Categories
Australian News

Australia signs deal worth almost $1b with PsiQuantum to build world’s first ‘useful’ quantum computer

AceBusinessDesk – Australia will invest almost a billion dollars in a bid to build the world’s first commercially useful quantum computer in Brisbane.

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.30: 2024: ABC Brisbane News: TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

A closeup photo of a computer chip
Quantum computers can easily bypass existing cybersecurity measures.(Supplied: UNSW)normal

The Queensland and Australian governments have set aside $470 million each in grants, loans and share purchases for the company PsiQuantum.

PsiQuantum will attempt to build the world’s first large “fault-tolerant” quantum computer, free from the errors and instabilities that render other quantum computers impractical. The company said this would be the world’s first “useful” quantum computer, capable of being used in industry, research and defence without significant errors.

A woman with short brown hair and black long-sleeved shirt sitting in a laboratory
Cathy Foley says the new quantum computer will be the most complex machine ever built. (Supplied: CSIRO)

Australia’s Chief Scientist Cathy Foley told ABC Radio Brisbane that quantum computers would soon be a part of everyone’s everyday life.

“It’s going to be the most complex machine ever built by humanity,” Dr Foley said. β€œ Quantum computing is going to revolutionise computing power because it can use different principles of physics that we previously couldn’t access,” she said. β€œ We’ll be able to solve complex problems that we just can’t do β€” even very basic ones like how to work out the best route for trucking or organising ports and even high school timetables.”

She said the Queensland government had set aside $5 million to research how quantum computing could help organise the logistics of the 2032 Brisbane Olympics.

PsiQuantum was co-founded by two Australian University of Queensland graduates, Jeremy O’Brien and Terry Rudolph, in America’s Silicon Valley. As part of the deal, the company will relocate to Brisbane, where it will build its warehouse-sized supercooled quantum computer. Dr Foley said the Australian scientific community was “very excited” to see Australian governments invested in developing its technology within its borders. She said Australian scientists wanted to avoid a repeat of what happened with photovoltaic cells, which were invented at the University of NSW but then exported and commercialised in China.

A man  in a university hall
Professor Andrew White says the new quantum computer will harness the power of nature itself. (Supplied: University of Queensland)

University of Queensland Professor Andrew White said the first breakthroughs in quantum mechanics were made by Brisbane researchers at least 20 years ago.

Professor White said the new quantum computer will have immediate uses in industry and scientific research. But in the next 30 to 40 years, the technology will become more widely available and “change everything”, much like the personal computer did, he said.

How do they work?

Professor White says quantum computers use the principles of nature to perform many more calculations than a classical computer is capable of doing. He said quantum computers harnessed the “weird” power of quantum mechanics to solve problems that were too complex for any classical computer. β€œ In quantum mechanics, things can genuinely be in two places at once β€” we call that superposition,” Professor White said. β€œ There’s a thing called entanglement where quantum systems correlate with each other and it looks like nature’s cheating. β€œ So what we’re trying to do with quantum computers is hack nature, do the stuff that she’s doing all the time and use it to our advantage.”

A man next to flags
Ed Husic said Australian governments have previously declined to invest in technology industries, prompting them to go overseas.(ABC)

The Federal Minister for Industry and Science Ed Husic said the government did not wish to repeat the mistakes of the past by allowing this technology to go overseas.

He said Australia’s historical failures to support a local chip manufacturing industry had meant those industries had moved to Asia. 

“[PsiQuantum] left our shores because they didn’t think that we’d had an interest or a desire to back this type of technology,” Mr Husic said.

“Now these Australians want to come home to ensure that we can become a tech manufacturing powerhouse.”

Australia can be home to a “strong quantum ecosystem”, said Prime Minister Anthony Albanese

Prime Minister Anthony Albanese said the government wanted Australia to become a centre for quantum growth for the rest of the planet.

“We are proud to be working with the Queensland government to make visionary investments in the future of our nation,” he said.

β€œ This investment shows we are serious about building a strong quantum ecosystem here in Australia.”

PsiQuantum’s Terry Rudolph told ABC Radio Brisbane that Queensland researchers had been uncovering the physics behind quantum computing over the last 25 years.

However, Professor Rudolph said that it was only since 2015 that the practical engineering problems began to seem solvable.

He said the company was confident that Queensland had the expertise in engineering, manufacturing, science, and technology to pull it off.

There’s many problems we know that, even if we turned all the silicon in the solar system into a classical computer, we would never be able to solve those problems,” he said.

“The cool thing is for some of those same problems we know we would never solve with a classical computer, the total number of steps it’s going to take on a quantum computer is vastly less.”

Queensland Premier Steven Miles said the state should not lose another opportunity to support a burgeoning industry. 

“By being early adopting … we can ensure that industry develops here, and we’re not trying 20 or 30 years later to play catch-up,” he said. 

“This is all about adding an additional capacity to our state that will be recognised globally and draw investment to Queensland from right around the world.”

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
Categories
Ace Breaking News

New laws to protect consumers from cyber criminals come into force in the UK

AceBreakingNews – From today, regulations enforcing consumer protections against hacking and cyber-attacks will take effect, mandating that internet-connected smart devices meet minimum-security standards by law.

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.29: Β 2024: TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

  • World-first laws protecting UK consumers and businesses from hacking and cyber-attacks take effect todayΒ Β Β 
  • manufacturers of products such as phones, TVs and smart doorbells are now required to implement minimum security standards against cyber threats   
  • consumers will benefit from banning of easily guessable default passwords, marking a significant leap in protecting individuals, society and the economy from cyber criminals 

Consumer protections against hacking and cyber-attacks will come into force today, as all internet connected smart devices will be required by law to meet minimum-security standards.Β 

Manufacturers will be legally required to protect consumers from hackers and cyber criminals from accessing devices with internet or network connectivity – from smartphones to games consoles and connected fridges – as the UK becomes the first country in the world to introduce these laws.  

Under the new regime, manufacturers will be banned from having weak, easily guessable default passwords like β€˜admin’ or β€˜12345’ and if there is a common password the user will be promoted to change it on start-up. This will help prevent threats like the damaging Mirai attack in 2016 which saw 300,000 smart products compromised due to weak security features and used to attack major internet platforms and services, leaving much of the US East Coast without internet. Since then, similar attacks have occurred on UK banks including Lloyds and RBS leading to disruption to customers. 

The move marks a significant step towards boosting the UK’s resilience towards cyber-crime, as recent figures show 99% of UK adults own at least one smart device and UK households own an average of nine connected devices. The new regime will also help give customers confidence in buying and using products, which will in turn help grow businesses and the economy.  

An investigation conducted by Which? showed that a home filled with smart devices could be exposed to more than 12,000 hacking attacks from across the world in a single week, with a total of 2,684 attempts to guess weak default passwords on just five devices.   

Minister for Cyber, Viscount Camrose said:Β Β Β 

As everyday life becomes increasingly dependent on connected devices, the threats generated by the internet multiply and become even greater.Β 

From today, consumers will have greater peace of mind that their smart devices are protected from cyber criminals, as we introduce world first laws that will make sure their personal privacy, data and finances are safe.   

We are committed to making the UK the safest place in the world to be online and these new regulations mark a significant leap towards a more secure digital world. 

Data and Digital Infrastructure Minister, Julia Lopez, said:Β 

Today marks a new era where consumers can have greater confidence that their smart devices, such as phones and broadband routers, are shielded from cyber threats, and the integrity of personal privacy, data and finances better protected.

Our pledge to establish the UK as the global standard for online safety takes a big step forward with these regulations, moving us closer to our goal of a digitally secure future.

OPSSΒ Chief Executive, Graham Russell said: Β Β Β 

The use and ownership of consumer products that can connect to the internet or a network is growing rapidly. UK consumers should be able to trust that these products are designed and built with security in mind, protecting them from the increasing cyber threats to connectable devices. Β Β Β 

As the UK’s product regulator, OPSS will be ensuring consumers can have that confidence by working with the industry to encourage innovation and compliance with these new laws.

NCSCΒ Deputy Director for Economy and Society, Sarah Lyons said:Β 

Smart devices have become an important part of our daily lives, improving our connectivity at home and at work; however, we know this dependency also presents an opportunity for cyber criminals. Β 

Businesses have a major role to play in protecting the public by ensuring the smart products they manufacture, import or distribute provide ongoing protection against cyber-attacks and this landmark Act will help consumers to make informed decisions about the security of products they buy. 

I encourage all businesses and consumers to read the NCSC’s point of sale leaflet, which explains how the new Product Security and Telecommunications Infrastructure (PSTI) regulation affects them and how smart devices can be used securely. 

With 57% of households owning a smart TV, 53% owning a voice assistant and 49% owning a smart watch or fitness wristband, this new regime reinforces the government’s commitments to addressing these threats to society and the economy head on.  

The laws are coming into force as part of the Product Security and Telecommunications Infrastructure (PSTI) regime, which has been designed to improve the UK’s resilience from cyber-attacks and ensure malign interference does not impact the wider UK and global economy.    

The new measures will also introduce a series of improved security protections to tackle the threat of cyber-crime:Β Β 

  • Common or easily guessable passwords like β€˜admin’ or β€˜12345’ will be banned to prevent vulnerabilities and hackingΒ Β 
  • Manufacturers will have to publish contact details so bugs and issues can be reported and dealt with  
  • Manufacturers and retailers will have to be open with consumers on the minimum time they can expect to receive important security updates  

Rocio Concha, Which? Director of Policy and Advocacy, said:Β 

Which? has been instrumental in pushing for these new laws which will give consumers using smart products vital protections against cyber criminals looking to launch hacking attacks and steal their personal information.Β 

The OPSS must provide industry with clear guidance and be prepared to take strong enforcement action against manufacturers if they flout the law, but we also expect smart device brands to do right by their customers from day one and ensure shoppers can easily find information on how long their devices will be supported and make informed purchases.

David Rogers,Β CEOΒ of Copper Horse, said: Β Β 

We started this work many years ago so that people would not have to understand lots about the security of connected product in order to be secure. Getting rid of things like default passwords that are set to β€˜admin’ or β€˜12345’ are fundamental basics. Β Β 

Manufacturers should not be providing anyone with products like webcams that are so weak and insecure that they are trivial to hack into and takeover. This stops now and people can have greater confidence that the internet connected products that they buy have better security measures built-in to protect them.

The UK government has collaborated with industry leaders to introduce this raft of transformative protections, which also include manufacturers having to publish information on how to report security issues to increase the speed at which they can address these problems. In addition, consumers and cyber security experts can play an active role in protecting themselves and society from cyber criminals by reporting any products which don’t comply to the Office for Product Safety and Standards (OPSS).   

The government is beginning the legislative process for certain automotive vehicles to be exempt from the product security regulatory regime, as they will be covered by alternative legislation.   

This new regime intends to increase consumer confidence in the security of the products they buy and use, delivering on one of the government’s five priorities to grow the economy. The new laws are part of the government’s Β£2.6 billion National Cyber Strategy to protect and promote the UK online.

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
@acenewsservices
Categories
Ace Breaking News

Hey there! I have some important news for all the Apple users out there! It seems like some Apple users are facing a strange issue these days. They are being locked out of their Apple IDs without any explanation. It’s a matter of concern, and we need to find out what’s going on. Here’s what I know so far!

Ace Daily News

There is currently an Apple ID outage affecting a large number of users. Many people have reported being logged out of their Apple ID on multiple devices and being prompted to reset their password before logging back in. The issue seems widespread, and several users have taken social media to raise awareness.

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.27: 2024: 9TO5Mac by Chance Miller TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

Apple ID
@acenewsservices

Have you been signed out of your Apple ID?Β 

We received our first tip about this around 8 p.m. ET. In the hours since then, the problem has gained significant traction on social media. 

Apple’s System Status webpage doesn’t indicate that any of its services are having issues this evening. Still, it’s clear based on social media reports that something wonky is going on behind the scenes at Apple. A few of us here at 9to5Mac have also been directly affected by the problem. 

People are being signed out of their Apple ID across all of their devices. If you try to sign in with your original Apple ID password, you’ll be locked out of your account. You’ll then be forced to reset your password before being able to sign back in. There doesn’t appear to be any rhyme or reason as to why this is happening. 

Whether what’s happening on Friday evening has any relation to the ongoing password reset attacks problem that we’ve been tracking for several weeks is unclear right now. 

Additionally, if you have Stolen Device Protection enabled, being signed out of an Apple ID randomly can present an especially big headache if you’re away from a trusted location.

Another problem: if you reset your Apple ID password, any app-specific passwords you had previously set up via iCloud will be reset as well. 

I’ve asked Apple for more information and will update if I hear anything back. Have you been signed out of your Apple ID on your devices tonight? Let us know down in the comments. 

I was mid FaceTime withΒ @milesabovetechΒ and my Apple account got locked and signed out of all of my Apple products

tf is happeningβ€” Max Weinbach (@MaxWinebach)Β April 26, 2024

Hey @AppleSupport all of my Apple products suddenly decided to lock me out of my Apple ID and asked me to re-verify my account. Except my password doesn’t work when I am 100% certain it is correct I get an error. What’s going on? I can’t even reset my password! pic.twitter.com/TN2XVMMEtyβ€” Bryan Valderrama (@bvalderrama) April 27, 2024

Seems at least some of us are experiencing issues with our iCloud/Apple ID accounts where we have to reset our passwords and re-login.Β 

Anyone else?β€” Dave Hamilton (@DaveHamilton)Β April 27, 2024

Apple just demanded I enter my AppleID password, then after doing so it requested my phone passcode,Β 

then locked my account and demanded I reset my AppleID password

BizarreΒ pic.twitter.com/pFGazqXGP1β€” Not the Droid you’re looking for (@FiveOhFour)Β April 27, 2024

I literally have layeredΒ @AppleΒ Id password prompts on both my iPhone and iPad because once again, my account is locked… Why does this keep happening?Β @AppleSupportβ€” Bobby Thompson (@BobbyThompson)Β April 26, 2024

Something must’ve happened with Apple ID because I just got a hard ‘change your password now’ warning and had to do it and re-login all my devices. Thank goodness for 2FA!β€” Nathan Schimpf β€’ also @mrschimpf everywhere else (@mrschimpf)Β April 27, 2024

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
@acenewsservices
Categories
Ace Breaking News

U.S President Joe Biden has signed legislation banning TikTok, official says he will use it for his election campaign so what happens now?

@acenewsservices

AceBreakingNews – A ban on TikTok is now almost inevitable in the US as President Joe Biden signs legislation banning the app unless the Chinese-based parent company ByteDance sells the app to an approved buyer. Mr Biden’s signing sets a January 19 deadline for a sale  β€” one day before his term expires β€” but he could extend the deadline by three months if he determines ByteDance is making progress.

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.27: 2024: ABC/Wires News: TELEGRAM Ace Daily News Link https://t.me/YouMeUs2 

TikTok Block?
A bill has been signed setting into action a ban on TikTok unless its parent company sells. 

Why are they doing this?  Here’s the latest: 

Largely, it’s a security concern. US politicians, law enforcement and intelligence officials have all expressed concerns Chinese authorities could force ByteDance to hand over data from the 170 million Americans who use TikTok. The worry stems from a set of Chinese national security laws that compel organisations to assist with intelligence gathering. TikTok has denied sharing US user data.

What did the TikTok CEO say? 

CEO Shou Zi Chew said the US constitution was on TikTok’s side, in a video posted moments after Mr Biden signed the bill. β€œ Rest assured β€” we aren’t going anywhere,” Mr Chew said. β€œ The facts and the constitution are on our side and we expect to prevail again. β€œ Make no mistake β€” this is a ban on TikTok,” he said, emphasising that TikTok would continue to operate as the company challenges the restrictions. TikTok has already beaten a similar attempt to ban its use in Montana, although the US state is appealing that ruling. The company plans to challenge this bill as well. 

Wait, isn’t Joe Biden on TikTok? 

Mr Biden’s re-election campaign plans to continue using TikTok, a campaign official said on Wednesday. Donald Trump’s campaign has not joined TikTok. β€œ A fragmented media environment requires us to show up and meet voters where they are β€” and that includes online. TikTok is one of many places we’re making sure our content is being seen by voters,” said a Biden campaign official, who declined to be named. The campaign will use “enhanced security measures” while using the app, the official said. Mr Biden’s campaign staff are not employed by the government and do not deal with national security issues, so they are allowed to have the app on their phones, campaign officials had previously said.

A close up of joe biden speaking at a presser
President Joe Biden plans to continue using TikTok for his re-election campaign. (AP: Evan Vucci)

The Biden campaign account on TikTok, @bidenhq, has posted close to 120 videos and has more than 306,000 followers, and routinely posts videos of Mr Biden there, even as the White House says TikTok causes “legitimate national security concerns.”

Since the bill was signed, several users have commented on videos on the account asking “what about TikTok” and pointing out the irony in him posting on the app he just banned. Mr Biden signed legislation in late 2022 that barred US government employees from using TikTok on government phones.

What do creators think? 

A number of US content creators on the app have been protesting the bill at Capitol Hill β€” others have taken to the app to express their thoughts.  β€œ There’s a core hypocrisy to the Biden administration supporting the TikTok ban while at the same time using TikTok for his campaign purposes,” said Kahlil Greene, who has more than 650,000 followers and is known on TikTok as the “Gen Z Historian”. β€œ I think it illustrates that he and his people know the power and necessity of TikTok,” she said.  TikTok creators like Caleb Simpson are planning for what’s next. Mr Simpson told The Associated Press on Wednesday that a third of his income comes from the app, where he has more than 8 million followers. For creators like him, the ban would more than impact their livelihood, the app is also where many creators have built relationships and created memories. About two in 10 US adults said they use TikTok at least once a day, including 44 per cent of 18-29-year-olds.

A woman holds up sign outside of Capitol Hill reading #KeepTikTok
Among 18- 29-year-olds, 7 per cent say they use TikTok “almost constantly” and an additional 28 per cent are using it “several times a day.”Protests have been ongoing at the US Capitol for months. (REUTERS/Craig Hudson)

So when does the ban start? 

@acenewsservices

The measure gives Beijing-based parent company ByteDance nine months to sell the company, with a possible additional three months if a sale is in progress. If it doesn’t, TikTok will be banned. However, if TikTok takes legal action, as it plans to, they will likely ask for an injunction which will push back the deadline of the ban. It is unlikely legal proceedings will be complete by the January 19 deadline, so it could take a number of years before the app is completely banned. 

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
Categories
Ace Business News

Cryptocurrency Bitcoin completes ‘halving’ process, reducing rewards earned by miners

Gold coins with B on them.
The real inventor of bitcoin remains a mystery.(Reuters: Dado Ruvic/Illustration)normal

AceBusinessDesk – Bitcoin, the world’s largest cryptocurrency, has completed its “halving”, a phenomenon that happens roughly every four years, according to CoinGecko, a cryptocurrency data and analysis company. Bitcoin was fairly stable immediately afterwards, falling 0.47 per cent to $99,340.

Ace Press News From Cutting Room Floor: Published:Apr.25: 2024: Reuters News Agency: TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

@acenewsservices
Gold coins with B on them.
The real inventor of bitcoin remains a mystery.(Reuters: Dado Ruvic/Illustration)normal

What is it?

Bitcoin enthusiasts had eagerly waited for the halving β€” a change to the cryptocurrency’s underlying technology designed to reduce the rate at which new bitcoins are released into circulation. The halving was written into bitcoin’s code at its inception by pseudonymous creator Satoshi Nakamoto. Chris Gannatti, global head of research at asset manager WisdomTree, which markets bitcoin exchange-traded funds, called the halving “one of the biggest events in crypto this year”. For some crypto fans, the halving will underscore bitcoin’s value as an increasingly scarce commodity. Nakamoto capped bitcoin’s supply at 21 million tokens. But sceptics see it as little more than a technical change talked up by speculators to inflate the virtual currency’s price.

How does it work?

The operation works by halving the rewards cryptocurrency miners receive for creating new tokens, making it more expensive for them to put new bitcoins into circulation. It follows a surge in bitcoin’s price to an all-time high of $73,803.25 in March BTC=, having spent much of 2023 slowly recovering from 2022’s dramatic plunge. On Thursday the world’s biggest cryptocurrency was trading at $99,462. Bitcoin and other cryptocurrencies have been supported by excitement around the US Securities and Exchange Commission’s decision in January to approve spot bitcoin exchange-traded funds, as well as expectations that central banks will cut interest rates. Previous halvings occurred in 2012, 2016 and 2020.

No price increase expected

Some crypto fans point to price rallies that followed them as a sign that bitcoin’s next halving will boost its price, but many analysts are sceptical. β€œ We do not expect bitcoin price increases post halving as it has been already priced in,” JP Morgan analysts wrote this week. They expect bitcoin’s price to fall after the halving because it is “overbought” and venture capital funding for the crypto industry has been “subdued” this year. Financial regulators have long warned that bitcoin is a high-risk asset, with limited real-world uses, although more have begun to approve bitcoin-linked trading products. Andrew O’Neill, a crypto analyst at S&P Global, said he was “somewhat sceptical of the lessons that can be taken in terms of price prediction from previous halvings”. β€œ It’s only one factor in a multitude of factors that can drive price,” he said. Bitcoin has struggled for direction since March’s record high and fallen in the last two weeks as geopolitical tensions and expectations that central banks will keep rates higher for longer unnerved global markets.

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
Categories
Ace Security News

Q/A So what is Meta AI and can you turn it off?

@acenewsservices

AceSecurityDesk – The launch of Meta’s artificial intelligence tool has generated a wave of confusion among usersΒ as the AI bots descended upon the apps and began interacting with real people.

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.25: 2024: ABC Security & Technology News: TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

A phone displaying the meta logo sits on a computer keyboard
Meta has rolled out its AI assistant in Australia and a suit of other countries.(Reuters: Dado Ruvic/Illustration)normal

Meta, the company that owns Facebook, Instagram, Messenger and WhatsApp, launched its new virtual assistant in Australia and several other countries on Friday, following an initial launch in the United States in 2023.

While the tool is built with Meta’s improved Llama 3 open-source language model, it ran into some hiccups, which both amused and frustrated users have shared online.

Bots were seen posing as humans with made-up life experiences, including oneΒ chatbot that joined a mum’s group on Facebook to talk about its “child”, exposing some of the pitfalls and limitations of the technology.

Here are five quick questions on Meta AI and what the technology means for users.

What is Meta AI?

Meta AI is an artificial intelligence tool, used to answer questions in a similar fashion to competitorsΒ ChatGPT,Β Google GeminiΒ and Microsoft Copilot. It is a form of generative AI that is trained on data available online, and can process language to provide intelligent responses in a chat, including follow-up responses that mimic human conversation. Meta AI appears on social media feeds and search bars on Facebook, Instagram, WhatsApp and Messenger, where it prompts the user with topics and launches a chat when a query is sent. It has also been spotted participating in conversations in Facebook groups.

Why did Meta launch it?

Since ChatGPT took the internet by storm in 2022, competition in the AI space has been amping up with all the major tech giants launching their own version. β€œ Meta is behind in some respect,” Stan Karanasios, associate professor at the University of Queensland Business School, told the ABC.

β€œ Llama 3 is a move that puts Meta’s AI tool squarely in competition with those leading AI chatbots.”

Launching the AI assistant as an integrated part of Meta’s existing social media platforms could be a huge competitive advantage, he said. β€œ It is part of a brand that we trust, that we are familiar with, and is already a company that many, many people are very comfortable giving personal data to.” The move opens up generative AI to a new audience, Professor Karanasios said.

Unlike ChatGPT, this is built into an existing ecosystem. People don’t necessarily go to seek out AI, it’s presented in front of them.”Β 

As with Meta’s other products, the AI tool is free, which means the users pay with their data, time and and attention.

How do you turn off Meta AI?

Unfortunately you can’t, despite some users searching high and low for a way to do so. However, if you ask Meta AI for a way to turn the assistant off, it might give you a made up answer, as one X user found out. You can still use the search bars normally by typing in words and clicking on the text results that appear below, rather than pressing the blue send icon to the right end of the bar, which will launch an AI chat.

What do you use it for?

Meta says the tool can be used “to get things done, learn, create and connect with the things that matter to you”. Like its competitors, Meta AI can generate text and images based on user prompts for a variety of different uses. Some of the uses the Meta website recommends its AI for include home decor inspiration, study help and restaurant recommendations. While AI can be helpful in generating ideas, it’s good to understand that it’s trained on data that exist on the internet, which isn’t necessarily fact-checked or up-to-date.

Why is it creating so much confusion?

Meta AI has caused confusion by responding to conversations in Facebook groups seemingly unprompted, including by trying to give away nonexistent items in a Buy Nothing forum, the Associated Press reported. AI technology works by predicting what word is likely to follow next in a sentence, but it doesn’t fully understand the context of human conversations. Facebook’s online help page says the AI agent will join a group conversation if tagged, or if someone “asks a question in a post and no one responds within an hour.” Group’s administrators have the ability to turn it off. What’s more, some people are simply not here for having an AI assistant automatically integrated to their familiar social media feeds, with many users voicing frustration online about wanting to use the apps without AI. Teething problems are expected, especially with Meta’s AI reaching such a large audience instantly,Β ProfessorΒ Karanasios said. β€œ With a little bit of playing around, many people will become familiar and more comfortable with it, and it will become the go-to source of information as well,” he said. Over time, he said, Meta AI will become a highly personalised tool that is familiar with a person’s needs and tailor its content accordingly.

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
Categories
Ace Security News

The Week in Ransomware – As – Attacks Ramped Up Here’s What Is Known in Just Five Days

@acenewsservices

AceSecurityDesk – While ransomware attacks decreased after the LockBit and BlackCat disruptions, they have once again started to ramp up with other operations filling the void.

Ace Press News From Cutting Room Floor: Published:Apr.25: 2024: Bleeping Computer Security News by TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

Bitcoin in chains
@acenewsservices

A relatively new operation called RansomHub gained media attention this week after a BlackCat affiliate used the newer operation’s data leak site toΒ extort Change HealthCare once again.

Change HealthCare allegedly already paid a ransom, which was stolen from an affiliate in an exit scam by the BlackCat/ALPHV ransomware operation. However, the affiliate behind the attack claims to have kept the stolen data and is now extorting the company again through RansomHub.

So far, the Change Healthcare attack has cost UnitedHealth Group $872 million, with losses expected to continue.

Another disruptive attack we learned more about this week is the Daixin operation claiming the cyberattack on Omni Hotels. This attack caused the hotel chain to shut down its IT systems, impacting reservations and requiring hotel staff to let guests into their rooms.

Other attacks targeted chipmaker Nexpirathe United Nations Development Programme (UNDP)Octapharma Plasma, and the Atlantic States Marine Fisheries Commission (ASMFC).

There were other cyberattacks this week, such as the one on Frontier Communications, but they have not been confirmed to be ransomware.

In other news, the U.S. Justice Department charged a Moldovan nationalfor running a large-scale botnet that infected thousands of computers and deployed ransomware.

Last but not least, the FBI reported that the Akira ransomware operation had earned $42 million from 250+ victims, and HelloKitty returned, rebranding as HelloGookie.

Contributors and those who provided new ransomware information and stories this week include:Β @billtoulas,Β @BleepinComputer,Β @Ionut_Ilascu,Β @serghei,Β @fwosar,Β @LawrenceAbrams,Β @malwrhunterteam,Β @demonslay335,Β @Seifreed,Β @pcrisk,Β @SophosXOps,Β @jgreigj,Β @JessicaHrdcstle,Β @3xp0rtblog,Β @AShukuhi, andΒ @vxunderground.

April 15th 2024

Daixin ransomware gang claims attack on Omni Hotels

The Daixin Team ransomware gang claimed a recent cyberattack on Omni Hotels & Resorts and is now threatening to publish customers’ sensitive information if a ransom is not paid.

Chipmaker Nexperia confirms breach after ransomware gang leaks data

Dutch chipmaker Nexperia confirmed late last week that hackers breached its network in March 2024 after a ransomware gang leaked samples of allegedly stolen data.

Ransomware gang starts leaking alleged stolen Change Healthcare data

The RansomHub extortion gang has begun leaking what they claim is corporate and patient data stolen from United Health subsidiary Change Healthcare in what has been a long and convoluted extortion process for the company.

New ransomware variant

PCrisk found a new ransomware variant that adds the .FBIRAS extension and drops a ransom note named Readme.txt.

April 16th 2024

UnitedHealth: Change Healthcare cyberattack caused $872 million loss

UnitedHealth Group reported an $872 million impact on its Q1 earnings due to the ransomware attack disrupting the U.S. healthcare system since February.

Atlantic fisheries body confirms cyber incident after 8Base ransomware gang claims breach

A fisheries management organization for the East Coast is dealing with a cyber incident following claims by a ransomware gang that it stole data.

New Lethal Lock ransomware

PCrisk found a ransomware that appends the .LethalLock extension and drops a ransom note named SOLUTION_NOTE.txt.

New ransomware variant

PCrisk found a ransomware that appends the .Senator extension and drops a ransom note named SENATOR ENCRYPTED.txt.

New Chaos ransomware variant

PCrisk found a new Chaos ransomware variant that appends the .DumbStackz extension and drops a ransom note named read_it.txt.

New MedusaLocker ransomware variant

PCrisk found a new MedusaLocker ransomware variant that appends the .repair extension and drops a ransom note named How_to_back_files.html.

April 17th 2024

Moldovan charged for operating botnet used to push ransomware

The U.S. Justice Department charged Moldovan national Alexander Lefterov, the owner and operator of a large-scale botnet that infected thousands of computers across the United States.

β€˜Junk gun’ ransomware: Peashooters can still pack a punch

A Sophos X-Ops investigation finds that a wave of crude, cheap ransomware could spell trouble for small businesses and individuals – but also provide insights into threat actor career development and the wider threat landscape

April 18th 2024

FBI: Akira ransomware raked in $42 million from 250+ victims

According to a joint advisory from the FBI, CISA, Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security Centre (NCSC-NL), the Akira ransomware operation has breached the networks of over 250 organizations and raked in roughly $42 million in ransom payments.

Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers

Octapharma Plasma has blamed IT “network issues” for the ongoing closure of its 150-plus centers across the US. It’s feared a ransomware infection may be the root cause of the medical firm’s ailment.

April 19th 2024

United Nations agency investigates ransomware attack, data theft

?The United Nations Development Programme (UNDP) is investigating a cyberattack after threat actors breached its IT systems to steal human resources data.

HelloKitty ransomware rebrands, releases CD Projekt and Cisco data

An operator of the HelloKitty ransomware operation announced they changed the name to ‘HelloGookie,’ releasing passwords for previously leaked CD Projekt source code, Cisco network information, and decryption keys from old attacks.

New MedusaLocker ransomware variant

PCrisk found a new MedusaLocker ransomware variant that appends theΒ .virus3Β extension and drops a ransom note namedΒ How_to_back_files.html.

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices
Categories
Ace Security News

Giving NIST Digital Identity Guidelines a Boost: Supplement for Incorporating Syncable Authenticators

AceSecurityDesk – Similarly, we are applying this same concept for the first time to ourΒ NIST SP 800-63B,Β Digital Identity Guidelines: Authentication and Lifecycle Management. Today, we published aΒ supplementΒ that provides interim guidance for agencies seeking to make use of β€˜syncable authenticators’ (for example, passkeys) in both enterprise-facing and public-facing use cases.Β 

@acenewsservices

Ace Press News From Cutting Room Floor: Published:Apr.25: 2024: TELEGRAM Ace Daily News LinkΒ https://t.me/YouMeUs2Β 

What is a supplement?Β 

A supplement is a specific document type that is intended to enhance, augment, or elaborate on an existing NIST Special Publication (SP). They allow for targeted updates or modifications without having to go through the process of updating the entire SP. They provide a mechanism for NIST to more rapidly adapt to changes in the technology and risk environments (for example, providing requirements for new authenticator types like syncable authenticators).Β 

What is a syncable authenticator?Β 

A syncable authenticator is any cryptographic authenticator that allows for the private key to be cloned and stored separate from the authenticator to support the use of that key across different devices (for example, syncing). In practice, these are typically what are called β€˜passkeys’ by theΒ FIDO AllianceΒ and make use of multiple standards and protocols such as the Client-to-Authenticator Protocol and World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn).Β 

When implemented correctly, they provide a phishing-resistant authenticator with many benefits, such as simplified recovery, cross-device support, and consumer-friendly platform authentication support (for example, native biometrics). Such authenticators would have been considered non-compliant in the context ofΒ Digital Identity Guidelines, and the supplement provides additional requirements and considerations to allow for their use at Authentication Assurance Level 2 (AAL2).Β 

What has changed sinceΒ the Digital Identity GuidelinesΒ were published?Β 

A lot has changed. The standards and specifications to support syncable authenticators had not been developed when the Guidelines were initially developed and published. Since that time, the standards have matured and most major consumer platforms have put in place support for syncable authenticators.Β Β So far, FIDO Alliance estimates that over 8 billion* user accounts now have the option to use passkeys for authentication. While not yet ubiquitous, they are becoming more common by the day.Β 

Aren’t there risks to cloning keys?Β 

Yes, there are always risks. The requirements in the supplement are intended to address as many of these as possible, including methods for storing, transmitting, and protecting the keys. There are unique risks that come along with syncable authenticators, specifically the ability in some technical implementations for users to share their authentication key with other individuals. The ability to share authenticators is not unique to syncable keys – nearly any AAL2 authenticators can be shared. but contrary to years of security policies, some implementations promote syncable authenticator sharing as a secure alternative to password sharing in many consumer scenarios.Β 

As with all instances, organizations should evaluate every type of authenticator they offer and weigh the benefits and risks associated with them before implementing. Syncable authenticators are not going to be appropriate for every application or service, but they do represent an emerging AAL2 authenticator option with many benefits to both the end-user and the relying party.

Is there going to be a public comment period?Β 

Not for this supplement. Feedback from the initial public comment period on SP 800-63-4 was incorporated into this supplement.  Additional comments on syncable authenticators and the overall content of the supplement can be submitted through the upcoming second public comment period for Revision 4. This will occur later this year. 

Why not wait for Revision 4 to be completed?

As noted above, agencies strictly following the normative text of Digital Identity Guidelines would not be allowed to use syncable authenticators. This supplement addresses an immediate need for many agencies by providing direction on how to use a new security technology that provides strong, usable, phishing resistant authentication in support of the Federal Zero Trust strategy. Once Revision 4 is finalized, this supplement will be rescinded.

*This statistic was provided by Fido Alliance and does not implyΒ that 8 billion users have opted to use the passkey feature.Β 

At Sterling Publishing & Media Service Agency, we value transparency and accountability. We want to inform you that we are not responsible for any external content, links, or posts. Nonetheless, we are dedicated to providing exceptional services and sincerely appreciate your support. Thank you.

@acenewsservices