Category: Shorts

  • Fortinet’s FortiNAC vulnerability could allow code execution attacks, warns the vendor

    by

    in

    Fortinet’s FortiNAC vulnerability could allow code execution attacks, warns the vendor Fortinet patches two security vulnerabilities affecting its FortiNAC network access control solution that could lead to the execution of arbitrary code. The company says that Florian Hauser from German cybersecurity firm CODE WHITE discovered and reported the two bugs. The update comes more than…

  • Ads for major brands are appearing on fake AI-generated spam sites

    by

    in

    Ads for major brands are appearing on fake AI-generated spam sites More than 140 brands were running ads on sites NewsGuard, a provider of artificial intelligence-generated news sites, likely without even knowing they were there. The study was first reported by the MIT Technology Review and includes brands like Citigroup and Subaru. NewsGuard found that…

  • How to sign up for Amazon Prime Student

    by

    in

    How to sign up for Amazon Prime Student Prime Day, the period when Amazon discounts its merchandise for Prime members, is coming up. If you’re not a Prime member but want to check out the deals, don’t worry. It’s easy. You can sign up for Prime membership online and take advantage of the free 30-day…

  • House limits congressional use of ChatGPT

    by

    in

    House limits congressional use of ChatGPT On Monday, the House set up new rules around how offices can use ChatGPT and declared that any non-ChatGPT chatbots are not yet authorized, according to a report from Axios. In a Monday memo, House Chief Administrative Chief Catherine L. Szpindor said that lawmakers and staff were now limited…

  • Researchers Find Way to Recover Cryptographic Keys by Analyzing Camera Flashes

    by

    in

    Researchers Find Way to Recover Cryptographic Keys by Analyzing Camera Flashes A group of scientists has discovered that it’s possible to recover secret keys from a device by analyzing the brightness of its power LED. Specifically, they’re interested in discovering how CPU-side-channel attacks can be leveraged to gain access to the private keys of an…

  • Motion Synthesis from a Single Example Using GenMM, an AI Model

    by

    in

    Motion Synthesis from a Single Example Using GenMM, an AI Model This paper describes an alternative approach to motion synthesis based on the principle of motion nearest neighbors and motion matching. GenMM is a generative model that can extract diverse motions from a single example sequence. It can be used to perform tasks such as…

  • Coffee shops will now be paid by Amazon to deliver packages

    by

    in

    Coffee shops will now be paid by Amazon to deliver packages According to reports, Amazon is looking to add more small businesses to its network of delivery services. Last year, Vox reported that the company was secretly recruiting mom-and-pop shops in Alabama, Mississippi, and Nebraska to join a pilot delivery program. It has a goal…

  • AI is killing the web, and the new web struggles to be born

    by

    in

    AI is killing the web, and the new web struggles to be born A writeup of Google’s AI search beta from Avram Piltch, editor-in-chief of tech site Tom’s Hardware, highlights some of the problems with the technology. Google Search underwrites the economy of the modern web, distributing attention and revenue to much of the internet.…

  • AI, hope, and fear

    by

    in

    AI, hope, and fear The Verge and The Circus poll more than 2,000 US adults on their thoughts, feelings, and fears about AI. Here’s what people really think about AI and what they want from it. Some see opportunities to remove creative constraints, automate rote work, and discover new ways to learn and teach. Meanwhile,…

  • Cryptocurrency Exchange in Japan suffers Attack from JokerSpy macOS Backdoor

    by

    in

    Cryptocurrency Exchange in Japan suffers Attack from JokerSpy macOS Backdoor This month, an unknown cryptocurrency exchange in Japan was the victim of an macOS backdoor called JokerSpy. The toolkit also includes Swiftbelt, a Swift-based enumeration tool inspired by an open-source utility called SeatBelt. The company behind the tool, Elastic Security Labs, describes it as a…