Morrissey Technology

Loading

Google Photos

Transferring photos from Google Photos to iCloud will be easier

Morrissey Technology – Apple and Google have teamed up to launch a new tool that allows users to transfer their photo collections directly to Apple’s iCloud. This follows the launch of a tool that allows users to transfer iCloud Photos to Google Photos in 2021. This Apple and Google collaboration is part of the Data Transfer Project, which is an open source initiative that focuses on data portability between various online platforms.

“Starting today, Apple and Google are expanding their direct data transfer offerings to allow Google Photos users to transfer their collections directly to iCloud Photos. This complements and enhances the existing transfers that were first made possible from iCloud Photos to Google Photos and meets the principles “The main objective of the Data Transfer Initiative (DTI) is reciprocity,” said a statement from Google and Apple.

DTI launched in 2023 as a collaboration between Apple, Google, and Meta. Officially, the tool was created to advance the goals of the open source Data Transfer Project (DTP), which had begun five years earlier. Unofficially, it is perhaps no coincidence that the DTI was started several months before the European Commission established “gatekeepers” under the Digital Markets Act, and the DTI’s aims happen to align with their regulations. This capability from Apple and Google will launch in the next week and is the latest tool powered by open source Data Transfer Project (DTP) technology, joining the direct portability tools available to billions of people currently offered by DTI and its founding partner, Apple. , Google, and Meta.

Apple and Google have published support articles detailing the process of moving collections from Google Photos to iCloud Photos. Apple said that the service will be available in more than 240 countries and regions around the world. This new tool will automate the transfer process from Google Photos to iCloud, so you don’t need to download, upload, or do anything other than start the process on the web.

On Apple’s support page it is explained that this process can take several hours to several days, depending on the size of the transfer. Transferring photos from Google to iCloud will not remove them from Google Photos, so users will have to do it manually if desired. Additionally, this service will not work for child accounts, Managed Apple ID accounts (accounts set up through an IT admin) or iCloud accounts that have Advanced Data Protection enabled. After it is launched, users can start the process on Google Takeout. Furthermore, users can read Google and Apple instructions to find out all the complete information.

https://denverskylofts.com/js/for4d-togel/

http://imard.edu.vn/-/for4d/

http://www.laoredcross.org.la/-/for4d-togel/

https://sma7bogor.com/

Spyware

Malicious Spyware Threatens iPhone Users in 98 Countries

Morrissey Technology – iPhone users are once again the target of a terrifying spyware attack. Apple has issued a warning to iPhone users in 98 countries. In its latest alert, Apple did not reveal the bad actors involved in this latest attack or the list of countries where users received the alert. Since 2021, Apple has sent similar warnings to iPhone users in more than 150 countries.

“Apple detected that you were the target of a paid spyware attack that attempted to remotely compromise the iPhone associated with your Apple ID -xxx-,” Apple said in a warning received by affected users, as quoted by TechCrunch.

“This attack may target you specifically based on who you are or what you do for a living,” he continued.

Apple says it’s difficult to get complete certainty about detections like this. However, they are very confident about the warnings issued and ask users to take them seriously. iPhone users in India were among the group that received the warning. Last October, a number of journalists and politicians in India also received the same warning.

Not long after, they reported the discovery of Pegasus spyware on an iPhone belonging to a well-known journalist in India. This spyware made by the Israeli company NSO Group is considered vicious because it can infect and access all personal data on an iPhone via a zero-click attack. Just by receiving a special SMS, without even opening or clicking any link, this spyware infiltrates the iPhone without the user’s knowledge.

In its warning, Apple emphasized the highly sensitive nature of its threat detection methods. Therefore they cannot provide too detailed information for fear that it will be exploited by cybercriminals to avoid detection in the future.

Apple will of course immediately try to patch the security gaps that have been found. To avoid further attacks, iPhone users who have sensitive jobs such as journalists and politicians are asked to activate Lockdown mode.

https://perikananindonesia.com/

Circle to Search

Circle to Search is the best-selling Galaxy AI feature, check the reasons

Morrissey TechnologyThe Circle to Search feature is the most used by Galaxy AI users so far, beating the transcript feature for meetings and photo editing. This was revealed in the Samsung Consumer Marketing Insights Study on AI Perception research held by Samsung Electronics Co. Ltd. This study was conducted on non-Samsung users and Samsung Galaxy users in the Southeast Asia and Oceania (SEAO) region.

“Among Samsung Galaxy users in SEAO, about two-thirds use Galaxy AI, where the most frequently used features are Circle to Search, Chat Assist, and Generative Edit,” according to the company’s official statement.

Previously, Galaxy AI was officially released globally on the Samsung Galaxy S24 on February 1. This series of Samsung flagship cellphones was previously launched at the Unpacked event, Thursday (18/1).

Since then, Samsung said, users in Southeast Asia and Oceania have been detected using AI the most to speed up information searches and improve photo editing capabilities. The following is a list of the three Galaxy AI features that users use most:

+ Circle to Search (92 percent)

This AI feature is said to help find information faster by simplifying interactions on social media and the internet through “simple and intuitive gestures.”

+ Transcript Assist (90 percent)

This feature is considered to make it easier for users to transcribe meeting recordings and make summaries and translations.

+ Generative Edit (89 percent)

This feature makes it easy for users to resize, reposition, or realign objects in a photo to “make a good photo perfect.”

AI Effects

Carl Nordenberg, VP & Regional Head of Mobile Experience Business, Samsung Electronics Southeast Asia and Oceania, said that Galaxy AI triggers people to switch to Samsung. Based on this research, 4 out of 5 non-Samsung users in the SEAO region will consider Samsung Galaxy when upgrading their smartphone in the future. The main driving factor is the latest Galaxy AI features, as well as the relevance of these features for them as users, especially the Generative Edit, Circle to Search, and Live Translate features.

“Galaxy AI is generating interest and excitement not only for current Samsung users,” said Nordenberg.

https://suvairporttaxi.com/js/for4d-togel/

WhatsApp Meta AI

WhatsApp users will be able to edit photos using Meta AI

Morrissey Technology – WhatsApp is reportedly working on an update to its Meta AI chatbot service. With this update, it is possible to allow WhatsApp Meta AI to interact with photos shared by users, reply to photos, and even edit them as desired using the chatbot. Meta AI, which is part of Facebook, Instagram, and WhatsApp, now offers impressive text capabilities such as replying to questions, suggesting texts, and having conversations with users.

Based on findings from WABetaInfo, the photo editing feature from Meta AI is available on WhatsApp beta for Android version 2.24.14.20 and will most likely be launched on the official version soon. WhatsApp is considering adding a camera button in the Meta AI chatbot, similar to the camera button in regular chats, which would allow users to share their photos with the AI ​​chatbot. This new feature will allow users to ask AI to identify objects or locations or provide context for photo content. Additionally, this functionality will also offer the option to edit photos via text commands.

However, it is still unclear what level of image editing Meta AI can perform on WhatsApp. Compared to existing AI-powered image editing tools, Meta AI may be able to remove selected objects, remove and replace backgrounds, and adjust image appearance. As per the screenshot shown, the uploaded images will be analyzed by AI and also users can delete their images at any time. Previous reports suggested that WhatsApp is also working on a new ‘Imagine Me’ feature that will allow Meta AI to create AI avatars. This feature is seen being tested on Android beta version 2.24.14.13.

As per the report, WhatsApp will initially ask users to take a selfie, which will be read and analyzed by Meta AI before creating an AI avatar with the appropriate level of accuracy and realism. Additionally, users will have full control over this feature, as they can delete prepared photos at any time via the Meta AI settings.

https://krishna-boutique.com/js/for4d/

https://servicos.ourem.pt/-/for4d-togel/

https://smog-epinorth.chiangmaihealth.go.th/-/for4d/

https://ecommerce.dislicores.com/backend/admin/backend/web/assets/js/for4d/

FOR4D

ROKOKBET

ROKOKBET

OpenAI

OpenAI Was Hacked Last Year, Data Was Stolen But the FBI Didn’t Report it

Morrissey Technology – The artificial intelligence (AI) company behind ChatGPT, OpenAI, was reportedly the victim of a hack last year. Hackers at the time reportedly stole details about the company’s AI technology design. The news of this hack was revealed by The New York Times without mentioning the source of this news, and claimed “two people familiar with the incident” leaked this.

However, they claim the hackers only broke into the forum, not the core system, which drives OpenAI’s algorithms and AI framework. OpenAI reportedly disclosed the hacking incident to employees at an employee meeting in April last year. They also inform the board of directors.

However, OpenAI executives decided not to share the news with the public. They also did not report this incident to the FBI or other law enforcement. According to The New York Times, OpenAI did not disclose the hack to the public because information about customers was not stolen.

“Executives did not consider the incident a threat to national security because they believed the hacker was an individual with no ties to the foreign government,” the newspaper said.

The New York Times source said some OpenAI employees worry China-based adversaries could steal the company’s AI secrets and pose a threat to US national security.

Leopold Aschenbrenner, the leader of OpenAI’s supersignment team at the time, reportedly shared similar sentiments about weak security and being an easy target for foreign adversaries.

Aschenbrenner said he was fired earlier this year for sharing internal documents with three external researchers to get “feedback.” He insinuated his dismissal was unfair; he scanned the document for any sensitive information, adding that it was normal for OpenAI employees to contact other experts for a second opinion.

However, The New York Times points out that studies conducted by Anthropic and OpenAI reveal that AI is “not significantly more dangerous” than search engines like Google.

However, AI companies must ensure that their security is tight. Lawmakers are pushing for regulations that impose huge fines on companies whose AI technology causes social harm.

https://www.eajpnv-ordizia.org/

https://www.encom-training.com/-/for4d/

https://anugerahprodukpertanian.com/

Supply of Advanced Chips Stifled, China's AI Development Continues

Supply of Advanced Chips Stifled, China’s AI Development Continues

Morrissey Technology – A senior Huawei executive claims that China’s AI development will continue even if the supply of advanced chips runs low. These comments were made by Zhang Ping’an, CEO of Huawei Cloud, in response to the tightening regulations on the import of advanced AI chips by the United States, including banning the sale of advanced chips from US AI chip giant Nvidia.

“It must be admitted that we do experience limited computing power in China… However, we cannot just rely on AI chips with https://xosophuongtrang.org/ advanced manufacturing nodes as the main basis for AI infrastructure,” said Zhang at the World AI Conference forum in Shanghai, China.

“But we believe that not having the most advanced AI chip does not mean we cannot develop AI, we have to change our perspective like this,” he added.

Huawei, which is again on the American Entity List, cannot buy advanced chips from American companies, which is why they developed their own AI chip called Ascend which is now used by many Chinese companies to train their AI models.

It’s just that this Ascend chip, along with other AI chips made in China, is considered to have computing capabilities that cannot compete with AI chips made by Nvidia. But according to Zhang, this makes them innovate more in the cloud, which he says can Slot Online compensate for these shortcomings through innovation in computing architecture. Apart from that, their innovation, which combines cloud, edge computing and networking, can also save energy consumption and increase overall efficiency.

https://www.kkphospital.go.th/-/for4d/

https://kalamariotes.gr/-/for4d-togel/

iCIO Community

iCIO Community Reminds the Importance of Mitigating Ransomware Threats in RI

Morrissey TechnologyThe ransomware that attacked the Temporary National Data Center (PDNS) 2 caught the attention of many parties, including the iCIO Community. They emphasized the importance of mitigating ransomware threats for organizations in Indonesia. iCIO Community is a community of Chief Information Officers and Executives in the ICT sector of companies and organizations in the country. This community is designed as a means of sharing practices and leadership in the ICT field.

“It is important for every organization to develop a comprehensive and proactive cybersecurity strategy. In a world that is increasingly connected and vulnerable to cyberattacks, data protection and collaboration between companies is not only important, but urgent. Let’s unite, share experiences, and strengthen organizational defenses Together, we can protect Indonesia’s digital future from growing threats,” said Iskak Hendrawan, Deputy Chair of the iCIO Community.

Moreover, the personal data protection law will complete its trial period in October this year.

“In the current digital era, ransomware attacks cannot be taken lightly. With the implementation of the Personal Data Protection Law in Indonesia, companies are required to be more serious in protecting users’ personal data. We from the iCIO Community hope that the government and public services can adopt this technology adequate and implementing good data governance procedures. This is not just about technology, but also about the responsibility to protect and manage information that is vital for the country and society,” said Harry Surjanto, Advisor to the iCIO Community.

While it is difficult to completely prevent ransomware attacks, proper mitigation measures can minimize their impact. Last year, this community admitted to having held a closed focus group discussion among its members to discuss the ransomware threat they faced. iCIO Community assesses the need for strict operational discipline to ensure rapid recovery in the face of cyber attacks. This covers several important aspects. First, securing infrastructure in the data center. All infrastructure in the organization must always be hardened and updated with critical security patches at the operating system and device firmware level.

“All data must be backed up regularly and stored securely and strictly,” said the iCIO Community representative.

Second, strict monitoring. Monitoring system health and security through the command center and security operation center 7×24 hours is very important. Organizations must have a rapid reaction unit for recovery and dealing with hacking attacks. The three Disaster Recovery Centers (DRC). Organizations must have a DRC and regularly conduct disaster recovery drills. System recovery training activities for disasters must also be monitored and reported to the regulator

Basic security hygiene is a major concern and discipline that should not be ignored. According to the iCIO Community, this is the primary foundation for protecting organizations from ever-evolving threats. Cases such as the attack on PDN show how important it is to have a fast and effective response strategy. We hope the government can design and implement a comprehensive emergency plan to address ransomware attacks. Cross-sector collaboration and sharing information about new threats and attack tactics are crucial in strengthening national cyber threat defenses.

With these steps, the iCIO Community is confident that we can mitigate the negative impact of ransomware attacks and ensure the security of data that is critical to the national interest. And thanks to the adoption of adequate technology and good data governance, mitigation and recovery procedures, governments and public services can provide better services, increase public trust and protect the important information they hold.

https://bluewaysglobal.com/-/for4d/

Bots are Increasingly Rampant in Cyberspace, This is The Danger

Bots are Increasingly Rampant in Cyberspace, This is The Danger

Morrissey Technology – The Akamai report states that 42% of internet traffic is generated by bots, and shockingly, 65% of those bots are used for crime. In this report, Akamai deliberately researched data scavenger bots circulating in cyberspace. This bot is designed to collect data and content for use by cybercrime.

The e-commerce sector is considered to be the most affected by the actions of data scavenger bots and high-risk traffic bots. It must be admitted, there are indeed bots that can be profitable, but these scavenger bots often have a negative impact, especially on consumers. This is because data scavenger bots are used to spy on rival stores, stockpile goods, create fraudulent sites, and various other criminal activities.

Akamai CTO Patrick Sullivan explained that bots are a significant problem, because they can create a number of targets for web applications, services and application programming interface (API) owners.

For example, data-scavenging bots can easily steal product images, descriptions, pricing information, and other data. Then this data can be used by cybercriminals to create fake sites to imitate ecommerce sites from well-known brands.

In fact, now with the presence of AI, the data taken by bots can be slightly modified to create a site that generates traffic — and is then used to make money through advertising revenue.

Bots with AI are also more difficult to detect. For example, AI botnets, which can function with unstructured data. According to Akamai, with the use of AI, criminals can collect, extract and process data more efficiently.

Lastly, bots can also be used to create fake accounts, which can then be used to target victims financially. Even the most innocuous scavenging bot can be used to degrade a site’s performance, impact search engine impact calculations, and also increase the computing and hosting costs of a site.

https://savix.serverpersonale.it/-/for4d/

Google Reveals the Bad Effects of AI on the Environment

Google Reveals the Bad Effects of AI on the Environment

Morrissey TechnologyGoogle just released its environmental impact report for 2023 and the results are worrying. Google’s greenhouse gas emissions are increasing rapidly amidst the company’s priorities now focusing on AI. According to the report, Google’s total greenhouse gas emissions have increased by 48% since 2019. Even though Google has set a target to reduce emissions by 50% by 2030.

Last year alone, Google produced 14.3 million tonnes of carbon dioxide pollution which marked a 13% increase from the previous year. This figure is equivalent to the amount of carbon dioxide emissions emitted by 38 gas-fired power plants each year.

Google said the rise in carbon dioxide pollution was influenced by electricity use in data centers and supply chain emissions. Electricity consumption, primarily from data centers, contributes nearly one million tonnes of pollution to Google’s carbon footprint by 2023.

Data centers, especially those used to train AI, require enormous amounts of electrical power. Google is currently aggressively adding generative AI features to a number of its products, and they are starting to worry about the negative effects of AI on their environmental impact reports.

“As AI becomes more integrated into our products, reducing emissions may become a challenge due to increased energy demands resulting from greater AI computing, and emissions associated with expected improvements to our technical infrastructure,” Google said.

Electricity consumption in Google data centers last year increased 17%, and the Alphabet subsidiary expects the trend to continue. According to Google estimates, its data centers will contribute almost 10% of total global electricity consumption by 2023.

To reduce AI’s detrimental impact on the environment, Google says it is trying to make its AI models, hardware, and data centers more efficient. Google also plans to use carbon pollution-free energy by 2030.

Google isn’t the only tech company concerned about the impact of AI on its environmental ambitions. Microsoft’s greenhouse gas emissions last year rose 30% compared to 2020.

https://ecobreeze.com.my/wp-content/for4d/

https://blogdoeda.com.br/css/for4d/

Data Allegedly Leaked, KAI Ensures User Database is Safe

Data Allegedly Leaked, KAI Ensures User Database is Safe

Morrissey Technology – The social media world was abuzz with news of the alleged KAI Commuter data leak. The leaked data has also reportedly been sold on the dark web. The news of the alleged data leak was revealed by the @txttransportasi account on X (formerly Twitter).

“Oh, you know… KAI database?” upload the account on Tuesday (2/7).

The account also attached screenshots of cyber criminals’ uploads on Breachforums. However, the name of the account that uploaded KAI Commuter data on Breachforums was censored in the screenshot FOR4D.

The suspected hacker claimed that the leaked data included various personal information of KAI Commuter users, such as names, ticket codes, payment methods and transaction times. Responding to this issue, KAI Commuter claimed that its user data was safe, even though it had been hacked. KAI Commuter also said that it had coordinated with related agencies to handle this hack.

“KAI Commuter ensures the security of the Commuter Line user data base which was hacked by irresponsible parties,” Anne Purba FOR4D, Corporate Secretary of KAI Commuter said in a statement, Wednesday (3/7).

“Until now, KAI Commuter together with related parties continue to coordinate and carry out in-depth investigations to trace and handle the system hack,” he added.

Anne said that her party had taken steps to deal with it, including limiting access to both public networks and local networks.

“Currently all IT operational systems FOR4D in the KAI Commuter environment are still running well and all customer databases are safe,” explained Anne.

Furthermore, Anne asked the public not to worry about using all the service applications owned by KAI Commuter, because KAI Commuter has good information security management.

KAI Commuter is also said to have implemented ISO 27001:2013 as a standardization of the Information Security Management System at KAI Commuter. This security standardization, he said, is also regularly audited by independent auditors to ensure security in its implementation.

“KAI Commuter is committed to continuing to improve cyber security FOR4D in the application of information technology that makes it easier for people to use the Commuter Line and will thoroughly investigate this crime,” said Anne.

“For further steps, KAI Commuter will cooperate with the authorities to investigate this case,” he concluded.