PyPI halted new users and projects while it fended off supply-chain attack
Automation is making attacks on open source code repositories harder to fight.
Web and Technology News
Automation is making attacks on open source code repositories harder to fight.
Former Canonical employee calls out the “Safe” label applied to Snap apps.
Proxmox is a Linux-based hypervisor that could replace ESXi for some users.
Researchers say it’s the first known in-the-wild attack targeting AI workloads.
Enlarge / Affinity’s photo editor.
Canva
Online graphic design platform provider Canva announced its acquisition of Affinity on Tuesday. The purchase adds tools for creative professionals to the Australian startup’s repertoire, presenting competition f…
Enlarge / They look like normal notifications, but opening an iPhone with one or more of these stacked up, you won’t be able to do much of anything until you tap “Allow” or “Don’t Allow.” And they’re right next to each other.
Kevin Purdy
Human weakness…
Enlarge
Getty Images / Benj Edwards
On Tuesday, Anthropic’s Claude 3 Opus large language model (LLM) surpassed OpenAI’s GPT-4 (which powers ChatGPT) for the first time on Chatbot Arena, a popular crowdsourced leaderboard used by AI researchers to gauge…
Enlarge
Getty Images
Crooks are working overtime to anonymize their illicit online activities using thousands of devices of unsuspecting users, as evidenced by two unrelated reports published Tuesday.
The first, from security firm Lumen Labs, reports t…
Hacks allegedly targeted US officials and politicians, their spouses, and dozens of companies.
Enlarge
Getty Images
Researchers have unearthed never-before-seen wiper malware tied to the Kremlin and an operation two years ago that took out more than 10,000 satellite modems located mainly in Ukraine on the eve of Russia’s invasion of its neighbor…
Enlarge / The United Nations building in New York.
Getty Images
On Thursday, the United Nations General Assembly unanimously consented to adopt what some call the first global resolution on AI, reports Reuters. The resolution aims to foster the protect…
Vinge won multiple Hugo awards and created a sci-fi concept that drives AI researchers.
Enlarge
Aurich Lawson | Apple
A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper …
Sources say to expect OpenAI’s next major AI model mid-2024, according to a new report.
As companies race to pair AI with general-purpose humanoid robots, Nvidia’s GR00T emerges.
Williams team leader may only be shocked because he hasn’t worked IT.
Enlarge / Aerial view of a sewage treatment plant.
Getty Images
The Biden administration on Tuesday warned the nation’s governors that drinking water and wastewater utilities in their states are facing “disabling cyberattacks” by hostile foreign nation…
208B transistor chip can reportedly reduce AI cost and energy consumption by up to 25x.
Enlarge
Benj Edwards
On Monday, Bloomberg reported that Apple is in talks to license Google’s Gemini model to power AI features like Siri in a future iPhone software update coming later in 2024, according to people familiar with the situation. Apple ha…
Enlarge
Getty Images
Japan-based IT behemoth Fujitsu said it has discovered malware on its corporate network that may have allowed the people responsible to steal personal information from customers or other parties.
“We confirmed the presence of malwa…
Report highlights big turnaround from Dell’s previous pro-WFH stance.
Amid criticism of OpenAI’s closed models, Musk makes the Grok-1 AI model free to download.
Enlarge / Some ASCII art of our favorite visual cliche for a hacker.
Getty Images
Researchers have discovered a new way to hack AI assistants that uses a surprisingly old-school method: ASCII art. It turns out that chat-based large language models such…
Parts of Africa were already seeing web disruptions from damaged Red Sea cables.
OpenAI’s GPT-2 running locally in Microsoft Excel teaches the basics of how LLMs work.