотры
  • WWW.TECHSPOT.COM
    FBI says criminals are exploiting GenAI to scale up fraud schemes
    Facepalm: Generative AI services are gaining immense popularity among both internet users and cybercriminals. According to the FBI, "synthetic" content is increasingly being exploited to carry out various types of fraud. However, with the right precautions, individuals can still effectively protect themselves online. The FBI has issued an alert about the criminal misuse of generative AI technology. In a recently published public service announcement, the bureau warns Americans that fraudsters are exploiting AI-generated content to make their illegal schemes more convincing and effective.According to the FBI, generative AI allows criminals to reduce the time and effort needed to deceive their targets. These AI tools take user inputs to "synthesize" entirely new content based on prompts. They can even help correct human errors that might otherwise raise suspicion, particularly in AI-generated text.Creating content with AI isn't inherently illegal, but it becomes a crime when that content is used in fraud or extortion attempts. The FBI's alert outlines several examples of how generative AI can be misused and offers practical advice to help users protect themselves online.AI-generated text can appear highly convincing in social engineering or spear-phishing campaigns. Fraudsters are leveraging generative AI to produce large amounts of fake content, create fake social media profiles, send messages, and translate languages with greater accuracy and fewer grammatical errors. Entire fraudulent websites can now be built in record time, and chatbots are being used to trick victims into clicking malicious links.AI-generated images are, unsurprisingly, at the forefront of current trends, and cybercriminals are taking full advantage of them. Fraudsters are using AI-generated visuals to enhance fake social media profiles and counterfeit ID documents that support fraudulent activities. According to the FBI, AI algorithms can produce "realistic" images that are being exploited in social engineering campaigns, spear phishing attempts, scams, and even "romance schemes."AI-generated audio and video content poses similar risks. Criminals can now impersonate public figures or even people personally known to their targets, requesting financial assistance or access to sensitive information like bank accounts. // Related StoriesThe FBI advises users to establish a "secret word" or phrase with trusted family and friends as a quick way to verify identities. Additional tips to guard against generative AI-enabled crimes include carefully inspecting images and videos for irregularities or inconsistencies, as well as minimizing the online availability of personal images or voice recordings.When dealing with financial requests, the FBI stresses the importance of verifying their legitimacy through direct phone calls rather than relying on text or email. Sensitive information should never be shared with individuals met exclusively online. While it may seem obvious, the FBI also reiterates that sending money, gift cards, or cryptocurrency to strangers online is highly risky and often leads to fraud.
    0 Комментарии 0 Поделились 77 Просмотры
  • WWW.TECHSPOT.COM
    Apple's MacBook Pro could ditch the notch for a holepunch in 2026, switch to OLED
    TL;DR: Apple has some significant upgrades in store for the displays adorning the MacBook Pros. Not only is the company switching from mini-LED to OLED, but it's also finally planning to ditch the notch for something less conspicuous. A new product timeline by research firm Omdia suggests that Apple intends to do away with the controversial notch cutout that has graced the MacBook Pro screens since 2021. Instead, it will implement a streamlined "hole punch" design to accommodate the webcam.Although controversial, the notch was functional, allowing Apple to extend the display area closer to the chassis edges while providing a dedicated space for the webcam. Besides a cleaner, more uniform display, removing the notch should marginally increase the usable menu bar space across the top of the screen. It might also allow Apple to port the iPhone's Dynamic Island to MacBooks.Click to enlargeThe roadmap reveals that this change will apply to both the 14-inch and 16-inch MacBook Pro models and go live in 2026 or 2027. It also shows that Macs will finally make the switch over to OLED. Interestingly, Apple aims to utilize a hybrid OLED variant akin to the technology it debuted on its latest iPad Pro.Regardless of its implementation, OLED would deliver tangible benefits compared to mini-LED. Owners can expect higher brightness, better contrast with inky blacks, improved power efficiency for longer battery life, and more. The switch may also enable a slimmer chassis design for added portability.Apple's OLED ambitions extend beyond the MacBook Pro, too. The forecast shows the compact iPad mini upgrading to OLED panels by late 2026, followed by the mid-range iPad Air roughly a year later. Meanwhile, the mainstream MacBook Air will complete the OLED migration in 2028, though the word is that it will retain the notch. // Related StoriesRounding out the roadmap, Apple is working towards some form of foldable OLED device slated for 2028 or later. Details are scant other than that its overall screen size is listed as a whopping 18.8 inches.Image credit: Jukanlosreve
    0 Комментарии 0 Поделились 72 Просмотры