Morrissey Technology

Loading

Archives 2024

Intel Panther Lake Processors

Good News from Intel: Panther Lake Processors Are Ready to Show Off

Morrissey Technology – Behind the various problems that have hit Intel, it turns out there is still good news from the company that makes the processor. The good news is regarding the next generation of processors codenamed Panther Lake and Clearwater Forest, which are made with the 18A process node. According to Intel SVP and GM Foundry Services Kevin O’Buckley, the Panther Lake processor has been successfully tested and booted into the operating system.

By successfully booting the operating system without additional configuration or modification, Panther Lake and Clearwater Forest clearly demonstrate the health of Intel 18A – Intel’s leading process technology, which is expected to return Intel to the ranks of leaders in process technologies by 2025.

Apart from that, Panther Lake DDR memory performance can operate at the targeted frequency. Meanwhile, Clearwater Forest, which is the archetype of future CPU and AI chips, combines RibbonFET, PowerVia, and Foveros Direct 3D for higher density and power handling.

Clearwater Forest is also a key product for Intel 3-T base-die technology. By leveraging Intel Foundry’s foundry system approach, these two products are expected to provide significant improvements in performance per watt, transistor density, and cell utilization.

“We are pioneering foundry system technologies for the AI ​​era and delivering a complete set of innovations that are important for the next generation of Intel products and our foundry customers. We are encouraged by our progress and working closely with customers to bring Intel 18A to market in 2025,” said O ‘Buckley.

In July, Intel released the 18A Process Design Kit (PDK) 1.0, a design tool that allows foundry customers to leverage the capabilities of the RibbonFET gate-all-around transistor architecture and PowerVia backside power delivery in their designs on the Intel 18A. Electronic design automation (EDA) and intellectual property (IP) partners update their offerings so customers can begin their final production designs.

This achievement shows that Intel Foundry is the first to successfully implement RibbonFET gate-all-around transistors and PowerVia backside power technology for foundry customers. Through the EDA ecosystem and IP tools and process flows, RibbonFET and PowerVia are innovative advances brought by Intel Foundry to all customers through Intel 18A.

Intel partners gained access to Intel 18A PDK 1.0 last month, EDA and IP partners updated their tools and design pipeline so external foundry customers can start designing their Intel 18A chips. This is an important milestone for Intel’s foundry business.

“Cadence’s strategic collaboration with Intel Foundry has helped accelerate our mutual customers’ innovation by providing access to industry-leading EDA solutions and IP optimized for Intel 18A,” said Tom Beckley, senior vice president and general manager, Custom IC & PCB Group at Cadence.

https://wvaaa.com/

https://www.htca.org/

Nvidia

Nvidia Caught Taking AI Data from Netflix and YouTube

Morrissey Technology – According to a report from 404 Media, Nvidia has used videos from YouTube, Netflix and other sources to build an AI model. Nvidia says its AI training methods are fully compliant with content and copyright laws. However, there is no definitive verdict on whether using an artist’s work to train an AI model is legal or not.

This particular model has not yet been released by Nvidia, but internally the AI ​​model is called Cosmos and will be the foundation model for advanced video that can power various products such as world generators and digital humans. 404 Media obtained Slack messages showing Nvidia employees using a YouTube video downloader to grab content while discussing the legal and ethical considerations of the practice.

“We respect the rights of all content creators and believe that our models and research efforts fully comply with the letter and spirit of copyright law,” an Nvidia spokesperson told 404.

“Copyright law protects certain expressions, but it does not protect facts, ideas, data, or information. Anyone is free to learn facts, ideas, data, or information from other sources and use them to create their own expressions. Fair use also protects the ability to use a creation for transformative purposes, such as model training,” he continued.

However, YouTube views this practice as a violation of its policies, while Netflix also says that scraping is against its terms of service. According to the leak, Nvidia downloaded 100,000 videos from YouTube in just two weeks and collected more than 38.5 million video URLs. These links include content creators such as Marques Brownlee and the Architectural Digest channel. The documents also show that Nvidia trained its models on a dataset called HD-VG-130M that contains 130 million YouTube videos and is explicitly for academic research only. This leak makes it clear that Nvidia’s work is for commercial gain. When an employee raised legal and ethical concerns, Ming-Yu Liu, Nvidia’s Vice President of Research and leader of the Cosmos project, told them that the decision to obtain data this way had been made at the top of the company.

Nvidia has grown into a trillion-dollar company thanks to its computer chips that are the foundation for the booming AI market. OpenAI, Microsoft, Meta, and Google are Nvidia customers and rely on its graphics processing units (GPUs). However, Nvidia does more than just hardware. Last week, Getty Images announced a deepening of its relationship with the company after releasing an updated AI image model based on the Nvidia Picasso model architecture.

https://www.lafayettecob.org/

AI Characters

Get to know AI Characters for Chatbots and How to use Them

Morrissey TechnologyArtificial intelligence or Artificial Intelligence (AI) is currently becoming a trend among society. In fact, there are a number of AI sites that are popular and widely used, one of which is Character AI. Through Character AI, detikers can communicate with chatbots. However, the chatbot on this AI site is said to be very ‘smart’ because it is similar to talking to a human. Therefore, many people are curious about the chatbot feature in Character AI. Want to know how to use it? Read more in this article.

Understanding Character AI

Character AI is a chatbot application and website that can be communicated with and produce amazing responses. Through this AI chatbot, you can chat with a number of fictional characters, such as famous figures, celebrities and historians in a dialogue. Reported by the Elegant site, the chatbot output on Character AI is considered to be more similar to humans than other AI chatbots, for example ChatGPT. As a result, you can communicate with the chatbot like chatting directly with someone. In fact, users can chat with more than one bot at a time.

For those who don’t know, a chatbot is a computer program created to simulate conversations with humans, both in text and voice form. This system is designed with an interactive model that can interact with humans. Character AI was created by former Google AI developers, Noam Shazeer and Daniel De Freitas. Character AI was initially released in beta form in September 2022. Since its official launch, this AI chatbot has become one of the most popular besides ChatGPT.

How Character AI Works

Character AI is a chatbot that works using large language models (LLM). This AI chatbot is also supported by machine learning which focuses on conversation. During the training process, Character AI continuously reads large amounts of text, then learns to determine which words are likely to appear next in a sentence. The use of this sophisticated technology produces chatbots that are entertaining and look real, so it’s like talking to a real person.

The uniqueness of Character AI

Character AI has its own uniqueness compared to other AI chatbots. Apart from communicating like humans, Character AI has a number of characters that exist in the real world, such as Elon Musk and Taylor Swift. Of course, they are chatbots so they are not real people. We tried one of the Character AI features by communicating with Elon Musk’s character. As a result, this chatbot understands and understands the opinions expressed, especially when it comes to Tesla and SpaceX, which are companies owned by Elon.

Another unique thing about Character AI is that users can choose various chatbots according to the theme. There are around 20 chatbot themes available, ranging from helpers, famous people, games, VTubers, and game characters. Users can also create their own fictional characters and chat with them. In Character AI, you can also create characters according to their personalities and add avatars that can be created freely.

Disadvantages of Character AI

Even though it is called one of the smartest chatbots because it is similar to talking to humans, there are still a number of shortcomings of Character AI. One of the shortcomings of Character AI is when asked to create an image. Because the base is a text program, the chatbot in Character AI cannot create perfect images like an AI art generator. Apart from that, the chatbot also blocks any content that is deemed unsafe for use (NSFW or not safe for work).

Is Character AI Free?

Character AI can be used for free by accessing it on the character.ai site. You can also chat directly with as many chatbots as you wish. However, Character AI also provides a premium version called Character AI Plus (c.ai+). A number of benefits from Character AI Plus include:

  • Priority access
  • Faster chatbot response time
  • Early access to try new features
  • Access to the Character AI Plus community
  • Gets a badge profile.
  • For just US$ 9.99 or around Rp. 160 thousand per month, you can enjoy the Character AI Plus service with satisfaction.

How to Use Character AI

Want to try chatting with a chatbot in Character AI? Here’s how to use it:

  • Open the character.ai site in a browser or download the Character AI application on a smartphone
  • If you don’t have an account, please log in using a Gmail or Apple account
  • After logging in, select one of the fictional characters according to the available theme. Or you can also search for it in the search bar column
  • If so, click on the character account
  • Ask the character a question or just say hello
  • After that, you can ask questions or chat with the chatbot like chatting with a human.

https://www.symposiumgeorgia.org/

https://www.human-body.org/

https://webua.org/

https://www.wartasundaonline.com/

https://www.the-uelci.org/

https://www.iclc2001.org/

Study Reveals Hackers Can Steal Data Via HDMI Cables

Study Reveals Hackers Can Steal Data Via HDMI Cables

Morrissey Technology – A recent study by a research team at the Universidad de la Republica Montevideo, Uruguay, revealed that hackers can use artificial intelligence (AI) and HDMI cables to steal data on their victims’ computers. Read the explanation. The research, entitled ‘Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations’, was published on the arXiv preprint server. The research was conducted by Santiago Fernandez Emilio Martinez, Gabriel Vareal, and Pablo Muse Federico Larroca.

HDMI cables are usually used to transfer the screen display from a laptop or PC to a projector to have a larger display. This cable apparently produces electromagnetic radiation that can be captured by hackers. In this study, researchers found that hackers also used AI technology in hacking practices via HDMI cables.

The study involved capturing electromagnetic radiation emitted from a computer’s HDMI cable. They then trained the AI ​​system by providing screen samples associated with radiation signals traveling through the computer’s HDMI cable. As time went by, these systems gradually became better at interpreting text displayed on computer screens.

Test results show this system is able to reconstruct text from a computer screen randomly with 70 percent accuracy. They also note these systems may be good enough to steal passwords, sensitive data, or in some cases, encrypted communications. The researchers found that they could improve their results by using text recognition software on the text after it had been parsed.

Researchers say hackers may have conducted similar research. This means such screen hacks may have targeted a number of victims. According to them, all that is needed is hardware capable of capturing the electromagnetic radiation emitted by HDMI cables placed close to buildings, such as in the back seat of a car. The team further suggests that most people are not at risk of such an attack, due to the expertise required by this technique. Instead, they suggest that it is more likely that governments or corporate entities will be targeted.

https://www.balaitradisionaldenpasar.org/

Beware of AI Application Ads on Facebook, Accounts Can Be Stolen

Beware of AI Application Ads on Facebook, Accounts Can Be Stolen

Morrissey Technology – The trend of using artificial intelligence (AI) has been spreading in recent times. Not surprisingly, many technology companies promote their AI products through advertisements on social media. However, users also need to be careful and not carelessly click on AI application advertisements on social media, especially Facebook. The reason is, a fake ad on Facebook targets users looking for an AI image editing tool and steals their credentials by tricking them into installing a fake application that imitates the original software.

According to Bleeping Computer, hackers are exploiting the popularity of AI-based image creation tools by creating malicious websites that closely resemble the original service and tricking potential victims into infecting themselves with information-stealing malware. This was discovered by Trend Micro researchers who analyzed the ad.

The attack began with a phishing message sent to the Facebook page owner or admin, which would redirect them to a fake account protection page designed to trick them into providing login information. After stealing their credentials, the perpetrators hijacked the accounts, took control of their pages, published malicious social media posts, and promoted them through paid advertising.

“We discovered a malvertising campaign involving threat actors stealing social media pages (often related to photography), changing their names to appear connected to a popular AI photo editor,” said Trend Micro researcher Jaromir Horejsi.

“The threat actor then created a malicious post with a link to a fake website that was made to resemble a legitimate photo editor website. To increase traffic, the perpetrator then boosted the malicious post through paid advertising,” he continued.

Facebook users who click on the URL in the malicious ad will be sent to a fake web page masquerading as genuine AI photo editing and creation software, and will then be asked to download and install a software package. Instead of installing AI image editing software, victims installed an ITarian remote desktop tool that was configured to launch a downloader that automatically deployed the Lumma Stealer malware.

This malware then silently infiltrates their systems, allowing hackers to collect and compromise sensitive information such as credentials, cryptocurrency wallet files, browser data, and password manager databases. This data is then sold to other cybercriminals or used by attackers to break into victims’ online accounts, steal their money, and promote further fraud.

“Users should enable multi-factor authentication (MFA) on all social media accounts to add an extra layer of protection against unauthorized access,” advises Horejsi.

“Organizations must educate their employees about the dangers of phishing attacks and how to recognize suspicious messages and links. Users should always verify the legitimacy of links, especially those that ask for personal information or login credentials,” he continued.

https://www.karangasem-bangkit.org/

malware

Horrified, a New Virus Appears That Drains Your Account and Deletes Your Cellphone Data

Morrissey Technology – A malware or malicious software on Android called BingoMod was found to be able to drain accounts and delete cellphone data. This malware was found to be promoted via text messages, and masquerades as a legitimate mobile security tool. This malware can steal up to 15,000 Euros or IDR 262 million per transaction. According to the researchers who analyzed it, BingoMod is currently under active development. They say malware authors are focusing on adding code obfuscation and various evasion mechanisms to reduce detection rates.

Researchers at Cleafy, an online fraud management and prevention solution, reported BleepingComputer, found BingoMod distributed in smishing (SMS phishing) campaigns. They use various names that usually indicate mobile security tools such as APP Protection, Antivirus Cleanup, Chrome Update, InfoWeb, SicurezzaWeb, WebSecurity, WebsInfo, WebInfo, and APKAppScudo. In one example, the malware used the icon for the free AVG AntiVirus & Security tool available on Google Play. During the installation process, the malware requests permission to use the Accessibility Service, which provides advanced features that allow broad control over the device.

Once active, BingoMod steals any login credentials, takes screenshots, and reads SMS messages. To perform on device fraud (ODF), the malware creates a socket-based channel to receive commands and an HTTP-based channel to send screenshot feeds, thereby enabling near real-time remote operations. ODF is a common technique used to initiate criminal transactions from a victim’s device, circumventing standard anti-fraud systems that rely on identity verification and authentication. Cleafy researchers explain the Virtual Network Computing (VNC) activity abusing Android’s Media Projection API to obtain screen content in real-time.

Once received, the content is converted into a suitable format and transmitted via HTTP to the cybercriminal or threat actor’s infrastructure. One of the features of this activity is that it can leverage Accessibility Services to impersonate users and enable screen-casting requests, which are exposed by the Media Projection API. Commands that a remote operator can send to BingoMod include clicking on certain areas, writing text on certain input elements, and launching applications. This malware also enables manual overlay attacks via fake notifications initiated by cybercriminals. Additionally, devices infected with BingoMod can also be used to further spread malware via SMS.

https://www.gvardeysk.org/

TikTok AI Cloud

TikTok Revealed to Be a Big Customer of Microsoft’s AI Cloud, What Can It Do?

Morrissey Technology – It was revealed that TikTok is one of the largest consumers of AI Cloud Computing managed by Microsoft. What can video-based social media do with AI? Quoting from The Verge, TikTok paid at least US$20 million (Rp. 322.77 billion) per month to Microsoft to access the OpenAI model last March. That amount is almost equivalent to a quarter of Microsoft’s Cloud division’s revenue. Microsoft’s AI cloud business, according to The Information, is currently achieving annual revenue of around US$1 billion (Rp. 16.14 trillion). Microsoft is also investing multibillion US dollars to make OpenAI its proprietary cloud, and has also poured hundreds of billions of dollars into building the supercomputer that powers ChatGPT.

On the one hand, a study reports that TikTok may not need Microsoft’s cloud AI capabilities if it develops its own Large Language Model (LLM). Last year, the company that houses TikTok, ByteDance, secretly used OpenAI technology to create its own LLM. That practice is generally considered reckless in the world of AI. It is also a direct violation of OpenAI’s terms of service, which state that its model output cannot be used ‘to develop any artificial intelligence models that compete with our products and services’. Microsoft, from which ByteDance buys its OpenAI access, has a similar policy.

Following the report, OpenAI suspended ByteDance’s account to investigate potential violations of its developer license. At the time, ByteDance said it was using the technology ‘to a very limited extent’ to help build its own language models.

AI search feature on TikTok

In May, TikTok was reportedly testing an AI Search Highlights feature on its search page. Quoting The Verge, this AI-based feature will summarize the contents of various videos and highlight them. On the AI ​​disbursement highlights feature page, TikTok explains that its material is supported by ChatGPT made by OpenAI. Meanwhile, at the bottom of the AI ​​search results, TikTok will display videos that the algorithm system considers relevant.

Al Smart Search TikTok provides ChatGPT answers to search queries. TikTok is ultimately trying to capitalize on some of the habits its users – especially the younger generation – have developed on the app. Many young TikTokers treat TikTok like a search engine, choosing to look for restaurant or product recommendations on the app rather than using platforms like Google Search. And like Google, TikTok now seems to be leaning towards AI results by incorporating content from top content creators.

https://www.santacroyadetera.org/

Malware

There’s Dangerous Malware Hiding for Years on Google Play

Morrissey Technology – Security researchers at Kaspersky discovered malware, or rather spyware, called Mandrake hiding inside an application on Google Play. This spyware was found in crypto asset, astronomy and utility tools applications, which are available officially within Google Play. What’s worse, Mandrake has been available for two years and has been downloaded 32 thousand times.

The sample studied by Kaspersky featured advanced obfuscation and evasion techniques, allowing it to remain undetected by security vendors. Interestingly, Mandrake is not new spyware at all. Its action was first discovered in 2020 by BitDefender, which at that time discovered that this spyware infected in two large waves.

Applications compromised by Mandrake were first available on Google Play between 2016-2017, and then appeared again between 2018-2020. And, the ultimate ability of this spyware is that it can operate without being detected by Google, which can then infect large numbers of users, reaching hundreds of thousands of victims over four years. This espionage malware was then discovered again by Kaspersky researchers in April 2024 with more sophisticated capabilities.

“This new sample features advanced obfuscation and evasion techniques, including redirecting malicious functions to native obfuscated libraries using OLLVM, implementing certificate pinning for secure communication with command and control (C2) servers, and performing extensive checks to detect whether Mandrake is operating on rooted devices or in an emulated environment,” Kaspersky wrote.

The applications infiltrated by Mandrake this time were all published on Google Play in 2022. These applications are presented as file sharing applications via Wi-Fi, astronomy service applications, Amber for Genshin games, crypto asset applications, and applications with logic puzzles . As of July 2024, none of these apps had been detected as malware by any vendor, according to VirusTotal. Although it is no longer on Google Play, the app has been available for a long time, and was most downloaded in Canada, Germany, Italy, Mexico, Spain, Peru and the UK.

“After evading detection for four years in its initial version, the latest Mandrake campaign remained undetected on Google Play for another two years. This demonstrates the sophisticated skills of the threat actors involved. It also highlights a troubling trend: as restrictions and security checks tighten “As regulations become more stringent, the sophistication of threats that slip through official app stores increases, making them increasingly difficult to detect,” said Tatyana Shishkova, principal security researcher at Kaspersky’s GReaT (global research and analysis team).

https://hupack.com/-/for4d/

For4d

https://emservices.mx/

https://purenewsmag.com/

Situs Toto

https://sditalfirdausgedawang.sch.id/

Bandar Togel

https://cdn.org.br/

Microsoft

Microsoft Opens Up About the Real Cause of Azure and 365 Down

Morrissey Technology – Technology company Microsoft opened up about Microsoft 365 and Azure services being down for nine hours worldwide last Tuesday (30/7). It all turned out to be triggered by fake traffic or distributed denial-of-service (DDoS) cyber attacks.

The company based in Redmond, Washington DC, United States (US) said that it previously had a defense mechanism for DDoS attacks. However, from a temporary investigation into the DDoS defense that occurred this week, it actually strengthened the impact of the attack.

“Even though the initial trigger event was a Distributed Denial-of-Service (DDoS) attack, which activated our DDoS protection mechanisms,” said Microsoft’s official statement.

“Preliminary investigations indicate that errors in the implementation of our defenses amplified the impact of the attack rather than mitigating it.”

Microsoft’s security team is also working to understand DDoS, and mitigate its defenses.

“Once the nature of the usage spike was understood, we implemented network configuration changes to support our DDoS protection efforts, and failed over alternate network paths to provide relief,” the statement continued.

Previously the service outage due to the DDoS attack impacted Microsoft Entra, several Microsoft 365 and Microsoft Purview services (including Intune, Power BI, and Power Platform), as well as Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy , and the Microsoft Azure Portal.

Microsoft said it plans to release a Initial Post-incident Review (PIR) within 72 hours and a Final Post-incident Review within the next two weeks, with additional details and learnings from this week’s outage. So far, Microsoft has stated that there have been no specific threats made by the perpetrators regarding this DDoS attack.

If we look back, in June 2023, Microsoft also confirmed that an actor known as Anonymous Sudan alias Storm-1359 carried out a DDoS attack which resulted in the outage of Azure, Outlook and the OneDrive web portal.

Additionally, early last July, tens of thousands of Microsoft 365 customers were impacted by another widespread outage. At that time, Microsoft said this was due to changes to the Azure configuration. Other major outages also affected Microsoft 365 services in July 2022 following an incorrect Enterprise Configuration Service (ECS) deployment and in January 2023 following a Wide Area Network IP change.

https://onlinecitycabs.com/

Meta

Meta Admits There is a Bug That Makes the IG Stories Archive Disappear

Morrissey Technology – On Wednesday (1/8) a number of Instagram users around the world said they were shocked because they received notifications that their uploads in the Stories feature archive had been permanently deleted and could not be restored. What is it?

“Certain photos have been permanently deleted from the app’s Stories archives, unable to be recovered,” the notification said.

Meta the digital company that oversees Instagram–admitted that there was a bug or error code that caused a number of users’ story archives to disappear. In an official statement, a Meta spokesperson last Wednesday said the bug could be anticipated.  Apart from that, he said that not all Instagram users experience this problem. Those who were found to be affected by the bug, he said, were the ones who then received notifications.

“We discovered and fixed a bug that was causing some people’s Story highlights and archives to be deleted. Unfortunately, we were unable to restore these Stories and we are notifying people in the app if they were impacted,” the Meta spokesperson said without explaining how many Instagram users who are affected.

Instagram Stories is a more relaxed and less binding form of posting on a user’s account. Users can upload photos, videos, or text posts that will disappear within 24 hours.

Additionally, more exclusive content can be included in a curated Close Friends list or can be permanently placed on your profile as a story highlight. Stories are different from regular posts, as they are often personalized with music, gifs, text, filters, and interactive features like polls or quizzes. Even though it can disappear within 24 hours, Instagram provides an archive feature that allows users to save one of their stories.

https://nourishingherbs.co.uk/

https://createxpro.com/