Friday, April 4, 2025

OpenAI's models 'memorized' copyrighted content, new study suggests | TechCrunch

OpenAI's models 'memorized' copyrighted content, new study suggests | TechCrunch

https://techcrunch.com/2025/04/04/openais-models-memorized-copyrighted-content-new-study-suggests/

Linotype machine - Wikipedia

Linotype machine - Wikipedia: Excerpt: ″The Linotype machine (/ˈlaɪnətaɪp/ LYNE-ə-type) is a "line casting" machine used in printing which is manufactured and sold by the former Mergenthaler Linotype Company and related companies.[1] ″

Also: https://fb.watch/yLQ4fTS23r/

Source: en.wikipedia.org

Turing

Thursday, April 3, 2025

High profile cyber gang takedowns in 2024

After a string of high profile cyber gang takedowns, is the cyber crime industry about to get a lot more fragmented? | IT Pro

Excerpt: ″The recent string of busts on large-scale threat collectives suggests authorities around the world are taking a firmer stance on cyber crime, and proactively looking to disrupt hacking groups, rather than just defend against their attacks.″

Source: itpro.com

Funding to prioritize ethical and social considerations in emerging technologies​​

​​​NSF and philanthropic partners announce $16 million in funding to prioritize ethical and social considerations in emerging technologies​​ | NSF - National Science Foundation

Excerpt: ″The U.S. National Science Foundation today launched a new $16 million program in collaboration with five philanthropic partners that seeks to ensure ethical, legal, community and societal considerations are embedded in the lifecycle of technology’s creation and use. The Responsible Design, Development and Deployment of Technologies (ReDDDoT) program aims to help create technologies that promote the public's wellbeing and mitigate potential harms.″

Source: nsf.gov

What Is SASE (Secure Access Service Edge)? [Starter Guide] - Palo Alto Networks

What Is SASE (Secure Access Service Edge)? [Starter Guide] - Palo Alto Networks

Excerpt: ″Secure access service edge (SASE) is a cloud-native architecture that unifies SD-WAN with security functions like SWG, CASB, FWaaS, and ZTNA into one service.″

Source: paloaltonetworks.co.uk

Record-Breaking $75 Million Ransom Paid To Dark Angels Gang

Record-Breaking $75 Million Ransom Paid To Dark Angels Gang

Excerpt: ″According to ransomware statistics compiled by Varonis, the largest ransom payout was in 2021 when insurance giant CNA Financial reportedly paid an astonishing $40 million. However, the latest Zscaler ThreatLabz ransomware report suggests that this deplorable record has now been broken. Coming in at nearly twice as much, the Zscaler researchers said they found evidence of a $75 million ransom paid by an undisclosed victim earlier this year. Say hello to the Dark Angels.″

Source: forbes.com

Claude Code overview - Anthropic

Claude Code overview - Anthropic

Excerpt: ″Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster through natural language commands.″

Source: docs.anthropic.com

GitHub - monteslu/robot-mcp: mcp server for johnny-five

GitHub - monteslu/robot-mcp: mcp server for johnny-five

Excerpt: ″A Model Context Protocol (MCP) service that controls a robot arm with a servo motor. When the servo moves, it plays "Hasta la vista, baby!" audio clip.″

Source: github.com

Quickly connect a robot to AI with Claude Code and MCP (Model Context Protocol) - YouTube

Quickly connect a robot to AI with Claude Code and MCP (Model Context Protocol) - YouTube

Excerpt: ″In this tutorial we'll quickly make an MCP (Model Context Server) in node.js that can connect with the physical world″

Uses Arduino...

Source: youtube.com

AI In Cybersecurity: The Double-Edged Sword

AI In Cybersecurity: The Double-Edged Sword | Eventbrite: Excerpt: ″Learn about risks, threats, and defense strategies, including how AI is reshaping the threat landscape and what you can do about it.″

Wed, Apr 16, 2025 at 3:30 PM 

Source: eventbrite.co.uk

Wednesday, April 2, 2025

AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Understanding the Legal Risks

AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Understanding the Legal Risks

Excerpt: ″AI is transforming cybersecurity, creating both groundbreaking opportunities and complex challenges. In this course, AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Navigating Legal Risks, you'll explore how AI is reshaping the way we defend against cyberattacks, identify emerging risks, and stay compliant with evolving legal standards, which are playing catch-up with the speed of technological development.″

Source: tickettailor.com

Our truth is not enough: the challenge for technocrats

Our truth is not enough: the challenge for technocrats

Excerpt: ″So, we see the rise of the charismatic leader who offers the certainty of what technocrats would see as a fraudulent vision of a better world. But the fact that people want to believe them makes them, in some sense, ‘true’, especially when you are told that it was the technocrats who got us into the mess.″

Source: eastangliabylines.co.uk

Tuesday, April 1, 2025

23andMe Is Up For Sale. Where Is Our Genetic Data Going? | HuffPost UK Black Voices

23andMe Is Up For Sale. Where Is Our Genetic Data Going? | HuffPost UK Black Voices

Excerpt: ″It’s a gray area that invites the opportunity for what Ajunwa calls “genetic discrimination,” based on eugenics and pseudoscientific ideas about Black people. “It has been done in the past, so there is a worry about the misuse of this data to support racist ideas about racial categories and specifically about Black folks,” says Ajunwa.″

Source: huffingtonpost.co.uk

Oak by Honeybourne Close, Nod Rise seen on Geograph Britain and Ireland

Oak by Honeybourne Close, Nod Rise © E Gammie :: Geograph Britain and Ireland

Excerpt: ″Coventry has several stream courses along which building had been avoided due to the risk of flooding and 1940s planners envisaged that they could be developed as 'brook-strays' providing 'green wedge' public access land from the city centre to the outskirts.″

Source: geograph.org.uk

Monday, March 31, 2025

LLM jailbreak ideas

What Is Secure Access Service Edge (SASE)? | Microsoft Security

What Is Secure Access Service Edge (SASE)? | Microsoft Security

Excerpt: ″Secure access service edge, often abbreviated (SASE), is a security framework that converges software-defined wide area networking (SD-WAN) and Zero Trust security solutions into a converged cloud-delivered platform that securely connects users, systems, endpoints, and remote networks to apps and resources.

Source: microsoft.com

Sunday, March 30, 2025

Major Rivers Of The British Isles - River Stour

Major Rivers Of The British Isles - River Stour

Excerpt: ″There is much controversy and debate as to where the name Stour originates, with historians believing that the word could come from three different language groups.The Celtic word sturr means strong or powerful, which would be an appropriate name for a river, and as two of England’s River Stours are situated in England’s former Celtic stronghold of the Midlands, this is a more than credible origin.The medieval, French word stour means confusion or commotion, which could well have been attributed to that of a particularly unnavigable river. England's Norman French history goes back over a thousand years and with one of the River Stours' estuary located on the English Channel, there is also some credibility to this origin.The German word stuhr means formidable or violent, a word which could well have been attributed to a fast, flowing river. Considering England's Saxon history, and the facts that two of the River Stours drain into the North Sea – a usual route into England by the Saxons - therefore the origin of this word also has some credibility. Therefore, it is possible that each of England’s five River Stours could all have a different etymology.″

Source: sites.google.com

Saturday, March 29, 2025

About Us | The Legal Training Consultancy

About Us | The Legal Training Consultancy

Excerpt: ″The Legal Training Consultancy is a multi-faceted training consultancy which was established to focus on the training needs of firms of solicitors, barristers’ chambers and in-house legal departments, amongst others. David Jacobs is the founder of The Legal Training Consultancy. A barrister and former in-house lawyer, he is also perhaps the most experienced developer of training programmes currently working in the legal industry.″

Source: legaltrainingconsultancy.co.uk

Executive Interview: Separating Fact and Fiction: How AI is Changing the Cybersecurity Landscape

Executive Interview: Separating Fact and Fiction: How AI is Changing the Cybersecurity Landscape
https://www.computing.co.uk/sponsored/executive-interview-separating-fact-and-fiction-how-ai-is-changing-the-cybersecurity-landscape

Georeferenced Maps viewer - Map images - National Library of Scotland

Georeferenced Maps viewer - Map images - National Library of Scotland

Excerpt: ″Map of Coventry from 1890s showing the house my great-grandparents were living in at the time.″

Source: maps.nls.uk

Friday, March 28, 2025

New study shows Fibromyalgia likely the result of autoimmune problems | King's College London

New study shows Fibromyalgia likely the result of autoimmune problems | King's College London:

Excerpt: ″many of the symptoms in fibromyalgia syndrome (FMS) are caused by antibodies that increase the activity of pain-sensing nerves throughout the body. The results show that fibromyalgia is a disease of the immune system, rather than the currently held view that it originates in the brain. 

 The study, published today in the Journal of Clinical Investigation, demonstrates that the increased pain sensitivity, muscle weakness, reduced movement, and reduced number of small nerve-fibres in the skin that are typical of FMS, are all a consequence of patient antibodies. 

The implications of this study are profound. Establishing that fibromyalgia is an autoimmune disorder will transform how we view the condition and should pave the way for more effective treatments for the millions of people affected. 

Our work has uncovered a whole new area of therapeutic options and should give real hope to fibromyalgia patients. Previous exploration of therapies has been hampered by our limited understanding of the illness. This should now change. Treatment for FMS is focussed on gentle aerobic exercises, as well as drug and psychological therapies designed to manage pain, although these have proven ineffective in most patients and have left behind an enormous unmet clinical need 
                            — Dr David Andersson, study primary investigator, King's College London″

Source: kcl.ac.uk

Newcastle arthritis study hopes to 'switch off' pain - BBC News

Newcastle arthritis study hopes to 'switch off' pain - BBC News

Excerpt: ″The first two trials are small - in total about 32 patients have been involved - and more research is needed, but if it shows signs of success another, larger trial will follow. Even if all goes to plan and the treatment is shown to re-educate the immune system, it may still be another five to 10 years before patients are able to access it.″

Source: bbc.co.uk

Suicidal ideation and the risk of suicide in patients with fibromyalgia: a comparison with non-pain controls and patients suffering from low-back pain - PMC

Suicidal ideation and the risk of suicide in patients with fibromyalgia: a comparison with non-pain controls and patients suffering from low-back pain - PMC

Excerpt: ″our study provides relevant data that can be added to the growing body of evidence that links fibromyalgia with an increased risk of suicidal behaviors. This increased risk is mainly explained by the presence of depressive symptoms, highlighting the importance of adequately evaluating and treating the symptoms of depression.″

Source: pmc.ncbi.nlm.nih.gov

46 new bugs in solar power inverters raise concerns over power grid stability | SC Media

46 new bugs in solar power inverters raise concerns over power grid stability | SC Media

Excerpt: ″“The collective impact of residential solar systems on grid reliability is too significant to ignore – hospitals could lose access to critical equipment, families could go without heat in the winter or AC in a heatwave, and businesses could shut down,” s″

Source: scworld.com

Trump Administration Gives All Clear to Laundering Money through Shell Companies and Bribing Foreign Officials

Trump Administration Gives All Clear to Laundering Money through Shell Companies and Bribing Foreign Officials

Excerpt: ″On February 10, President Donald Trump issued an Executive Order that suspended the Foreign Corrupt Practices Act (FCPA) for 180 days, giving an all clear to U.S. corporations to bribe officials in foreign countries to get business deals approved. 

The order bars federal prosecutors from starting any new FCPA investigations, enforcing new actions and orders a review of existing FCPA investigations to “restore proper bounds” on applying the FCPA law. 

 The FCPA, enacted in 1977, has been the law of the United States for almost half a century....its purpose as follows: “Foreign bribery is a scourge that must be eradicated. It undermines the rule of law, empowers authoritarian rulers, distorts free and fair markets, disadvantages honest and ethical companies, and threatens national security and sustainable development.”″

Source: wallstreetonparade.com

PERJURY: Jerry Nadler Demands Gabbard and Ratcliffe be Prosecuted for Perjury

PERJURY: Jerry Nadler Demands Gabbard and Ratcliffe be Prosecuted for Perjury

Excerpt: ″Hillary Clinton using a private server: unacceptable. Bill Clinton lying under oath: impeachable. Donald Trump guilty of 34 felonies: doesn’t matter. Donald Trump being charged with crimes related to his mishandling of classified documents: doesn’t matter. Tulsi Gabbard and John Ratcliffe allegedly lying under oath: doesn’t matter. Pete Hegsweth: gross incompetence, imperiling of the U.S. national security, jeopardizing our troops safety: doesn’t matter.″

Source: thedailypoliticususa.com

Thursday, March 27, 2025

Hypersonic attacks

Land rent owners and broadband

Whisky barrel fraud

Ten Years Later, New Clues in the Target Breach – Krebs on Security

Ten Years Later, New Clues in the Target Breach – Krebs on Security

Excerpt: ″The malware used in the Target breach included the text string “Rescator,” which also was the handle chosen by the cybercriminal who was selling all of the cards stolen from Target customers. Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator.″

Source: krebsonsecurity.com

Trafficking for cyber fraud an increasingly globalised crime, Interpol says | Reuters

Trafficking for cyber fraud an increasingly globalised crime, Interpol says | Reuters

2023 Excerpt: ″The global police coordination body said law enforcement from more than 20 countries in October carried out inspections at hundreds of trafficking and smuggling hotspots, many known to be used to traffic victims to commit online fraud "on an industrial scale, while enduring abject physical abuse".″

Source: reuters.com

CONFIRMED: Russian intelligence tried to silence our journalism

CONFIRMED: Russian intelligence tried to silence our journalism

Excerpt: ″not only did a foreign intelligence operation have our emails, but I was the focus of the falsehoods I was seeing spread across the internet. Now the Russian hackers behind these attacks have been revealed by the UK government and the US State Department has offered a reward of $10M for information on them. Yes you read that right - $10M for the people who hacked us! ″

Source: mailchi.mp

View of Langdon Winner’s Theory of Technological Politics: Rethinking Science and Technology for Future Society | Engaging Science, Technology, and Society

View of Langdon Winner’s Theory of Technological Politics: Rethinking Science and Technology for Future Society | Engaging Science, Technology, and Society

Excerpt: ″Similar to legislative acts, technological innovation requires spaces for public debate and democratic deliberation (such as citizens’ panels or agencies for technology assessment) including engagements in creating and designing alternative forms of technological practice. Forms that are systematically, from the first moment in the process of creation, imagined in their significance for human life and the world, and which do not solidify one-sided interests, social injustice and control over others, but try to overcome it and embody a generalized thinking, care for the world and for the common good.

AI Creates New Threats for Common Scams | Psychology Today Canada

AI Creates New Threats for Common Scams | Psychology Today Canada

Excerpt: ″with the help of AI it can be almost impossible for a family member to discriminate a “real” distress call from a loved one versus a fake one.″

Source: psychologytoday.com

Forensic Neuropsychology Expert - Dr. Stacey Wood, Ph.D.

Forensic Neuropsychology Expert - Dr. Stacey Wood, Ph.D.

Excerpt: ″Dr. Stacey Wood is a leading expert on Decisional capacity, Testamentary capacity, Elder abuse, Trial competency, Probate conservatorship, and Undue influence.″

Source: drstaceywood.com

Friends Against Scams - Home

Friends Against Scams - Home

Excerpt: ″Help protect yourself and others against scams by completing our Friends Against Scams training.″

Source: friendsagainstscams.org.uk

Introduction Ethics After Auschwitz: Hans Jonas’s Notion Of Responsibility In A Technological Age in: The Legacy of Hans Jonas

Introduction Ethics After Auschwitz: Hans Jonas’s Notion Of Responsibility In A Technological Age in: The Legacy of Hans Jonas

Excerpt: ″Introduction Ethics After Auschwitz: Hans Jonas’s Notion Of Responsibility In A Technological Age″

Source: brill.com

AI as malware maker

Tuesday, March 25, 2025

Early methods for studying affective use and emotional well-being on ChatGPT | OpenAI

Early methods for studying affective use and emotional well-being on ChatGPT | OpenAI

Excerpt: ″ChatGPT isn’t designed to replace or mimic human relationships, but people may choose to use it that way given its conversational style and expanding capabilities. Understanding the different ways people engage with models can help guide platform development to facilitate safe, healthy interactions.″

Source: openai.com

Book Cover Design and Author Services from AuthorPackages

Book Cover Design and Author Services from AuthorPackages

Excerpt: ″I was overwhelmed with the task of coming up with a cover and formatting my book for the printer.  Then I found AuthorPackages. Working with Mark at AuthorPackages has been a wonderful experience.  I love the cover he designed (first try), and the enhancements.″

Source: authorpackages.com

How much will my book cost? - The Book Refinery

How much will my book cost? - The Book Refinery

Excerpt: ″There are many factors to take into consideration, so let’s look at all the things you need to think about so that you can get a rough idea of your publishing costs.″

Pricing | Troubador Publishing

Pricing | Troubador Publishing

Excerpt: ″We work in partnership with authors to design, create, market and sell quality books across all formats, putting customers at the heart of what we do, and using our expertise to give the very best self-publishing experience. ″

Source: troubador.co.uk

Tue 13 May 2025: AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Understanding the Legal Risks

AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Understanding the Legal Risks

Tue 13 May 2025 10:00 AM - 12:00 PM

Excerpt: ″In this course, AI and Cybersecurity: Seizing the Opportunities, Defending Against the Threats, Navigating Legal Risks, you'll explore how AI is reshaping the way we defend against cyberattacks, identify emerging risks, and stay compliant with evolving legal standards, which are playing catch-up with the speed of technological development.″

Hacking by criminals and spies has reached 'unprecedented complexity', Microsoft says

Hacking by criminals and spies has reached 'unprecedented complexity', Microsoft says

Excerpt: ″A roll-out of new AI cybersecurity software by a company as dominant as Microsoft will be closely watched. Last July, a tiny error in the software code of an application made cybersecurity firm CrowdStrike instantly crash around 8.5 million computers worldwide running Microsoft Windows, leaving users unable to restart their machines. The incident - described as the largest outage in the history of computing - affected airports, hospitals, rail networks and thousands of businesses including Sky News - some of which took days to recover.″

Source: news.sky.com

Kubernetes Catastrophe: Ingress-Nginx Vulnerability Could Spell Disaster for 6,000+ Deployments! - The Nimble Nerd

Monday, March 24, 2025

Is Empathy Genetic or Acquired? - Xcode Life

Is Empathy Genetic or Acquired? - Xcode Life

Excerpt: ″Is empathy genetic or can it be acquired? The purpose of this article is to explore the research on empathy and determine if there is a consensus on whether it is genetic or acquired.″

Source: xcode.life