Category: Technology

  • OpenAI, Meta And Other Tech Giants Sign Effort To Fight AI Election Interference |

    New Delhi: A group of 20 tech companies announced on Friday they have agreed to work together to prevent deceptive artificial-intelligence content from interfering with elections across the globe this year.

    The rapid growth of generative artificial intelligence (AI), which can create text, images and video in seconds in response to prompts, has heightened fears that the new technology could be used to sway major elections this year, as more than half of the world’s The population is set to head to the polls. (Also Read: OpenAI Can’t Register GPT As Trademark, Rules US Patent Office)

    Signatories of the tech accord, which was announced at the Munich Security Conference, include companies that are building generative AI models used to create content, including OpenAI, Microsoft and Adobe. Other signatories include social media platforms that will face the challenge of keeping harmful content off their sites, such as Meta Platforms, TikTok and X, formerly known as Twitter. (Also Read: You Can Now Remix YouTube Music Videos In Shorts – Here’s How!)

    The agreement includes commitments to collaborate on developing tools for detecting misleading AI-generated images, video and audio, creating public awareness campaigns to educate voters on deceptive content and taking action on such content on their services.

    Technology to identify AI-generated content or certify its origin could include watermarking or embedding metadata, the companies said. The accord did not specify a timeline for meeting the commitments or how each company would implement them.

    “I think the utility of this (accord) is the breadth of the companies signing up to it,” said Nick Clegg, president of global affairs at Meta Platforms. “It’s all good and well if individual platforms develop new policies of detection, provenance, labeling, watermarking and so on, but unless there is a wider commitment to do so in a shared interoperable way, we’re going to be stuck with a hodgepodge. of different commitments,” Clegg said.

    Generative AI is already being used to influence politics and even convince people not to vote. In January, a robocall using fake audio of US President Joe Biden circulated to New Hampshire voters, urging them to stay home during the state’s presidential primary election.

    Despite the popularity of text-generation tools like OpenAI’s ChatGPT, the tech companies will focus on preventing harmful effects of AI photos, videos and audio, partly because people tend to have more skepticism with text, said Dana Rao, Adobe’s chief trust officer, in an interview.

    “There’s an emotional connection to audio, video and images,” he said. “Your brain is wired to believe that kind of media.”

  • MNCs’s Employee Loses Rs 80 Lakh To Man She Met On Matrimonial Site |

    By clicking “Accept All Cookies”, you agree to the storing of cookies on your device and the processing of information obtained via those cookies (including about your preferences, device and online activity) by us and our commercial partners to enhance site navigation, personalize ads, analyze site usage, and assist in our marketing efforts. More information can be found in our Cookies and Privacy Policy. You can amend your cookie settings to reject non-essential cookies by clicking Cookie Settings below.

    Accept All Cookies

    Manage Consent Preferences

  • Indian Websites, Applications Saw Over 5.14 Billion Cyberattacks In 2023: Report |

    New Delhi: Indian websites and applications witnessed over 5.14 billion cyber attacks last year, especially targeting the healthcare sector, a new report revealed on Thursday. With a 10 times increase in attacks, software-as-a-service (SaaS) companies in India emerged as key targets for cybercriminals due to the high-value customer data they store, according to the report by Indusface, a TCGF II (Tata Capital funded application security company.

    The retail and e-commerce industries were mostly targets of carding attacks. Other industries analyzed, include IT services and consulting, manufacturing, telecommunications, marketing, and advertising. (Also Read: From Investment To Income: A Rs 5-7 Lakh Investment In This Business Idea Could Yield Rs 1.5 Lakh Monthly Returns)

    “Along with card cracking or credential stuffing, we also saw bot-driven, low-rate Distributed Denial of Service (DDoS) attacks being used more frequently,” said Ashish Tandon, CEO of Indusface. (Also Read: Japan Loses Its Position As The World’s Third-Largest Economy To Germany)

    Coming to mitigation he added, “We have seen reasonable success where AI models are alerting our managed services team of possible anomalies and the team is able to quickly take mitigation measures.”

    Indusface’s ‘AppTrana’ network blocked 6.8 billion attacks globally, with 5.14 billion of those targeting Indian enterprises, SMEs, and government organizations. Cyberattacks exhibited an average quarterly spike of 63 percent from Q1 to Q4 in 2023, underscoring the urgency for robust cybersecurity measures, said the report.

    The report sheds light on the vulnerability of various industries, particularly the healthcare sector, where 100 percent of websites faced bot attacks, and the banking, finance, and insurance sectors, where 90 percent of entities experienced similar attacks.

    In 2023, eight out of 10 sites faced targeted bot attacks, witnessing a 46 percent increase each quarter, totaling over 467 million bot attacks. Major cyber attack origins, apart from India, included the US, the UK, Russia, Germany, and Singapore, the report mentioned.

  • Meta CEO Mark Zuckerberg Tries Apple Vision Pro, Shares Video On Instagram |

    New Delhi: Meta Founder and CEO Mark Zuckerberg tried Apple’s mixed reality (MR) headset, Vision Pro, and said on Wednesday that his company’s Quest 3 AR/VR headset is a better product, less expensive, and more immersive. Zuckerberg shared a video on the social media platform Instagram and said that Quest 3 is seven times less expensive.

    “Quest provides better value and is the better product. Period. Overall, Quest is better for the vast majority of things that people use mixed reality for,” he mentioned. He said that Quest 3 weighs 120 grams less, making it more comfortable to wear for longer periods. Zuckerberg said it allows for greater motion due to its lack of a wired battery pack and wider field of view than Apple Vision Pro. (Also Read: OpenAI’s ChatGPT Is Testing New ‘Memory’ Feature With Select Users)

    “I also noticed that Apple’s headset has motion blur as you move around while Quest is just a lot crisper. Vision Pro’s screen does have a higher resolution, and that’s really nice,” the Meta CEO mentioned.


    But he was “surprised by how many trade-offs” Apple had to make to the quality of the device, the comfort, ergonomics, and other aspects of the display in order to achieve that level of input.

    “Quest supports precision controllers that are great for games. Both headsets support hand tracking. Apple’s eye tracking is really nice. We actually had those sensors back in Quest Pro, we took them out for Quest 3, and we’re going to bring them. back in the future,” said Zuckerberg.

    “Honestly, I’m surprised that Quest is so much better for the vast majority of things that people use these headsets for, given that price difference,” he mentioned. Apple Vision Pro costs $3,499, while Meta’s Quest 3 starts from $499.99 for the 128GB model. (Also Read: Google Meet Rolls Out ‘Companion Mode’ Feature On Android, iOS Devices)

    At the end of the video, Zuckerberg thanked his team which has been building VR headsets for a very long time.

  • Google Meet Rolls Out ‘Companion Mode’ Feature On Android, iOS Devices

    The feature allows you to access “interactive features and controls” while you’re in a conference room or large meeting space.

  • Google’s 25 Million Euros Investment Aims To Enhance AI Skills For Europeans |

    By clicking “Accept All Cookies”, you agree to the storing of cookies on your device and the processing of information obtained via those cookies (including about your preferences, device and online activity) by us and our commercial partners to enhance site navigation, personalize ads, analyze site usage, and assist in our marketing efforts. More information can be found in our Cookies and Privacy Policy. You can amend your cookie settings to reject non-essential cookies by clicking Cookie Settings below.

    Accept All Cookies

    Manage Consent Preferences

  • How A Security Researcher Defrauded Apple For $2.5 Million- Read Full Story |

    New Delhi: In a stunning turn of events, a prominent security researcher who had previously been recognized by Apple for their contributions in uncovering vulnerabilities now finds themselves at the center of controversy. Accusations have surfaced alleging that this individual engaged in deceptive practices to defraud the tech giant, purportedly acquiring products worth approximately $2.5 million through fraudulent means.

    Noah Roskin-Frazee, who is associated with ZeroClicks Lab received recognition from Apple for helping identify a security flaw. Apple thanked Noah Roskin-Frazee and Prof. J. from ZeroClicks.ai Lab for their assistance. (Also Read: Google Takes Action Against Misinformation In Europe; Check Details)

    However, according to 404Media, the individual had already been arrested for allegedly scamming Apple out of $2.5 million by stealing iPhones, Macs, and gift cards by the time Apple expressed gratitude towards them. (Also Read: A Comprehensive Tech Guide For Valentine’s Day)

    The Breach: How Roskin-Frazee and Latteri Exploited Apple’s System

    Roskin-Frazee discovered a vulnerability in Apple’s backend system called Toolbox. Working together with Keith Letteri, another researcher, they performed an escalation attack on the company’s backend. After a series of steps they managed to gain access to Toolbox.

    They even got access to an employee account of a third-party company that was helping Apple with customer support. Then, under false identities, the duo placed orders for various Apple products, manipulating the sum payable to zero dollars. This allowed them to procure iPhones, laptops, and gift cards without any cost.

    They even accessed an employee account of a third-party company assisting Apple with customer support. Using false identities, they placed orders for various Apple products, manipulating the payable sum to zero dollars. This enabled them to obtain iPhones, laptops, and gift cards without any cost.

    This case presents a startling sequence of events, particularly with Apple expressing gratitude to the individual just two weeks after their arrest. Furthermore, reports indicate that one of the researchers took further audacious steps by extending an Apple Care subscription for themselves and their family, potentially exposing their identity in the process.

  • Government Releases Urgent Alert For Google Chrome Users, Urging Them To Promptly Update Their Browser |

    New Delhi: The Indian Computer Emergency Response Team (Cert-In) has issued a high-risk warning concerning several vulnerabilities found in Google Chrome OS. According to their latest security advisory dated February 8, 2024, identified as CIVN-2024-0031, the government research team has disclosed that these vulnerabilities are deemed high-risk and present substantial threats to users of Google Chrome OS versions preceding 114.0.5735.350 ( Platform Version: 15437.90.0) on the LTS channel.

    As per CERTIn’s findings, the identified vulnerabilities can be utilized by a remote attacker to execute arbitrary code, attain elevated privileges, circumvent security measures, or induce denial of service situations on the targeted system.

    What are the risks involved?

    The risk associated with these vulnerabilities stems from two primary issues:

    -Use-after-free in Side Panel Search: This vulnerability enables attackers to exploit memory errors within the Side Panel Search feature, potentially resulting in the execution of arbitrary code or the circumvention of security protocols. (Also Read: Meta Will Stop Suggesting Political Content To Users On Both Instagram And Threads)

    -Insufficient data validation in Extensions: This vulnerability arises from inadequate validation of input data in extensions, providing attackers with the opportunity to execute malicious actions on compromised systems. (Also Read: OpenAI Introduces Watermarking For AI-Generated Images Via DALL-E 3; Check Details)

    According to Cert-In’s vulnerability note, remote attackers can exploit these vulnerabilities by enticing unsuspecting users to visit specially crafted websites. Upon accessing these sites, the vulnerabilities would be triggered, allowing attackers to compromise the security of unsuspecting users.

    How to ensure safety

    To stay protected from these vulnerabilities, Cert-In strongly recommends updating Google Chrome to the latest version, which includes security patches from Google. Users should promptly update their Google Chrome OS to version 114.0.5735.350 (or newer) on the LTS channel to address these vulnerabilities and improve system security.

    Furthermore, users should:

    -Be cautious: Exercise care when browsing the internet, especially on unfamiliar or suspicious websites. Avoid clicking on links from untrusted sources or engaging with unsolicited emails or messages.

    -Follow security best practices: Implement robust security measures such as using trusted antivirus software, regularly updating software and applications, and enabling firewalls to enhance protection against potential threats.

    CERT-In is currently conducting a “Cyber ​​Swachhta Fortnight” from February 1 to 15, 2024. This initiative aims to safeguard the nation’s digital security by protecting cyberspace from botnets, which have the potential to infect and compromise users’ systems.

    To achieve this goal, CERT-In has introduced the ‘Cyber ​​Swachhta Kendra’ (CSK), which provides the eScan Botnet Scanning & Cleaning Toolkit for laptops, desktops, and smartphones. Developed in partnership with eScan, a reputable cybersecurity solutions provider, this toolkit empowers individuals to scan and cleanse their devices, shielding them from botnet threats.

  • Elon Musk Plans To Stop Using Phone Number And Rely Solely On X For Texts And Calls |

    New Delhi: Renowned tech billionaire Elon Musk has made headlines once again, this time with his announcement to discontinue the use of his phone number in favor of relying solely on the social media platform

    “In a few months, I will discontinue my phone number and only use X for texts and audio/video calls,” Musk wrote on These features were first launched in October last year. Since then, Musk has been actively advocating for X to expand into a comprehensive application. (Also Read: Instagram Could Introduce AI-Assisted Messaging For Writing Messages: Report)

    In a few months, I will discontinue my phone number and only use X for texts and audio/video calls — Elon Musk (@elonmusk) February 9, 2024

    The app introduced a preliminary version of its audio and video calling feature last year, which was initially accessible to only a few users. Last month, the microblogging platform rolled out the feature to make audio and video calls directly from the app for Android users. (Also Read: Apple Rolls Out Redesigned iCloud App For Windows)

    Reacting to Musk’s post, several users shared their thoughts. “Elon in 2027 – I am no longer using my phone to text or for audio visual. I am using my brainwaves and neural flonk link 47.2,” a user wrote.

    “Will it be encrypted or will the alphabet agencies be listening,” another user said. One more user mentioned, “Where will you receive OTPs for bank transactions?”. Meanwhile, X has topped Apple’s App Store charts in terms of downloads.

    “X is now the #1 most downloaded app of any kind!,” Musk posted.

    As Musk continues to push the boundaries of innovation, his decision to embrace (With IANS Inputs)

  • Itel P55 And P55+ Launched In India Under Rs 10,000 |

    New Delhi: Itel has expanded its budget smartphones line-up with the introduction of two new handsets: the itel P55 and itel P55+. Both the devices will be available online as well as in the offline market. The new smartphones are powered by Unisoc T606 chipset with up to 8GB of RAM, and up to 16GB of virtual RAM in the P55+. The P55 has up to 8GB of RAM expansion feature.

    The devices flaunt a 6.6-inch HD+ display with a high 90Hz refresh rate for smooth visuals. Additionally, they come with a Dynamic Bar on the screen, offering users convenient access to battery status, incoming call notifications, and device unlocking information.

    The P55+ comes with 256GB storage and 8GB of RAM, which can be expanded up to 16GB through the virtual RAM expansion feature. The P55, on the other hand, feature 128GB of storage and 8GB of RAM, along with up to additional 16GB of virtual RAM. Both models in the P55 series house a 50MP AI Dual Camera system at the rear and 8MP selfie camera.

    The P55+ introduces a 45W Power charging feature, allowing for a rapid charge from 0 to 100% in just 72 minutes. It can also reach a 70% charge in approximately 30 minutes. The P55 model offers an 18W Fast Charge option, targeting efficient charging for its 5000mAh battery.

    The itel P55 is available in two configurations. Its 4GB RAM and 128GB storage variant is priced at Rs. 6,999. The 8GB RAM and 128GB storage model is available at Rs. 8,999. The itel P55+, with 8GB RAM and 256GB storage, is priced at Rs. 9,499