Microsoft and OpenAI are working on a $100 billion supercomputer

0
[ad_1]

Right now, Microsoft and OpenAI are two of the most powerful AI companies on the planet. Well, as powerful as they are, it appears that their plans are much bigger than what we initially expected. According to a new report, Microsoft and OpenAI are planning on building an AI supercomputer to handle all of its AI computations. Also, this supercomputer could cost up to $100 billion.

Right now, AI companies depend on powerful GPUs to train and power their AI models. This is why companies like Nvidia are now worth so much more than before. In fact, Nvidia is now worth more than $2 trillion.

This is one reason why there’s a massive shortage of GPUs on the market. That’s one reason why companies like OpenAI are frustrated. These companies rely on buying these GPUs to power their powerful models. Other companies are also frustrated. However, recently, we got the news that Samsung is looking to throw in its hat and start manufacturing high-powered GPUs.

Microsoft and OpenAI want to build a massive supercomputer for AI

This is something that would sound odd if we weren’t talking about Microsoft here. The company was not shy about investing billions of dollars into OpenAI. So, the fact that it wants to build a giant supercomputer to power AI should come as no surprise.

According to the report, Microsoft and OpenAI have developed a five-phase plan that could ultimately end in multiple supercomputers powering the AI tech behind these two companies. We don’t know too much about what the companies plan on doing. However, it will involve one supercomputer based in the United States called “Stargate.” It’s a big project, but they aren’t planning on completing this until around 2028.

We’re not 100% certain just how much this will cost, but it looks like it could be at or above $100 billion. This would make it much more expensive than all of the data centers that are currently operating- over 100 times more expensive. So, it’s clear that Microsoft and OpenAI are not planning on just making a computer to keep up with the AI industry, they want to push it forward. As for what the supercomputer could pack, we have no idea. What we do know is that it will probably deliver next-level computing and power.

Hurdles

There are a few hurdles that these companies are going to have to leap in order to make this a reality. For starters, in order to create this supercomputer, the companies are going to need a massive amount of server chips. This will be a long process, and it’s something that will increase the price of the supercomputer.

Next, a computer this big will not be able to simply use an AC plug. The companies will need to find a way of powering such a large computer, and they are considering using nuclear power to power it.

So, it’s obvious that a computer like this will be a massive undertaking for the companies. However, Microsoft and OpenAI feel that this is the best course of action.


[ad_2]
Source link

YouTube calls Shorts a success and claims over 25% of its creators are making money from them

0
[ad_1]

I remember very clearly when YouTube Shorts was first released. They were first only available in India back in the Fall of 2020, as a response to India’s ban of TikTok, and then suddenly everyone wanted in on the action. It wasn’t until March 2021 that Shorts were officially available in the U.S. and then globally later that same year.

Fast-forward to today, when YouTube Shorts can be found all over the YouTube homepage and mobile apps. In fact, according to a post on YouTube’s official blog, Shorts total over 70 billion views a day. These are impressive numbers when you consider that we once weren’t even sure if Shorts were even going to become a thing.

Not only are Shorts a sure hit now, but this bite-sized format is giving creators brand-new ways to cash in and a whole new way for creators to get creative on the YouTube platform.

Image Credit: YouTube Blog

YouTube opened up revenue sharing for Shorts a year ago. As a creator, being accepted into the YouTube Partner Program (YPP) is sort of the first big goal you have. For all that hard work making videos, creators want to get paid fairly when their work does well. However, traditionally most of the YouTube money has been found with long-form content, or so we thought. 

Well, according to statistics released by the platform, a ton of creators (over 25% of them) who are in the YPP are also earning money just from Shorts. Additionally, Creators who crush it with Shorts often start earning with all those other YouTube features – ads on long videos, subscriptions, all of it! YouTube says that over 80% of creators making money from Shorts also get paid through other stuff.


This Shorts thing is just the start, but it’s obvious that it’s becoming bigger than any of us thought possible. Long videos will always be the bedrock of YouTube, but Shorts are definitely bringing a whole new vibe and is opening up new ways for creators to earn from their creativity. It’s not everyone’s cup of tea and some downright hate seeing these short videos pop up and spam their YouTube feeds. However, unless the tide shifts, it’s obvious that Shorts will be part of YouTube for some time, and as more creators jump in, the Shorts money train might just get bigger.

[ad_2]
Source link

Ross Anderson, Author of ‘Security Engineering’ Book passes away

0
[ad_1]

Professor Ross Anderson, who passed away on March 28, 2024.

Anderson, a pioneer in security engineering, was the author of the seminal book ‘Security Engineering’, which has educated countless professionals and academics on the complexities of securing systems.

Born on September 15, 1956, in London, Anderson’s career spanned over four decades, during which he made significant contributions to cryptography, computer security, and privacy.

He was a professor of security engineering at the University of Cambridge’s Computer Laboratory, where he was known for his engaging lectures and dedication to mentoring the next generation of security experts.

A Storied Career

Anderson’s work was not limited to academia; he was actively involved in policy debates and a frequent consultant on issues of security and privacy for businesses and governments.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

His research interests were broad, covering everything from the security of payment systems to the robustness of critical national infrastructures.

One of Anderson’s most notable contributions was his analysis of the vulnerabilities in the banking system, which led to significant changes in the design of ATM systems worldwide.

His expertise was also sought in healthcare, where he provided insights into securing medical devices and electronic health records.

Duncan Campbell, a well-known journalist, posted a recent tweet announcing the passing away of Ross Anderson – a renowned professor and author of the book titled ‘Security Engineering’.

Legacy of ‘Security Engineering’

Anderson’s book, ‘Security Engineering’, first published in 2001, is widely regarded as the definitive text on the subject.

It provided a comprehensive overview of the field’s technical and human aspects, and its subsequent editions continued to be essential reading for anyone serious about understanding security systems.

The book’s impact is such that it is often called the “bible” of security engineering.

Remembering a Visionary

Colleagues and students remember Anderson as a visionary who could foresee security challenges long before they became apparent to others.

His ability to articulate complex ideas in an accessible manner made him a sought-after speaker and educator.

Ross Anderson’s death is a significant loss to the field of security engineering.

His work has left an indelible mark on the industry, and his teachings will continue to influence for years.

He is survived by his family, who have asked for privacy during this difficult time.

The community he helped build will honor his memory by continuing to push the boundaries of what is possible in pursuing a safer digital world.

Anderson’s life was dedicated to understanding and mitigating the risks in an increasingly connected society.

As the world reflects on his contributions, it is clear that his legacy will endure through the countless professionals he has inspired and his critical work in making our digital infrastructure more secure.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

Galaxy Z Fold 6 Ultra tipped again, but it’s complicated

0
[ad_1]

A wild rumor appeared not long ago, saying that the Samsung Galaxy Z Fold 6 Ultra is coming. That rumor was quickly forgotten as all focus was shifted to the Galaxy Z Fold 6 FE. Well, the Galaxy Z Fold 6 Ultra has surfaced again, kind of, but it’s complicated.

The Galaxy Z Fold 6 Ultra will carry a model number SM-F958, says Galaxy Club. Samsung uses an ‘8’ as the last digit for the model number of its ‘Ultra’ devices. So this fits. As an example, the Galaxy S24 Ultra’s model number is SM-S928.

The Galaxy Z Fold 6 Ultra gets mentioned again, but… it’s complicated

So, this sounds good, right? Well, yes, but there’s a catch. Only one Galaxy Z Fold 6 Ultra model is being prepared right now, the SM-F958N. That ‘N’ is kind of a problem, as it indicates the model for the South Korean market. In other words, Samsung’s homeland.

If things don’t change, this indicates that only South Korea will get the ‘Ultra’ model of the device. More model numbers could surface, though. We still don’t know anything about this ‘Ultra’ model.

The ‘Ultra’ moniker means that it will have to be different than the regular Galaxy Z Fold 6 flagship. Samsung will have to make some major changes to make this phone stand out.

We could get up to four foldable smartphones from Samsung this year

Now, the fourth foldable that was being talked about, aside from the Galaxy Z Fold 6, Galaxy Z Flip 6, and the Galaxy Z Fold 6 Ultra… is the Galaxy Z Fold 6 FE. That name hasn’t been confirmed yet, but it’s a possibility.

We’re talking about a budget book-style foldable from the company. That device is rumored to arrive this year, but not alongside the Galaxy Z Fold 6 and Galaxy Z Flip 6. It will arrive a bit later on, based on rumors.

So, we could get up to four Galaxy Z devices this year, twice as much as last year. Nothing is set in stone just yet, the Galaxy Z Fold 6 Ultra rumors are still kind of fishy. So we’ll have to wait and see what will happen.


[ad_2]
Source link

Four ways to keep it safe in ColorOS 14: notification hiding and more

0
[ad_1]

Here are four suggestions from Oppo on staying safe with the help of ColorOS 14 – after all, your phone packs a lot of sensitive data (like personal and financial information).

Picture Keeper

  • It’s a feeling like no other when a supermarket’s app begs your permission to access your photos and videos. If you need to grant a given app such a permission, but you’re uncomfortable with the app having access to your galleries in their entirety, you can handpick which files are accessible.

Auto Pixelate
  • Screenshots are great, but sometimes, they can reveal a little too much. For example, if you want to screenshot a conversation from a given chat, but don’t want to reveal the other party’s profile pic and username, you can do so automatically.


Smart Notification Hiding
  • If the thought of lending your phone to a friend makes you nervous, or if you’re concerned about prying eyes spying on your private notifications, you can breathe easy knowing this feature is designed to protect your privacy. Activating this function adds an extra layer of security against inquisitive onlookers, particularly useful while you’re out and about.

2FA (Two-Factor Authentication)

  • If you really need to beef up your security, there’s 2FA. Simply put, in addition to your regular password, you’ll also need a code from an authenticator app to log in to your accounts. It’s an extra layer of protection to prevent hackers or whoever from accessing your private info.


[ad_2]
Source link

Activision Players Attacked by Password Stealing Malware

0
[ad_1]

Activision, the powerhouse behind popular titles such as Call of Duty, is currently embroiled in an investigation into a hacking campaign aimed at its players.

The primary objective of cybercriminals is to siphon off player credentials, focusing on gaming accounts and cryptocurrency wallets.

Sources close to the situation, who have requested anonymity due to the matter’s sensitivity, have revealed that the hackers are infiltrating victims’ computers with malware. The malicious software then proceeds to extract passwords for various accounts.

The extent of the damage and the precise method of the malware’s distribution remains in mystery.

Speculation suggests that the issue may be confined to users who have installed third-party tools on their systems.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Activision Blizzard’s internal team is reportedly hard at work, attempting to eradicate the malware and restore security to any player accounts that have been compromised.

Despite the urgency of the situation, Activision spokesperson Delaney Simmons has emphasized that the company’s servers are secure and have not been breached.

Instead, the spotlight is on unauthorized third-party software as the likely culprit behind the malware infections.

The Discovery and Response

The malware campaign’s initial discovery is credited to an individual known as Zebleer, who is involved in the development and sale of cheating software for Call of Duty.

Zebleer stumbled upon the issue when a customer reported the theft of their account for the cheat software.

This prompted an investigation that led to unearthing a database filled with stolen credentials.

Zebleer has since taken proactive measures, alerting Activision Blizzard and other cheat providers whose users might be at risk.

TechCrunch has independently verified a sample of the stolen logins, confirming the authenticity of at least a portion of the data.

However, the freshness of the data remains uncertain.

The Impact on Players

At this juncture, there is no evidence that the average Activision game player is in danger.

The threat specifically targets individuals who utilize third-party applications, including cheats.

Nevertheless, Activision’s Simmons has advised all users who feel their accounts may have been compromised to change their passwords and enable two-factor authentication as a precautionary measure.

As the investigation continues, the gaming community is on high alert.

The incident is a stark reminder of the risks of downloading and using unauthorized software.

It also underscores the importance of cybersecurity measures such as two-factor authentication in safeguarding digital identities.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

Camera-boosting Galaxy S24 update has reached the US

0
[ad_1]

About a week ago, Samsung started rolling out a camera-boosting update to the Galaxy S24 series, but not the US users. Well, the update is finally starting to roll out in the US as well.

Users in the US are now receiving the camera-boosting Galaxy S24 series update

This update not only delivers a number of camera improvements, but a new security patch too. The US users are now receiving an Android security patch for April 2024. The update is rolling out to factory-unlocked Galaxy S24, Galaxy S24+, and Galaxy S24 Ultra phones.

This particular update is coming with the firmware version S92xU1UEU1AXCB. It’s actually quite a chunky update, so you may want to use WiFi for this one. That’s up to you.

So, what exactly has changed in terms of the cameras? Well, the changelog is the same as the one we talked about a week ago. It’s identical, which was expected, as this is essentially the same update for a different market.

It will improve white balance accuracy & exposure on the devices

This update improves white balance accuracy and exposure on the Galaxy S24 series phones. On top of that, it improves low-light image quality on all three smartphones. You should be able to see some notable improvements.

If you’re taking plenty of high-range zoom shots, well, the text clarity should be better post-update. Samsung has also added support for videos with 480×480 resolution in the Instant Slow Mo feature.

The last addition to the changelog has to do with the ExpertRAW camera app. Samsung improved color accuracy in that app, though do note that this change will come as a separate update to the ExpertRAW camera. It should arrive once you install this April update.

Your smartphone will let you know when it’s time to update. You can, though, check for yourself too, of course. Simply open Settings, and navigate to the Software update section. There you’ll want to hit the Download and install option.


[ad_2]
Source link

Microsoft 365 & Gmail accounts in danger from new phishing kit

0
[ad_1]

In today’s technological age, most people believe that using two-factor authentication is their last line of defense. While this assumption is not wrong, there are ways hackers can bypass 2FA and steal personal data. Those who want to get around the 2FA security system allegedly use a new Adversary-in-The-Middle (AiTM) phishing kit called Tycoon 2FA, which is a threat to both Microsoft 365 and Gmail.

The kit is linked with the Tycoon 2FA Phishing-as-a-Service (PhaaS) platform. Using the kit, hackers are trying to target Microsoft 365 and Gmail accounts. With this kit and techniques like using Apple’s customer care number to trick unsuspecting victims, the threat of phishing attacks is higher than ever.

What is the new Gmail threat, the Tycoon 2FA phishing kit?

First discovered by the Sekoia Threat Detection & Research team, Tycoon 2FA is a Phishing-as-a-Service platform originally advertised through private Telegram channels. It works using an Adversary-in-The-Middle phishing kit, where a reverse proxy server hosts the phishing page. Legitimate services then relay the credentials.

There are a few steps that victims follow that make the Tycoon 2FA attack a success for the hackers. The attack usually begins when a victim receives an email with a malicious QR code or website that directs the victim to the phishing site. When interacted with, the QR code or link has victims visit Cloudflare security check that many websites utilize to prevent unwanted traffic and filter out the bots. Thanks to how common these challenges or checks are, most people don’t think much of it.

Once the victims complete the security challenge, they are redirected to a fake Microsoft page that harvests their credentials. At this stage, the kit mimics the 2FA prompts, such as SMS OTP, call verifications and authenticator app push notifications. By getting their hands on the 2FA inputs, hackers can generate valid session cookies and bypass Multifactor Authentication (MFA) protections.

Once the hackers authenticate using the relayed credentials, the victims are redirected to a legitimate-looking error page. The page conceals the success of the phishing attack. However, since the attackers can freely access the victim’s accounts, they can do anything with them.

How to protect yourself against Tycoon 2FA?

These phishing scams use sophisticated methods to trick their prey into assuming they input their credentials into legitimate websites. However, you can protect yourself using some of these steps. Firstly, avoid trusting links and QR codes sent to you via unsolicited emails or messages, and visit official sites manually to verify.

You can also use a 2FA method that uses hardware security keys or biometrics, as hackers can not bypass those using phishing attacks. Lastly, read up on all the new phishing techniques that hackers are using so you can better prepare yourself. After all, techniques hackers use to acquire user credentials are ever-evolving, and staying on your toes is crucial.


[ad_2]
Source link

AT&T admits a 2021 data breach affecting 73 million customers

0
[ad_1]

AT&T has finally admitted a data breach affecting 73 million current and former customers. The breach happened several years ago, but the company repeatedly denied it saying that the leaked data didn’t originate from its systems. It acknowledged the breach about two weeks after a threat actor publicly dumped the stolen data on the dark web. The carrier has sent email notifications to affected customers.

AT&T confirms a data breach impacting 73 million customers

In August 2021, a well-known threat actor claimed to have breached AT&T’s security systems and stolen the personal information of over 70 million users. Samples leaked on the dark web contained a wide range of information about AT&T customers, including names, addresses, phone numbers, email IDs, social security numbers, and dates of birth. The hacker offered to sell the entire database for $1 million.

Despite potential privacy and security risks to its customers, AT&T denied suffering a breach. While there hasn’t been any follow-up for over two years, another threat actor shared the database for free on a hacking forum last month. Multiple sources independently verified that the database contains information about AT&T customers, people with online AT&T accounts, or people previously associated with AT&T.

Two weeks later, the carrier giant officially acknowledged that the breach impacted its customers. In a statement to TechCrunch, AT&T said the leak affects 7.6 million current users and 65.4 million former users. Emails sent to affected users state that the breach also compromised account passcodes, which are typically four-digit numbers. The company has reset compromised passcodes from its end.

AT&T still hasn’t identified the source of the leak, though. It does not know “whether the data in those fields originated from AT&T or one of its vendors.” The company says it “does not have evidence of unauthorized access to its systems resulting in exfiltration of the data set.” Nevertheless, if you are a current or former AT&T user, you should remain vigilant and actively monitor your account activities and credit reports.

AT&T offers complimentary identity theft and credit monitoring services

According to AT&T, the leaked data set is from 2019 or earlier and does not contain personal financial information or call history. Moreover, the information varied by customer and account. For users who had their sensitive personal information compromised in this leak, the company is offering complimentary identity theft and credit monitoring services. AT&T has put up a support page with more information about the breach and steps to secure your account.

ATT data breach confirmation email


[ad_2]
Source link