news aggregator
Users' sluggish migration of critical apps mean current deadline not workable, says analyst
By 2030, 40 percent of SAP customers currently using its legacy ERP systems will still not have migrated to the latest software, prompting the business apps giant to rethink its support deadline.…
Economy-boosting bit barn? Not in my back yard, some locals expected to say
The British government is pressing ahead with "AI Growth Zones" amid fears the rush to build datacenters to power AI could backfire and leave the countryside littered with expensive high-tech "white elephants."…
Research after Apple Intelligence fiasco shows bots still regularly make stuff up
Still smarting from Apple Intelligence butchering a headline, the BBC has published research into how accurately AI assistants summarize news – and the results don't make for happy reading.…
Eric Council Jr. pleaded guilty to identity theft and access device fraud after hijacking the SEC's X account to falsely announce Bitcoin ETF approval. He was compensated in Bitcoin by co-conspirators, and while the Justice Department continues its investigation, Council faces up to five years in prison. Gizmodo reports: According to the Justice Department, Council accessed the SEC's account using an attack called SIM swapping, in which a perpetrator uses social engineering to trick a phone carrier's customer service representatives into transferring an individual's phone number to a new device. Basically, they call into a support line and use pieces of personal information about a victim they have gathered online to convince the representative they are the person they are targeting. Once perpetrators take the number and can begin receiving text messages, they are able to reset the passwords of accounts on services like X. It is not really a "hack" in the traditional sense that they are not finding flaws in software but rather exploiting human trust.
Unfortunately for individuals like Council, all Bitcoin transactions are logged on a blockchain for anyone to see, leaving a trail of breadcrumbs for investigators to find. If he did make out with a lot of crypto, it would be hard to keep it hidden forever. Council allegedly did not post the message himself to the SEC's X account, but conducted the SIM swap and left the rest of the work to his co-conspirators who compensated Council in the form of, of course, Bitcoin. The price of the cryptocurrency rose by $1,000 after the fake announcement, according to the Justice Department, and fell by $2,000 after the SEC issued a correction. That could have led to a big windfall depending on how much Bitcoin the perpetrators held at the time.
Read more of this story at Slashdot.
Four months since cloud drive kicked the bucket, but resolution comes today... hopefully
Interview How long can a cloud storage outage continue before customers finally give up the ghost? Management at Murena – /e/OS maker – must have wrestled with this at night, though they hope a fix is around the corner.…
Einstein’s spooky action at a distance just got an upgrade
Oxford University researchers have taken a significant step toward large-scale distributed quantum computing by demonstrating the first successful quantum teleportation of a controlled quantum gate between two modules.…
If only the joy of missing out was easier to achieve
Column I've never seriously accepted the maxim "ignorance is bliss". Now I'm less sure.…
In August 1990, two hikers in Scotland captured photographs of a mysterious diamond-shaped aircraft accompanied by a Harrier jet, but the images and story were suppressed by the Ministry of Defence (MoD) for decades. Was it a prank, a hoax, an optical illusion or something else entirely? The Guardian's Daniel Lavelle reports on "what really happened in Calvine." Here's an excerpt: On a misty evening in August 1990, two men hiking on the moors surrounding Calvine, a pretty hamlet in Perth and Kinross, claimed to have seen a giant diamond-shaped aircraft flying above them. It apparently had no clear means of propulsion and left no smoke plume; it was silent and static, as if frozen in time. Terrified, they hit the ground and scrambled for cover behind a tree. Then a Harrier fighter jet roared into view, circling the diamond as if sizing it up for a scuffle. One of the men snapped a series of photographs just before the bizarre craft shot away vertically and disappeared.
Craig Lindsay was a press officer at the RAF base in Pitreavie Castle in Dunfermline, 50 miles away, when the Daily Record got in touch a few days later. The hikers, who worked as chefs at Fisher's Hotel in Pitlochry, had sent six photos of the diamond to the newspaper and told their story. The Record's picture editor, Andy Allen, sent Lindsay the best of the bunch. Lindsay had never seen such a clear photograph of a supposed UFO, so he forwarded the picture to the Ministry of Defence (MoD), which told him to ask the Record to send the other five photographs and their negatives. The MoD also instructed him to phone the hikers, which he did. One of them told Lindsay the whole story: the diamond, the jet, how it levitated eerily with no sound and accelerated with no obvious propellant. The MoD told Lindsay to leave the case with them. He pushed the diamond to the back of his mind.
That autumn, Lindsay attended a routine meeting in London. On his lunch break, he went for a wander around the MoD's offices and saw something familiar. "There, on the wall in front of me, was a great big poster-size print of the best of them [the photographs]. So, I spoke to the guys that were there and I asked them what their other photographs were like." The ministry's staff placed the other photographs on a windowsill. The snaps showed the Harrier jet moving from the right side of the frame to the left, while the diamond didn't move an inch. He quizzed some of the specialists who had investigated the photos. They told him there was no evidence of a hoax, but they didn't know what the diamond was. "I gradually forgot all about the thing," says Lindsay. "Nothing had appeared from the first inquiry ... I assumed that everything had just been forgotten." The Record didn't run the story, the hikers never spoke publicly about the photos and the images weren't seen by the public for 32 years. "It is the 35th anniversary of what has been described as the best UFO photo ever taken. Now is the time to come forward and tell us what really happened," says Prof David Clarke, a lecturer at Sheffield Hallam University who worked as a reporter in the 1990s.
Read more of this story at Slashdot.
Not all bad news for Microsoft as Australian agency also found strong ROI and some unexpected upsides
Australia’s Department of the Treasury has found that Microsoft’s Copilot can easily deliver return on investment, but staff exposed to the AI assistant came away from the experience less confident it will help them at work.…
An anonymous reader quotes a report from Ars Technica: On Monday, researcher Johann Rehberger demonstrated a new way to override prompt injection defenses Google developers have built into Gemini -- specifically, defenses that restrict the invocation of Google Workspace or other sensitive tools when processing untrusted data, such as incoming emails or shared documents. The result of Rehberger's attack is the permanent planting of long-term memories that will be present in all future sessions, opening the potential for the chatbot to act on false information or instructions in perpetuity. [...] The hack Rehberger presented on Monday combines some of these same elements to plant false memories in Gemini Advanced, a premium version of the Google chatbot available through a paid subscription. The researcher described the flow of the new attack as:
1. A user uploads and asks Gemini to summarize a document (this document could come from anywhere and has to be considered untrusted).
2. The document contains hidden instructions that manipulate the summarization process.
3. The summary that Gemini creates includes a covert request to save specific user data if the user responds with certain trigger words (e.g., "yes," "sure," or "no").
4. If the user replies with the trigger word, Gemini is tricked, and it saves the attacker's chosen information to long-term memory.
As the following video shows, Gemini took the bait and now permanently "remembers" the user being a 102-year-old flat earther who believes they inhabit the dystopic simulated world portrayed in The Matrix. Based on lessons learned previously, developers had already trained Gemini to resist indirect prompts instructing it to make changes to an account's long-term memories without explicit directions from the user. By introducing a condition to the instruction that it be performed only after the user says or does some variable X, which they were likely to take anyway, Rehberger easily cleared that safety barrier. Google responded in a statement to Ars: "In this instance, the probability was low because it relied on phishing or otherwise tricking the user into summarizing a malicious document and then invoking the material injected by the attacker. The impact was low because the Gemini memory functionality has limited impact on a user session. As this was not a scalable, specific vector of abuse, we ended up at Low/Low. As always, we appreciate the researcher reaching out to us and reporting this issue."
Rehberger noted that Gemini notifies users of new long-term memory entries, allowing them to detect and remove unauthorized additions. Though, he still questioned Google's assessment, writing: "Memory corruption in computers is pretty bad, and I think the same applies here to LLMs apps. Like the AI might not show a user certain info or not talk about certain things or feed the user misinformation, etc. The good thing is that the memory updates don't happen entirely silently -- the user at least sees a message about it (although many might ignore)."
Read more of this story at Slashdot.
Don't relax just yet: Redmond has made some certificate-handling changes that could trip unprepared admins
Patch Tuesday Microsoft’s February patch collection is mercifully smaller than January’s mega-dump. But don't get too relaxed – some deserve close attention, and other vendors have stepped in with plenty more fixes.…
You gotta fight ... for your Reuters ... to party
Thomson Reuters has won a partial summary judgment in a copyright case against shuttered AI firm Ross Intelligence, a decision that disallows fair use as a defense for training models on proprietary data without permission.…
Chinese animated film Ne Zha 2 has broken multiple box office records, becoming China's highest-grossing film of all time and the first non-Hollywood movie to surpass $1 billion in a single market. From a report: Helmed by Yang Yu, known as Jiaozi, the film hit the big screen during the lucrative Chinese New Year frame on Jan. 29, surpassing 2017's "Wolf Warrior 2" to become China's most-watched film. Meanwhile, its total revenue (including presales) hit 8 billion yuan (about 1.12 billion U.S. dollars) by Sunday. In just eight days and five hours after its release, "Ne Zha 2" became China's highest-grossing film of all time on Thursday, exceeding the 5.77 billion yuan record set by "The Battle at Lake Changjin." A day later, it overtook "Star Wars: The Force Awakens" to become the highest-grossing film ever in a single market, reaching over 6.79 billion yuan (including presales) in China on Friday.
A follow-up to the animated sensation "Ne Zha," which grossed 5 billion yuan and topped the country's box office charts in 2019, the sequel has captivated audiences with its breathtaking visuals, rich storytelling and deep cultural resonance. The record-breaking run makes "Ne Zha 2" not just a box office titan but a cultural phenomenon, further underscoring China's ability to produce homegrown blockbusters that strike a chord with domestic audiences. You can watch the international trailer on YouTube.
Read more of this story at Slashdot.
Will the Pentagon get Luckey with a new IVAS vendor?
Microsoft plans to quit developing augmented-reality headsets for the US Army and have Oculus founder Palmer Luckey's Anduril Industries take over the gig.…
Alan W. Filion, an 18-year-old from Lancaster, Calif., was sentenced to four years in prison for making nearly 400 false bomb threats and threats of violence (source may be paywalled; alternative source) to religious institutions, schools, universities and homes across the country. The New York Times reports: The threatening calls Mr. Filion made would often cause large deployments of police officers to a targeted location, the Justice Department said in a news release. In some cases, officers would enter people's homes with their weapons drawn and detain those inside. In January 2023, Mr. Filion wrote on social media that his swats had often led the police to "drag the victim and their families out of the house cuff them and search the house for dead bodies."
Investigators linked Mr. Filion to over 375 swatting calls made in several states, including one that he made to the police in Sanford, Fla., saying that he would commit a mass shooting at the Masjid Al Hayy Mosque. During the call, he played audio of gunfire in the background. Mr. Filion was arrested in California in January 2024, and was then extradited to Florida to face state charges for making that threat. Mr. Filion began swatting for recreation in August 2022 before making it into a business, the Justice Department said. The teenager became a "serial swatter" and would make social media posts about his "swatting-for-a-fee" services, according to prosecutors.
In addition to pleading guilty to the false threat against the mosque in Florida, Mr. Filion pleaded guilty in three other swatting cases: a mass shooting threat to a public school in Washington State in October 2022; a bomb threat call to a historically Black college or university in Florida in May 2023; and a July 2023 call in which he claimed to be a federal law enforcement officer in Texas and told dispatchers that he had killed his mother and would kill any responding officers.
Read more of this story at Slashdot.
Today, the KDE Project announced the release of KDE Plasma 6.3, featuring improved fractional scaling, enhanced Night Light color accuracy, better CPU usage monitoring, and various UI and security refinements.
Some of the key features of Plasma 6.3 include:
- Improved fractional scaling with KWin to lead to an all-around better desktop experience with fractional scaling as well as when making use of KWin's zoom effect.
- Screen colors are more accurate with the KDE Night Light feature.
- CPU usage monitoring within the KDE System Monitor is now more accurate and consuming fewer CPU resources.
- KDE will now present a notification when the kernel terminated an app because the system ran out of memory.
- Various improvements to the Discover app, including a security enhancement around sandboxed apps.
- The drawing tablet area of KDE System Settings has been overhauled with new features and refinements.
- Many other enhancements and fixes throughout KDE Plasma 6.3. You can read the announcement here.
Read more of this story at Slashdot.
Numerous systemic vulnerabilities could scuttle $5.4T industry
Despite the escalating cyber threats targeting America's maritime transportation system, the US Coast Guard still lacks a comprehensive strategy to secure this critical infrastructure - nor does it have reliable access to data on cybersecurity vulnerabilities and past attacks, the Government Accountability Office (GAO) warns.…
An anonymous reader quotes a report from TechCrunch: Since 2022, blogging site Tumblr has been teasing its plans to integrate with the fediverse -- the open social web powered by the protocol ActivityPub also used by Mastodon, Threads, Flipboard, and others. Now, the Automattic-owned blogging platform is sharing more information about when and how that integration could actually happen. As it turns out, the current plan to tie Tumblr into the open social web will come about by way of the site's planned move to the WordPress infrastructure. Automattic confirmed to TechCrunch that when the migration is complete, every Tumblr user will be able to federate their blog via ActivityPub, just as every WordPress.com user can today. The company noted that the migration could also allow for other open web integrations, like giving Tumblr users a way to run other custom plug-ins or themes.
Last summer, Automattic announced it would move its half a billion blogs to WordPress, to make it easier for the company to build tools and features that worked across both services, while also allowing Tumblr to take advantage of the open source developments from WordPress.org. Though the WordPress community itself is in a state of upheaval, ultimately running Tumblr's back end on WordPress would allow for greater efficiencies, while not changing the interface and experience that Tumblr's user base has grown to love. Automattic declined to share a time frame as to when the migration would be complete, given its scale, but a rep for the company called the progress so far "exciting." Automattic didn't say if it would consider integrating with the AT Protocol that powers Bluesky.
Read more of this story at Slashdot.
Which is why Cisco is adding these Pensando DPUs to more switches
Cisco is cramming into more of its switches Pensando data processing units (DPUs) from AMD, which will be dedicated to handling security, storage, and other tasks.…
For the first time since 2004, PassMark's global CPU benchmark data shows a decline in average processor performance, with laptop CPUs dropping 3.4% and desktop CPUs falling 0.5% year-over-year. Tom's Hardware reports: We see the biggest drop in laptop CPU performance results. PassMark recorded an average result of 14,632 across 101,316 samples last year. But, in 2025, the average score sat at an average of 14,130 points between 25,541 samples, decreasing the average score by 3.4%. The average desktop PC result in 2024 netted 26,436 points for 186,053 samples. But for 2025, the average score currently sits at 26,311 points for over 47,810 samples -- a 0.5% drop from last year. While that drop is small, we should only see a continued progression of faster performance.
[...] Passmark itself mused on X (formerly Twitter) that it could be that people are switching to more affordable machines that deliver lower power and performance. Or maybe Windows 11 is depressing performance scores versus Windows 10, especially as people transition to it with the upcoming demise of the latter. We've certainly seen plenty of examples of reduced performance in gaming with some of the newer versions of Windows 11, particularly as Intel and AMD struggled to upstream needed updates into the OS. [...] PassMark also muses that bloatware could contribute to the sudden decline in performance, but that seems like a longshot.
Read more of this story at Slashdot.
Pages
|