• chevron_right

      Microsoft releases a new Windows app called Windows App for running Windows apps

      news.movim.eu / ArsTechnica · Thursday, 19 September - 22:03

    The Windows App runs on Windows, but also macOS, iOS/iPadOS, web browsers, and Android.

    Enlarge / The Windows App runs on Windows, but also macOS, iOS/iPadOS, web browsers, and Android. (credit: Microsoft)

    Microsoft announced today that it's releasing a new app called Windows App as an app for Windows that allows users to run Windows and also Windows apps (it's also coming to macOS, iOS, web browsers, and is in public preview for Android).

    On most of those platforms, Windows App is a replacement for the Microsoft Remote Desktop app, which was used for connecting to a copy of Windows running on a remote computer or server—for some users and IT organizations, a relatively straightforward way to run Windows software on devices that aren't running Windows or can't run Windows natively.

    The new name, though potentially confusing, attempts to sum up the app's purpose: It's a unified way to access your own Windows PCs with Remote Desktop access turned on, cloud-hosted Windows 365 and Microsoft Dev Box systems, and individual remotely hosted apps that have been provisioned by your work or school.

    Read 4 remaining paragraphs | Comments

    • chevron_right

      Ever wonder how crooks get the credentials to unlock stolen phones?

      news.movim.eu / ArsTechnica · Thursday, 19 September - 21:41 · 1 minute

    Ever wonder how crooks get the credentials to unlock stolen phones?

    Enlarge (credit: Getty Images)

    A coalition of law-enforcement agencies said it shut down a service that facilitated the unlocking of more than 1.2 million stolen or lost mobile phones so they could be used by someone other than their rightful owner.

    The service was part of iServer, a phishing-as-a-service platform that has been operating since 2018. The Argentina-based iServer sold access to a platform that offered a host of phishing-related services through email, texts, and voice calls. One of the specialized services offered was designed to help people in possession of large numbers of stolen or lost mobile devices to obtain the credentials needed to bypass protections such as the lost mode for iPhones, which prevent a lost or stolen device from being used without entering its passcode.

    Catering to low-skilled thieves

    An international operation coordinated by Europol’s European Cybercrime Center said it arrested the Argentinian national that was behind iServer and identified more than 2,000 “unlockers” who had enrolled in the phishing platform over the years. Investigators ultimately found that the criminal network had been used to unlock more than 1.2 million mobile phones. Officials said they also identified 483,000 phone owners who had received messages phishing for credentials for their lost or stolen devices.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Real-time Linux is officially part of the kernel after decades of debate

      news.movim.eu / ArsTechnica · Thursday, 19 September - 18:14 · 1 minute

    CNC laser skipping across a metal surface, leaving light trails in long exposure.

    Enlarge / Cutting metal with lasers is hard, but even harder when you don't know the worst-case timings of your code. (credit: Getty Images)

    As is so often the case, a notable change in an upcoming Linux kernel is both historic and no big deal.

    If you wanted to use "Real-Time Linux" for your audio gear, your industrial welding laser, or your Mars rover, you have had that option for a long time (presuming you didn't want to use QNX or other alternatives). Universities started making their own real-time kernels in the late 1990s. A patch set, PREEMPT_RT , has existed since at least 2005. And some aspects of the real-time work, like NO_HZ , were long ago moved into the mainline kernel, enabling its use in data centers, cloud computing, or anything with a lot of CPUs.

    But officialness still matters, and in the 6.12 kernel, PREEMPT_RT will likely be merged into the mainline . As noted by Steven Vaughan-Nichols at ZDNet , the final sign-off by Linus Torvalds occurred while he was attending Open Source Summit Europe. Torvalds wrote the original code for printk , a debugging tool that can pinpoint exact moments where a process crashes, but also introduces latency that runs counter to real-time computing. The Phoronix blog has tracked the progress of PREEMPT_RT into the kernel, along with the printk changes that allowed for threaded/atomic console support crucial to real-time mainlining.

    Read 3 remaining paragraphs | Comments

    • chevron_right

      $100 billion AI infrastructure fund launched by Microsoft, BlackRock, UAE firm

      news.movim.eu / ArsTechnica · Thursday, 19 September - 16:52

    An illustration of two robot arms stacking gold coins.

    Enlarge (credit: J Studios via Getty Images )

    If you haven't noticed by now , Big Tech companies have been making plans to invest in the infrastructure necessary to deliver generative AI products like ChatGPT (and beyond) to hundreds of millions of people around the world. That push involves building more AI-accelerating chips , more data centers, and even new nuclear plants to power those data centers, in some cases.

    Along those lines, Microsoft, BlackRock, Global Infrastructure Partners (GIP), and MGX announced a massive new AI investment partnership on Tuesday called the Global AI Infrastructure Investment Partnership (GAIIP). The partnership initially aims to raise $30 billion in private equity capital, which could later turn into $100 billion in total investment when including debt financing .

    The group will invest in data centers and supporting power infrastructure for AI development. "The capital spending needed for AI infrastructure and the new energy to power it goes beyond what any single company or government can finance," Microsoft President Brad Smith said in a statement.

    Read 6 remaining paragraphs | Comments

    • chevron_right

      “Dead Internet theory” comes to life with new AI-powered social media app

      news.movim.eu / ArsTechnica · Wednesday, 18 September - 22:19

    People in a hall of mirrors.

    Enlarge (credit: gremlin via Getty Images )

    For the past few years, a conspiracy theory called " Dead Internet theory " has picked up speed as large language models (LLMs) like ChatGPT increasingly generate text and even social media interactions found online. The theory says that most social Internet activity today is artificial and designed to manipulate humans for engagement.

    On Monday, software developer Michael Sayman launched a new AI-populated social network app called SocialAI that feels like it's bringing that conspiracy theory to life, allowing users to interact solely with AI chatbots instead of other humans. It's available on the iPhone app store, but so far, it's picking up pointed criticism.

    After its creator announced SocialAI as " a private social network where you receive millions of AI-generated comments offering feedback, advice & reflections on each post you make," computer security specialist Ian Coldwater quipped on X, "This sounds like actual hell." Software developer and frequent AI pundit Colin Fraser expressed a similar sentiment: "I don’t mean this like in a mean way or as a dunk or whatever but this actually sounds like Hell. Like capital H Hell."

    Read 11 remaining paragraphs | Comments

    • chevron_right

      Landmark AI deal sees Hollywood giant Lionsgate provide library for AI training

      news.movim.eu / ArsTechnica · Wednesday, 18 September - 20:10

    An illustration of a filmstrip with a robot, horse, rocket, and whale.

    Enlarge (credit: Benj Edwards / Malte Mueller via Getty Images )

    On Wednesday, AI video synthesis firm Runway and entertainment company Lionsgate announced a partnership to create a new AI model trained on Lionsgate's vast film and TV library. The deal will feed Runway legally clear training data and will also reportedly provide Lionsgate with tools to enhance content creation while potentially reducing production costs.

    Lionsgate, known for franchises like John Wick and The Hunger Games, sees AI as a way to boost efficiency in content production. Michael Burns, Lionsgate's vice chair, stated in a press release that AI could help develop "cutting edge, capital efficient content creation opportunities." He added that some filmmakers have shown enthusiasm about potential applications in pre- and post-production processes.

    Runway plans to develop a custom AI model using Lionsgate's proprietary content portfolio. The model will be exclusive to Lionsgate Studios, allowing filmmakers, directors, and creative staff to augment their work. While specifics remain unclear, the partnership marks the first major collaboration between Runway and a Hollywood studio.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Massive China-state IoT botnet went undetected for four years—until now

      news.movim.eu / ArsTechnica · Wednesday, 18 September - 19:58 · 1 minute

    Massive China-state IoT botnet went undetected for four years—until now

    Enlarge (credit: Getty Images)

    The FBI has dismantled a massive network of compromised devices that Chinese state-sponsored hackers have used for four years to mount attacks on government agencies, telecoms, defense contractors, and other targets in the US and Taiwan.

    The botnet was made up primarily of small office and home office routers, surveillance cameras, network-attached storage, and other Internet-connected devices located all over the world. Over the past four years, US officials said, 260,000 such devices have cycled through the sophisticated network, which is organized in three tiers that allow the botnet to operate with efficiency and precision. At its peak in June 2023, Raptor Train, as the botnet is named, consisted of more than 60,000 commandeered devices, according to researchers from Black Lotus Labs, making it the largest China state botnet discovered to date.

    Burning down the house

    Raptor Train is the second China state-operated botnet US authorities have taken down this year. In January, law enforcement officials covertly issued commands to disinfect Internet of Things devices that hackers backed by the Chinese government had taken over without the device owners’ knowledge. The Chinese hackers, part of a group tracked as Volt Typhoon, used the botnet for more than a year as a platform to deliver exploits that burrowed deep into the networks of targets of interest. Because the attacks appear to originate from IP addresses with good reputations, they are subjected to less scrutiny from network security defenses, making the bots an ideal delivery proxy. Russia-state hackers have also been caught assembling large IoT botnets for the same purposes .

    Read 13 remaining paragraphs | Comments

    • chevron_right

      Man vs. machine: DeepMind’s new robot serves up a table tennis triumph

      news.movim.eu / ArsTechnica · Thursday, 8 August - 18:59

    A blue illustration of a robotic arm playing table tennis.

    Enlarge (credit: Benj Edwards / Google DeepMind)

    On Wednesday, researchers at Google DeepMind revealed the first AI-powered robotic table tennis player capable of competing at an amateur human level. The system combines an industrial robot arm called the ABB IRB 1100 and custom AI software from DeepMind. While an expert human player can still defeat the bot, the system demonstrates the potential for machines to master complex physical tasks that require split-second decision-making and adaptability.

    "This is the first robot agent capable of playing a sport with humans at human level," the researchers wrote in a preprint paper listed on arXiv. "It represents a milestone in robot learning and control."

    The unnamed robot agent (we suggest "AlphaPong"), developed by a team that includes David B. D'Ambrosio, Saminda Abeyruwan, and Laura Graesser, showed notable performance in a series of matches against human players of varying skill levels. In a study involving 29 participants, the AI-powered robot won 45 percent of its matches, demonstrating solid amateur-level play. Most notably, it achieved a 100 percent win rate against beginners and a 55 percent win rate against intermediate players, though it struggled against advanced opponents.

    Read 10 remaining paragraphs | Comments

    • chevron_right

      Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating

      news.movim.eu / ArsTechnica · Friday, 14 June - 19:40 · 1 minute

    Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word "exploit"

    Enlarge (credit: Getty Images)

    Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability in the PHP programming language that executes malicious code on web servers, security researchers said.

    As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, down from 1,800 detected on Monday. The servers, primarily located in China, no longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 in exchange for the decryption key.

    When opportunity knocks

    The vulnerability , tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors in the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied input into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched in PHP in 2012.

    Read 11 remaining paragraphs | Comments