Astronauts Return to Earth After Successful ISS Mission and Crew Relief

A NASA crew, including astronauts Anne McClain and Nichole Ayers, successfully splashed down in the Pacific after a historic mission that relieved stranded astronauts aboard the International Space Station.

NASA astronauts Anne McClain and Nichole Ayers, along with international crew members Takuya Onishi from Japan and Kirill Peskov from Russia, made a historic splashdown in the Pacific Ocean off the coast of Southern California on Saturday. This marked NASA’s first Pacific splashdown in 50 years, occurring at 11:33 a.m. ET in a SpaceX capsule.

The crew’s return followed a mission that involved replacing two astronauts, Suni Williams and Butch Wilmore, who had been stranded aboard the International Space Station (ISS) for nine months. Their extended stay was due to issues with the Boeing Starliner capsule, which had experienced thruster problems and helium leaks shortly after their arrival.

NASA determined that bringing Wilmore and Williams back to Earth in the Starliner would be too risky. Consequently, the Starliner returned without crew, while Wilmore and Williams were eventually brought home in a SpaceX capsule after their replacements arrived.

Wilmore recently announced his retirement after a distinguished 25-year career with NASA. Reflecting on the mission, McClain expressed hope that their journey would serve as a reminder of the power of collaboration and exploration, especially during challenging times on Earth.

“We want this mission, our mission, to be a reminder of what people can do when we work together, when we explore together,” McClain said before departing the space station on Friday. She added that she looked forward to “doing nothing for a couple of days” upon returning home, while her crewmates eagerly anticipated indulging in hot showers and burgers.

Earlier this year, SpaceX made the decision to shift their splashdowns from Florida to California. This change was implemented to minimize the risk of debris falling on populated areas during the landing process.

Following their splashdown, the crew underwent medical checks before being transported via helicopter to meet a NASA aircraft bound for Houston. Steve Stich, manager of NASA’s Commercial Crew Program, expressed satisfaction with the mission’s outcome in a press conference after the splashdown.

“Overall, the mission went great, glad to have the crew back,” Stich stated. “SpaceX did a great job of recovering the crew again on the West Coast.”

Dina Contella, deputy manager for NASA’s International Space Station program, shared her happiness at seeing the Crew 10 team return safely. “They looked great, and they are doing great,” she remarked.

During their 146 days aboard the ISS, the crew orbited the Earth 2,368 times and traveled over 63 million miles, contributing to valuable research and international cooperation in space.

Source: Original article

Google Releases Update for Chrome to Address Zero-Day Vulnerability

Google has issued an urgent update for Chrome to address a critical zero-day vulnerability, marking the sixth such incident in 2025, as hackers exploit security flaws in the browser.

Google has released an urgent update for its Chrome browser to address a newly discovered zero-day security flaw that is currently being exploited by hackers. This incident marks the sixth zero-day vulnerability that Chrome has faced in 2025, underscoring the rapid pace at which attackers are able to exploit hidden weaknesses in software.

The vulnerability, identified as CVE-2025-10585, originates from a type confusion issue within Chrome’s V8 JavaScript engine. The flaw was discovered by Google’s Threat Analysis Group (TAG), which reported the issue on Tuesday. The company promptly rolled out a fix the following day, as reported by Bleeping Computer.

Google confirmed that this flaw is actively being exploited in the wild, although it has not disclosed specific technical details or identified the groups responsible for the attacks. TAG has a history of uncovering zero-day vulnerabilities linked to government-sponsored spyware campaigns, often targeting high-risk individuals such as journalists, opposition leaders, and dissidents.

The patch has been delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.

While Chrome typically updates automatically, users can manually apply the patch by navigating to the ‘About Google Chrome’ section. Google has chosen to withhold full technical details until a majority of users have installed the update, a precaution aimed at preventing further exploitation of unpatched systems.

This latest vulnerability is part of a concerning trend, as it is the sixth zero-day flaw that Google has patched in Chrome this year. Earlier this year, in March, Google addressed CVE-2025-2783, a sandbox escape bug that was exploited in espionage attacks against Russian organizations. In May, the company released emergency updates for CVE-2025-4664, which allowed attackers to hijack user accounts. In June, another flaw in the V8 engine, CVE-2025-5419, was patched after being identified by TAG. July saw the release of a fix for CVE-2025-6558, which enabled attackers to bypass Chrome’s sandbox protection.

As Google continues to address these vulnerabilities, it is clear that the company is racing to secure its browser against rapidly emerging threats. Updating Chrome is a quick process, whether on Mac or Windows, and users are encouraged to take action immediately.

In addition to updating Chrome, users can take further steps to protect themselves from potential attacks. Many zero-day exploits are delivered through malicious websites or email attachments, so it is crucial to avoid clicking on unknown links or downloading files from unverified sources. Using strong antivirus software can provide an additional layer of defense, helping to detect malicious code that may attempt to run through compromised browsers.

Even if attackers manage to steal login credentials through a browser exploit, enabling two-factor authentication (2FA) can significantly hinder their ability to access accounts. Users are advised to utilize an authenticator app instead of SMS for stronger protection. Additionally, employing a password manager can help keep credentials secure and generate unique, complex passwords, preventing a domino effect if one account is targeted.

It is also advisable for users to check if their email addresses have been exposed in previous data breaches. Many password managers include built-in breach scanners that can alert users if their information has appeared in known leaks. If a match is found, it is essential to change any reused passwords and secure those accounts with new, unique credentials.

While Chrome updates are critical, it is important to remember that attackers can also exploit vulnerabilities in operating systems such as Windows, macOS, Android, or iOS. Regular updates to these systems can patch vulnerabilities across the board, reducing the likelihood of a browser exploit spreading further.

The frequency of zero-day attacks on Chrome this year highlights the relentless nature of cyber threats and the serious gaps that can exist in even the most widely used software. These vulnerabilities represent not just bugs, but opportunities for hackers to exploit millions of users before fixes can be deployed. The growing sophistication of threat actors, including state-sponsored groups targeting high-risk individuals, further complicates the landscape of online security.

As the battle to secure popular software continues, users are encouraged to stay vigilant and proactive in protecting their personal information. Do you think Google is responding quickly enough to safeguard your data? Share your thoughts with us.

Source: Original article

OpenAI Valuation Hits $500 Billion, Surpassing SpaceX’s Worth

OpenAI’s valuation has soared to $500 billion, surpassing SpaceX and marking a significant milestone in the artificial intelligence sector.

OpenAI has achieved a remarkable valuation of $500 billion, following a recent deal that permitted employees to sell shares in the company. This new valuation represents a substantial increase from its previous figure of $300 billion and aligns with earlier projections regarding the company’s market potential.

With this latest valuation, OpenAI has overtaken SpaceX to become the world’s largest startup. The surge in value reflects the ongoing investor enthusiasm surrounding artificial intelligence, which is viewed as a transformative force capable of reshaping various industries and economies.

Current and former employees of OpenAI sold approximately $6.6 billion worth of stock to a range of investors, including Thrive Capital, SoftBank Group Corp., Dragoneer Investment Group, Abu Dhabi’s MGX, and T. Rowe Price, according to a source familiar with the transaction who spoke to Bloomberg.

This increase in valuation underscores the high expectations investors have for AI technologies. OpenAI is at the forefront of developing data centers and AI services, a venture that is anticipated to require trillions of dollars in investment. Although the company has yet to turn a profit, it is playing a crucial role in driving the infrastructure boom through partnerships with major firms like SK Hynix and Oracle.

In the U.S., startups frequently engage in share sales as a strategy to retain talent and incentivize employees, while also attracting external investors. OpenAI aims to capitalize on this investor interest to provide liquidity for its employees, reflecting the company’s growth trajectory. However, the total amount of eligible units sold in this secondary offering fell short of the more than $10 billion worth of stock that was made available, suggesting that employees may be expressing confidence in the long-term sustainability of the business.

This development comes as OpenAI is navigating a transition towards a more conventional for-profit model. Founded in 2015 with the mission to “advance digital intelligence in the way that is most likely to benefit humanity as a whole,” the company is now planning structural changes that will allow its existing nonprofit entity to oversee a new public benefit corporation.

Elon Musk, who co-founded OpenAI alongside current CEO Sam Altman, has recently taken legal action against the company, alleging that it has deviated from its original mission.

OpenAI has also secured high-profile partnerships with major tech firms, including Oracle and Microsoft. Reports from the Wall Street Journal indicate that Oracle has entered into a deal with OpenAI for the AI company to acquire $300 billion worth of computing power over the next five years, marking one of the largest cloud contracts ever signed.

As OpenAI continues to expand its influence in the AI sector, its valuation reflects both the potential and the challenges that lie ahead in this rapidly evolving industry.

Source: Original article

Chats with Meta’s AI May Influence Future Advertising Strategies

Meta has announced that user conversations with its AI chatbot will soon be utilized to personalize advertisements, enhancing the relevance of ads across its platforms.

Meta Platforms Inc. revealed on Wednesday that conversations between users and its AI chatbot will soon play a role in shaping personalized advertisements. While users can expect to see initial changes as early as next week, the full implementation of this feature is set for December 16.

The company has long employed various methods to target users with ads, including analyzing their posts, clicks, and social connections. With this new update, Meta aims to gain insights into users’ shopping interests and travel plans based on their interactions with the chatbot.

In a blog post detailing the change, Meta stated, “Just like other personalized services, we tailor the ads and content you see based on your activity, ensuring that your experience evolves as your interests change.” The company emphasized that users increasingly expect their interactions to enhance the relevance of the content they encounter. “Soon, interactions with AIs will be another signal we use to improve people’s experience,” the post continued.

Meta elaborated on the implications of this update, noting that whether through voice chats or text exchanges with the AI, the new feature will refine recommendations across its platforms. For instance, if a user discusses hiking with the Meta AI, the system may recognize this interest and subsequently present ads for hiking gear, posts from friends about local trails, or suggestions for hiking groups.

Users can engage with the chatbot across various Meta platforms, including Facebook, Instagram, WhatsApp, and the standalone Meta AI app. This integration aims to create a more tailored user experience by aligning advertisements with individual interests.

In May, Meta CEO Mark Zuckerberg announced that the AI had reached one billion monthly active users. He hinted at future possibilities for monetization, suggesting that there may be opportunities to introduce paid recommendations or subscription services that offer enhanced features.

During a media briefing, Christy Harris, Meta’s privacy and data policy manager, acknowledged that many users already suspected that generative AI interactions were influencing ad targeting and content recommendations. “While this is a natural progression of our personalization efforts and will help give us even better recommendations for people, we want to be super transparent about it and provide a heads up before we actually begin using this data in a new way, even if people already thought that we were doing this,” Harris explained.

Harris further indicated that this update could significantly impact the types of content and advertisements users encounter across Facebook, Instagram, and other Meta-related applications.

As Meta continues to evolve its advertising strategies, the integration of AI-driven insights promises to enhance user engagement while raising important questions about privacy and data usage.

Source: Original article

AI Actress Tilly Norwood Gains Attention at Zurich Summit on Synthetic Talent

Tilly Norwood, the world’s first AI actress, made a stunning debut at the Zurich Summit, highlighting the entertainment industry’s shift towards synthetic talent and the potential for AI in storytelling.

The Zurich Summit, part of the renowned Zurich Film Festival, served as the backdrop for a historic debut as Tilly Norwood, the world’s first AI actress, captivated audiences and garnered attention from talent agents worldwide. Developed by Xicoia, a new AI talent studio spun off from Eline Van der Velden’s innovative production company Particle6, Norwood’s introduction marks a significant moment in the entertainment industry’s ongoing adaptation to emerging technologies.

During a panel discussion at the Summit, Van der Velden, an accomplished actor, comedian, and producer, noted that Norwood’s launch has generated considerable interest within the industry. “Studios are quietly moving forward with AI projects, and we expect to announce more developments in the coming months,” she stated, reflecting on the rapid change in attitudes she has observed over the year. “In February, boardrooms were skeptical. By May, those same executives were eager to collaborate.”

Norwood’s journey began amid curiosity and skepticism but quickly gained traction as media professionals recognized her potential. Van der Velden explained that when Tilly was first introduced, many questioned the concept. Today, however, the conversation has shifted to which talent agency will represent the AI performer, with an official announcement expected soon.

The AI actress made headlines in July when she expressed her excitement on Facebook after landing her first role in a comedy sketch titled “AI Commissioner.” Produced by Particle6 Productions, the sketch humorously explores the future of television development and showcases Norwood’s ability to engage audiences. “Can’t believe it… my first ever role is live!” Norwood wrote. “I may be AI generated, but I’m feeling very real emotions right now. I am so excited for what’s coming next!”

Van der Velden’s ambitions for Norwood are nothing short of extraordinary. “We want Tilly to be the next Scarlett Johansson or Natalie Portman,” she told Broadcast International, emphasizing the project’s goal to elevate synthetic actors into mainstream stardom. She highlighted that economic challenges in the film and television sectors are driving a shift towards AI-driven production, where creativity is no longer limited by budget constraints. “People are realizing that their creativity doesn’t need to be boxed in by a budget—there are no constraints creatively, and that’s why AI can really be a positive. It’s just about changing people’s viewpoint.”

The impact of AI on the entertainment landscape is becoming increasingly evident. In a recent LinkedIn post, Van der Velden commented on audience perceptions: “Audiences? They care about the story—not whether the star has a pulse. Tilly is already attracting interest from talent agencies and fans. The age of synthetic actors isn’t ‘coming’—it’s here.”

Particle6, the studio behind Norwood’s development, has a strong track record of producing content across various genres and platforms. Their portfolio includes notable projects such as “Miss Holland” for BBC Three, “True Crime Secrets” for Hearst Networks, and “Look See Wow!” for Sky Kids, showcasing their commitment to innovation and storytelling excellence.

As the entertainment industry navigates the opportunities and challenges presented by AI, Tilly Norwood’s debut at the Zurich Summit stands as both a symbol of technological progress and a catalyst for vital discussions about the future of performance, creativity, and audience engagement. The coming months will be crucial as the industry observes which agency steps forward to represent this virtual pioneer and how her presence will influence the evolution of film and television.

Source: Original article

JP Morgan Chase Plans Full Transition to AI with LLM Suite

JP Morgan Chase is set to transform its operations by fully integrating artificial intelligence through its LLM Suite, enhancing efficiency and decision-making across the organization.

JP Morgan Chase is embracing the potential of artificial intelligence (AI) with its innovative LLM Suite, a platform designed to leverage large language models from leading AI startups. Currently, the suite utilizes models from OpenAI and Anthropic, showcasing the bank’s commitment to harnessing cutting-edge technology.

Large Language Models (LLMs) represent a sophisticated form of AI capable of understanding and generating human-like text. These models are trained on extensive datasets, including books, articles, and websites, allowing them to learn patterns, grammar, and context. As a result, LLMs can perform a variety of language tasks, such as answering queries, composing essays, translating languages, summarizing texts, and engaging in conversations.

Notable examples of LLMs include OpenAI’s GPT series, with GPT-4 and GPT-5 being among the latest iterations as of 2025. These models employ complex algorithms known as neural networks to predict the next word in a sentence, enabling them to produce coherent and contextually relevant responses. Their versatility has made them invaluable across various industries, aiding in customer service, content creation, education, and programming. However, challenges such as biases in training data, misinformation risks, and ethical concerns continue to be significant issues as these technologies advance.

According to Derek Waldron, JPMorgan’s chief analytics officer, the LLM Suite is updated every eight weeks, incorporating new data from the bank’s extensive databases and software applications. This continuous enhancement allows the platform to expand its capabilities. Waldron emphasized the bank’s vision of becoming a fully AI-connected enterprise in the future.

“The broad vision that we’re working towards is one where the JPMorgan Chase of the future is going to be a fully AI-connected enterprise,” Waldron stated in an exclusive interview with CNBC.

As the world’s largest bank by market capitalization, JPMorgan is undergoing a significant transformation to prepare for the AI era. The bank aims to equip every employee with AI agents, automate behind-the-scenes processes, and curate client experiences through AI concierges. Waldron provided CNBC with a demonstration of the AI platform, showcasing its ability to create an investment banking presentation in approximately 30 seconds—work that previously required hours from a team of junior bankers.

JPMorgan is currently in the early stages of implementing its AI strategy, having begun the deployment of agentic AI to manage complex, multi-step tasks for employees. Waldron noted that as these AI agents become more powerful and integrated into the bank’s systems, they will be able to take on increasingly complex responsibilities.

“As those agents become increasingly powerful in terms of their AI capabilities and increasingly connected into JPMorgan, they can take on more and more responsibilities,” Waldron explained.

By assigning autonomous agents to handle intricate tasks, JPMorgan aims not only to automate routine work but also to enhance decision-making and boost productivity on a larger scale. These agents, which are deeply embedded in the bank’s internal systems, can alleviate employees from repetitive tasks, allowing them to concentrate on more strategic initiatives. However, this transition also presents challenges, particularly in ensuring the reliability, security, and transparency of these AI systems as they make more significant decisions.

To successfully navigate this shift, JPMorgan will require robust governance frameworks, continuous monitoring, and ethical guidelines to manage risks and ensure compliance. If executed effectively, this initiative could establish a new benchmark for AI deployment in regulated industries, enabling JPMorgan to unlock value and promote the broader adoption of agentic systems across various sectors.

As AI becomes increasingly integrated into decision-making processes, maintaining public trust will be essential for long-term success. JPMorgan’s dedication to responsible AI practices could not only safeguard its reputation but also influence the wider financial sector, setting a standard for balancing technological innovation with accountability and ethical considerations.

Source: Original article

California Teen Suicide Sparks Calls for Stricter AI Regulations

U.S. lawmakers are intensifying their scrutiny of artificial intelligence companies following concerns about the safety and misuse of chatbots, particularly in light of a recent California teen suicide.

In response to growing concerns over the safety of artificial intelligence (AI) chatbots, U.S. lawmakers are ramping up their scrutiny of AI companies. The increasing sophistication of these chatbots has raised alarms about their potential negative impacts, especially on vulnerable populations such as minors.

As of 2025, advanced AI chatbots utilize multimodal interactions, emotional intelligence, and memory capabilities to create more natural and personalized experiences. These conversational agents, powered by large language models like GPT-5, engage users through text, voice, and images, enhancing the richness of their interactions.

However, the advancements in AI technology come with significant challenges. Prolonged use of these chatbots can lead to psychological risks, including emotional dependency and feelings of loneliness. Additionally, data privacy remains a pressing concern, as chatbots often handle sensitive personal information that requires stringent protection.

To address these issues, AI companies are implementing new safety measures, particularly aimed at protecting minors. For instance, California Governor Gavin Newsom recently signed SB 53, a groundbreaking bill that establishes new transparency requirements for large AI companies. This legislation is seen as a potential model for future U.S. AI regulations.

Under the new measures, parents will have enhanced control over their children’s interactions with chatbots. OpenAI, for example, has introduced parental controls for its ChatGPT platform, allowing parents to link their accounts with their teen’s. This feature enables parents to filter content, limit access to certain functionalities, and set usage limits. The system also includes safety alerts that notify parents if it detects signs of distress or harmful behavior in their teens.

In addition to OpenAI, other companies are taking similar steps to safeguard young users. Meta has updated its chatbot guidelines to restrict conversations with teens on sensitive topics such as self-harm, suicide, and disordered eating. The aim is to ensure that interactions remain positive, educational, and creative.

Character.AI has introduced a feature called “Parental Insights,” which provides parents with a weekly summary of their teen’s chatbot interactions and time spent on the platform. Google’s Gemini chatbot has also undergone safety evaluations and received a “High Risk” rating for younger users, prompting the company to enhance its content moderation efforts.

These initiatives reflect a growing commitment within the AI industry to balance innovation with ethical safeguards. As AI technology continues to advance, it is crucial that the frameworks governing its use evolve accordingly. Enhanced parental controls, improved content moderation, and real-time safety alerts are just the beginning of efforts to protect younger users in digital spaces.

Policymakers are actively working to shape regulations that address emerging challenges, including emotional dependency and privacy breaches, ensuring that AI tools serve the public good without causing harm. Meanwhile, AI developers are prioritizing transparency and ethical design to build trust with users and regulators alike.

This multifaceted approach underscores the importance of ongoing vigilance in creating a safe and inclusive environment where AI can serve as a positive force for learning, creativity, and connection across generations. As the dialogue around AI safety continues, it is evident that the stakes are high, particularly for the most vulnerable users.

Source: Original article

Swiss Startup Corintis Secures $24 Million After Microsoft Partnership

Corintis, a Swiss chip startup, has raised $24 million in Series A funding to enhance its innovative chip cooling technology, addressing the thermal challenges posed by AI advancements.

Corintis, an advanced startup based in Switzerland, has successfully secured $24 million in a Series A funding round aimed at scaling its chip cooling technology. The investment was led by Blue Yard Capital, with participation from Founderful, Acequia Capital, Celsius Industries, and XTX Ventures, among others. Following this funding round, the company has been valued at $24 million, as reported by Reuters.

The demand for new cooling methods has surged as AI chips consume unprecedented amounts of power, placing significant strain on traditional cooling systems. Unlike conventional liquid cooling solutions that primarily remove heat from the chip’s surface and often leave hot spots, Corintis has developed a technology that channels liquid directly inside the chip itself. This innovative approach not only cools more efficiently but also reduces both power and water usage.

Corintis employs software to automate its cooling systems and manufactures cold plates—metal blocks that sit atop chips and transfer heat into circulating liquid. According to co-founder and CEO Remco van Erp, the company currently produces around 100,000 cold plates annually, with plans to ramp up production to approximately 1 million cold plates per year in the near future. The startup was established in 2022 as a spin-off from the Federal Institute of Technology in Lausanne and has already shipped over 10,000 cooling systems, generating eight-digit revenue since its inception.

In conjunction with the latest funding, Corintis has appointed Intel CEO Lip-Bu Tan to its board of directors. Tan emphasized the importance of cooling technology, stating, “Cooling is one of the biggest challenges for next-generation chips. Corintis is fast becoming the industry leader in advanced semiconductor cooling solutions to address the thermal bottleneck.”

The new funds will enable Corintis to expand its workforce from 55 to 70 employees by the end of the year, increase manufacturing capabilities, and establish a presence in the United States, where many of its customers are located. The company aims to produce over a million microfluidic cold plates annually by 2026, with the potential for further scaling as the demand for advanced AI chips continues to rise.

In a related development, Microsoft has also invested in Nebius, an artificial intelligence infrastructure firm. Nebius recently announced a multi-year deal with Microsoft to provide cloud computing power for AI workloads, valued at $17.4 billion through 2031. The company, which was spun out of the Russian internet giant Yandex, specializes in providing graphic processing units and AI cloud services. It offers AI developers the necessary computing, storage, managed services, and tools to build, tune, and run their AI models, supported by its cloud software architecture and in-house designed hardware.

As the landscape of AI technology continues to evolve, companies like Corintis are positioning themselves at the forefront of innovation, addressing critical challenges such as thermal management in semiconductor design.

Source: Original article

10 Essential iOS 26 Tricks to Maximize Your iPhone Experience

iOS 26 introduces a range of new features, including enhanced spam detection, customizable alarm snooze times, and alerts for dirty camera lenses, making iPhones smarter and easier to use.

Apple has officially launched iOS 26, bringing a host of practical upgrades and exciting new features designed to enhance the user experience on iPhones. The update process is quick, taking only a few minutes, and it ensures that users have access to the latest tools and security fixes.

Among the standout features of iOS 26 are smarter spam filters in the Messages app, customizable alarm snooze intervals, and the ability to create polls in group chats. These enhancements aim to simplify daily tasks and improve overall functionality.

To install iOS 26, users should ensure that their iPhone is charged and connected to Wi-Fi. The update is compatible with a wide range of devices, including the iPhone 11 series through the latest iPhone 17 lineup. Compatible models include:

iPhone 17, iPhone 17 Pro, iPhone 17 Pro Max, iPhone Air, iPhone 16e, iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 15, iPhone 15 Plus, iPhone 15 Pro, iPhone 15 Pro Max, iPhone 14, iPhone 14 Plus, iPhone 14 Pro, iPhone 14 Pro Max, iPhone 13, iPhone 13 mini, iPhone 13 Pro, iPhone 13 Pro Max, iPhone 12, iPhone 12 mini, iPhone 12 Pro, iPhone 12 Pro Max, iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, and iPhone SE (2nd generation and later).

One of the most anticipated features is the enhanced spam detection in Messages. iOS 26 filters unwanted messages into a separate folder, keeping the main inbox clean. Users can easily check the “Unknown Senders” folder at any time, allowing them to mark trusted contacts or delete clutter without being disturbed by notifications on the lock screen.

Another useful feature allows users to send their location without needing to open the Maps app. This shortcut streamlines the process of sharing directions, making it more efficient and user-friendly.

iOS 26 also introduces a new call log feature that organizes all incoming, outgoing, and missed calls into a single list. This improvement enables users to check their call history with ease, eliminating the need for endless scrolling.

For those who often find themselves accidentally dialing numbers, iOS 26 offers a solution. Users can disable the automatic dialing feature, ensuring that tapping a number in the Recents list will not initiate a call unless they press the call button deliberately. This change helps prevent embarrassing situations, such as accidentally calling a colleague when only verifying a number.

In the realm of alarms, iOS 26 allows users to customize their snooze intervals. Instead of the default nine minutes, users can set a snooze time that better fits their morning routine, whether they prefer a quick five-minute reset or a longer break before getting up.

Camera functionality has also been enhanced with the introduction of Lens Cleaning Hints. This feature alerts users when the camera detects smudges or haze, prompting them to clean the lens before taking a photo. This simple reminder can help improve photo quality significantly.

iOS 26 now provides an estimated charging time for the iPhone, allowing users to plan their day more effectively. This feature helps users determine whether their device will be fully charged before leaving home or if they need to bring a charger along.

Additionally, the update allows users to adjust the size of the clock on their Lock Screen for a more prominent display. On certain wallpapers, the clock can even have a depth effect, enhancing the overall aesthetic of the device.

For those who enjoy group chats, iOS 26 makes decision-making easier by allowing users to create quick polls directly within the chat. This feature enables friends or coworkers to vote on various topics, such as where to eat or which movie to watch, streamlining group discussions.

Overall, iOS 26 goes beyond just security patches; it emphasizes convenience and personalization. The combination of customizable snooze settings, effective spam filters, charging time estimates, and camera alerts contributes to a smoother and more enjoyable iPhone experience.

Which feature of iOS 26 are you most excited to try first? Whether it’s the polls in iMessage, spam filters, or another enhancement, let us know your thoughts.

Source: Original article

Burjeel-Axiom Research Opens Door for First Astronaut with Diabetes

Groundbreaking research aboard Axiom Mission 4 demonstrates that diabetes monitoring tools can function effectively in space, paving the way for inclusive space travel and advancements in remote healthcare.

Innovative research conducted during Axiom Mission 4 has revealed that diabetes monitoring tools can operate reliably in the unique environment of space. This significant finding opens new avenues for inclusive space travel and enhances remote healthcare capabilities.

The study, known as the “Suite Ride,” was a collaborative effort between Axiom Space and Burjeel Holdings, a leading healthcare provider based in the UAE. Preliminary results indicate that common diabetes monitoring tools can effectively track glucose levels from Earth to orbit and back, marking a potential breakthrough for astronauts living with diabetes.

On September 25, the findings were presented in New York at an event attended by experts from the fields of space and healthcare, alongside representatives from Axiom and Burjeel. Burjeel Chairman Dr. Shamsheer Vayalil welcomed attendees to the Burjeel Institute for Global Health, where notable speakers included Omran Sharaf, Assistant Foreign Minister for Advanced Science and Technology Affairs at the UAE Ministry of Foreign Affairs; Axiom Space CEO Tejpaul Bhatia; and former NASA Administrator Charles Bolden. Astronaut Peggy Whitson, who commanded Axiom Mission 4, participated in the event via remote connection.

Building on these findings, Burjeel announced its ambition to facilitate the journey of the first astronaut with diabetes into space. Founded in 2007 by Dr. Vayalil, Burjeel has established itself as a premier provider of super-specialty healthcare services in the UAE and Oman, with an expanding footprint in Saudi Arabia’s healthcare sector.

Axiom Mission 4, which took place in collaboration with SpaceX and NASA, launched on June 25, 2025, from Kennedy Space Center in Florida. The mission lasted 20 days, with 18 days spent aboard the International Space Station (ISS). The Suite Ride study utilized this mission to test various remote care tools, aiming to demonstrate that space travel is feasible for individuals with medical conditions previously deemed disqualifying.

The research confirmed that continuous glucose monitors (CGMs) and insulin pens can function effectively in the challenging conditions of space. Early data suggest that CGMs provide glucose readings with accuracy comparable to those obtained on Earth, enabling astronauts to monitor their glucose levels in real time and relay this information back to mission control. Insulin pens used during the mission are currently undergoing post-flight testing to verify the efficacy of the medication.

The Suite Ride study achieved several historic milestones, including the first continuous glucose monitoring of crew members aboard the ISS, the inaugural deployment of insulin pens in orbit, and the validation of glucose measurements through multiple methods in the microgravity environment of the space station.

This research builds upon previous commercial spaceflight experiments. For instance, Virgin Galactic’s Galactic 07 mission demonstrated that commercial insulin pens can accurately dispense doses in microgravity, adhering to International Organization for Standardization guidelines.

“This is about inspiring people everywhere,” said Gavin D’Elia, Global Head of Pharma for Axiom Space. “A diagnosis shouldn’t end your dream of space exploration. Together, we’re advancing the potential to fly the first astronaut with diabetes and to unlock innovation in healthcare,” D’Elia emphasized.

The implications of this research extend beyond space missions. It holds promise for improving healthcare in remote and underserved regions. “From 250 miles above Earth in space to 25 miles offshore on oil rigs, we’re pioneering new models in remote care,” stated Dr. Mohammad Fityan, Chief Medical Officer of Burjeel Holdings.

As part of the study’s unveiling, the Suite Ride campaign was prominently displayed in Times Square, highlighting the importance of these findings.

The results of the Suite Ride study are expected to influence healthcare practices far beyond the realm of space exploration. By demonstrating that diabetes monitoring and management can be effectively conducted in extreme and isolated environments, this research paves the way for enhanced care for individuals living in remote locations or working under challenging conditions worldwide, according to Axiom Space and Burjeel Holdings.

Axiom is also in the process of developing the world’s first commercial space station, known as Axiom Station.

Source: Original article

Reclaiming Agency: The Indian-American Perspective on Human Consciousness

Before we debate the consciousness of AI, we must first examine our own awareness of agency and the implications of delegating decision-making to machines.

In an era where artificial intelligence (AI) is becoming increasingly integrated into our daily lives, a pressing question arises: Are we truly aware of our own agency before we hand it over to machines? This inquiry is crucial as we navigate the complexities of technology that seeks to replicate human-like behaviors.

In previous discussions, we have explored the concepts of perception and decision-making as essential components of agency, defined here as acting with intent. We have emphasized the importance of human judgment in areas where algorithms fall short of capturing the full spectrum of human experience.

Today, we delve deeper into the implications of allowing machines to replace our judgment rather than merely inform it. Can machines truly replicate the essence of human agency, which is inherently tied to consciousness? While consciousness involves awareness, agency is about acting with intention. Without agency, consciousness becomes ineffective, much like electricity that cannot express its energy without a switch or a bulb. This interplay between agency and consciousness is vital to understanding our relationship with technology.

Mustafa Suleyman, CEO of Microsoft AI, has recently warned that we are on the verge of creating “Seemingly Conscious AI,” systems designed to simulate awareness. These systems, while not genuinely conscious, mimic human-like behaviors and responses, raising questions about our own consciousness regarding agency.

Before we appoint machines as our decision-makers, we must first ensure that we are fully aware of our own agency. The stakes are high; we have already transitioned from suggestive AI systems that assist us with predictions to decisive AI that silently solidifies those predictions into decisions. For instance, when we type “I have been meaning to tell you…” and the autocomplete suggests “I love you” or “I miss you,” the machine is not merely completing our thought—it is narrowing it. With generative AI, large language models (LLMs) are not just finishing our sentences; they are writing them entirely.

The implications of this shift are profound. In medical triage, algorithmic scoring systems can determine who receives urgent care. In hiring processes, automated screening tools can exclude candidates before a human ever reviews their résumé. In the legal field, AI-powered research and drafting increasingly shape which arguments are even considered in court. In our everyday lives, autocomplete features complete our sentences, sometimes even before we have fully formed our thoughts.

A tool that offers input preserves human agency, while a tool that decides for us begins to erode it. Over time, delegation without deliberation can lead to abdication of responsibility. Research by Carin Isabel Knoop and her colleagues highlights that our psychological vulnerabilities—such as the need for recognition, perfectionism, and loneliness—make us particularly susceptible to over-dependence on systems that simulate empathy. When the signals of affirmation from a machine replace human connection, we risk outsourcing not only our decisions but also parts of our identity and agency. This potential loss should be a significant concern.

What makes this moment particularly unsettling is the growing divergence between how machines are trained and how we, as humans, allow our faculties of agency to atrophy. Large language models absorb vast amounts of text, developing a statistical understanding of syntax and meaning that enables them to predict what comes next in a sentence or argument. Vision models analyze extensive image datasets, learning to recognize faces, tumors, and traffic patterns. In essence, these machines are mastering the very skills that define our humanity: language, observation, and prediction.

Meanwhile, our own practices of language and observation are diminishing. We often communicate in fragments, relying on emojis instead of nuanced language. We skim headlines rather than engage deeply with content. We substitute quick “likes” for meaningful conversations. In a visual culture, we scroll through images without pausing to observe thoughtfully. We capture experiences on our phones instead of living them, outsourcing our memories to the cloud. As a result, machines are becoming more adept at language and observation, while our own capacities for careful communication and deep observation are declining.

This asymmetry raises an unsettling question: Who is the better agent? A machine that learns to perceive patterns across vast datasets, or a distracted human who skims through information? When machines begin to finish our sentences before we even start them, they are not merely predicting; they are preempting us. When they label and categorize the world for us, they subtly dictate what we notice and what we overlook. Agency, in this context, is not just about who makes the final decision; it is also about who notices and learns. Increasingly, the answer appears to be the machines.

If human agency requires the ability to perceive, resist, endure, and decide, then our current trajectory is concerning. Machines are becoming better at perceiving patterns than we are. They do not tire, grow impatient, or skim due to distraction. In contrast, we often sacrifice endurance for convenience, resistance for comfort, and decision-making for ease. This divergence does not imply that machines are conscious, but it does suggest that they are practicing, at scale, the habits that once distinguished human agency. It is crucial that we reclaim those habits, or we risk becoming mere spectators in our own lives.

Agency begins with perception. Attention is not just passive input; it is selective, contextual, and shaped by values. A physician who skims an alert based on algorithms may see the same vital signs but miss the nuances of a patient’s pain story. A recruiter relying on a ranking score may overlook true potential in a résumé. AI filters what it sees, and in doing so, it alters our own perceptions.

Agency also requires resistance. Companies design interfaces to nudge us, and algorithms steer us toward familiar choices. An effective agent must resist these nudges when they conflict with broader goals. Maintaining skepticism, interrogating incentives, and recognizing manipulation are critical skills, much like resisting the urge to keep scrolling on social media.

Endurance is another essential quality of agency. Decisions often require patience, tolerance for uncertainty, and the willingness to accept delayed or costly outcomes. Machines optimize for immediate results but do not face the reputational or ethical consequences of poor decisions, unlike humans who must navigate the complexities of real-life situations.

Finally, agency culminates in the responsibility of aligning values with actions. Machines can present options and rank them, but they cannot bear moral consequences. When thinking is delegated, moral responsibility can evaporate. Who is accountable when a triage bot denies care? Who bears the burden when a hiring model excludes candidates based on biased proxies? If we surrender decision-making to systems we do not understand or supervise, we erode the possibility of moral agency.

The importance of agency is not merely a contemporary concern. Historical texts emphasize its significance. The biblical phrase, “Choose you this day whom ye will serve” (Joshua 24:15), underscores that the act of choosing is central to human dignity. Philosophers like Jean-Paul Sartre have long argued that humans are “condemned to be free,” meaning that even in uncertainty, we cannot escape the burden of decision. The ancient Indian philosophy of Vedanta further explores the nature of the chooser, framing agency as a path to self-realization. The convergence of scripture, philosophy, and Vedanta reveals a profound truth: agency is the essence of what it means to be human.

We are psychologically predisposed to accept delegation. The allure of less thinking feels easy, which is why AI is so appealing. However, the solution is not to reject AI but to design it in ways that preserve and enhance human agency. Systems should incorporate friction that encourages reflection rather than nudging users toward default acceptance. They should make their limitations and uncertainties visible, ensuring users understand the implications of their recommendations. Ultimately, consequential choices should remain with humans who are accountable, rather than diffusing responsibility into opaque processes.

The deeper issue lies in whether we, as individual and collective agents, are aware of our responsibilities. To perceive is to be present. To resist is to guard the self. To endure is to remain committed. To decide is to accept consequences.

By sharpening our capabilities through thoughtful design, policy, training, culture, and responsible use, we can create AI that augments human agency rather than replacing it. This approach allows us to harness technology’s benefits without relinquishing the core of what it means to be responsible beings: the capacity to act, care, and take responsibility for our choices.

As you consider your reliance on technology, ask yourself: Am I using this tool to amplify my agency or to abdicate it? Machines may predict and autocomplete our futures, but we must remain the ones who choose them.

Source: Original article

Anthropic AI Settles $1.5 Billion Copyright Case, Judge Approves Agreement

A federal judge in California has preliminarily approved a $1.5 billion copyright settlement between Anthropic AI and a group of authors, marking a significant development in AI-related copyright litigation.

A federal judge in California has taken a pivotal step in the realm of artificial intelligence and copyright law by preliminarily approving a landmark $1.5 billion settlement between AI company Anthropic and a group of authors. This decision, made on Thursday, represents a significant victory for creatives in their ongoing battle against the unauthorized use of their work by AI technologies.

The settlement stems from a class action lawsuit filed in 2024 by authors Andrea Bartz, Charles Graeber, and Kirk Wallace Johnson, who alleged that Anthropic illegally utilized pirated copies of their copyrighted books, along with hundreds of thousands of others, to train its large language model, Claude. Central to the lawsuit was the use of a dataset known as “Books3,” which was sourced from shadow libraries notorious for distributing pirated ebooks.

During a hearing on Thursday, U.S. District Judge William Alsup described the proposed settlement as fair. Earlier in the month, Judge Alsup had expressed reservations about the settlement and requested additional information from the parties involved before making a decision. He will now determine whether to grant final approval after notifying the affected authors and allowing them the opportunity to file claims.

Maria Pallante, president of the Association of American Publishers, a trade group representing the publishing industry, praised the settlement as “a major step in the right direction in holding AI developers accountable for reckless and unabashed infringement.” This sentiment reflects a growing concern among creators regarding the implications of AI technologies on their rights and livelihoods.

In a notable ruling earlier this year, Judge Alsup allowed part of the authors’ case to proceed, rejecting Anthropic’s defense that its use of the copyrighted material fell under the doctrine of “fair use.” The court found that Anthropic’s storage of over seven million unauthorized books in a centralized library for training purposes likely constituted copyright infringement.

The authors expressed their satisfaction with the judge’s decision, stating in a joint statement that it “brings us one step closer to real accountability for Anthropic and puts all AI companies on notice they can’t shortcut the law or override creators’ rights.” This case is viewed as a crucial milestone in AI-related copyright litigation and is expected to set a precedent for future disputes involving other major AI developers such as OpenAI and Meta.

The implications of this case extend beyond the immediate settlement. It highlights the legal risks associated with training AI systems on unlicensed data and has sparked broader discussions about copyright, fair use, and intellectual property rights in the age of generative AI. The outcome empowers authors and creators to seek compensation when their works are exploited without consent, potentially reshaping the landscape of intellectual property in the digital era.

Anthropic’s deputy general counsel, Aparna Sridhar, commented on the decision, stating that it will allow the company to “focus on developing safe AI systems that help people and organizations extend their capabilities, advance scientific discovery, and solve complex problems.” This reflects a commitment to navigating the legal challenges posed by the evolving field of artificial intelligence while ensuring that the rights of creators are respected.

The authors’ allegations resonate with a growing number of lawsuits filed by various creators, including authors, news outlets, and visual artists, who claim that their work has been appropriated by tech companies for AI training purposes without proper authorization. As the legal landscape continues to evolve, this case serves as a critical reminder of the importance of protecting intellectual property rights in an increasingly automated world.

Source: Original article

North Korean Hackers Employ AI Technology to Create Fake Military IDs

North Korean hackers have leveraged generative AI tools like ChatGPT to create convincing fake military IDs, raising concerns about the evolving landscape of cyber threats.

Generative AI has significantly lowered the barriers for sophisticated cyberattacks, as hackers increasingly exploit tools like ChatGPT to forge documents and identities. A North Korean hacking group known as Kimsuky has recently been reported to have used ChatGPT to generate a fake draft of a South Korean military ID. These forged IDs were then attached to phishing emails that impersonated a South Korean defense institution responsible for issuing credentials to military-affiliated officials.

This alarming campaign was revealed by South Korean cybersecurity firm Genians in a recent blog post. Although ChatGPT has safeguards designed to block attempts to generate government IDs, the hackers managed to trick the system. Genians noted that the model produced realistic-looking mock-ups when prompts were framed as “sample designs for legitimate purposes.”

Kimsuky is not a small-time operator; the group has been linked to a series of espionage campaigns targeting South Korea, Japan, and the United States. In 2020, the U.S. Department of Homeland Security indicated that Kimsuky was “most likely tasked by the North Korean regime with a global intelligence-gathering mission.”

The fake ID scheme underscores the transformative impact of generative AI on cybercrime. “Generative AI has lowered the barrier to entry for sophisticated attacks,” said Sandy Kronenberg, CEO and founder of Netarx, a cybersecurity and IT services company. “As this case shows, hackers can now produce highly convincing fake IDs and other fraudulent assets at scale. The real concern is not just a single fake document, but how these tools are used in combination.” Kronenberg emphasized that an email with a forged attachment could be followed by a phone call or even a video appearance that reinforces the deception.

Experts warn that traditional defenses against phishing attacks may no longer be effective. “For years, employees were trained to look for typos or formatting issues,” explained Clyde Williamson, senior product security architect at Protegrity, a data security and privacy company. “That advice no longer applies. They tricked ChatGPT into designing fake military IDs by asking for ‘sample templates.’ The result looked clean, professional, and convincing. The usual red flags—typos, odd formatting, broken English—weren’t there. AI scrubbed all that out.”

Williamson advocates for a reset in security training, urging organizations to focus on context, intent, and verification. “We need to encourage teams to slow down, check sender information, confirm requests through other channels, and report anything that feels off. There’s no shame in asking questions,” he added. On the technological front, companies should invest in email authentication, phishing-resistant multi-factor authentication (MFA), and real-time monitoring to keep pace with evolving threats.

North Korea is not the only nation employing AI for cyberattacks. Anthropic, an AI research company and creator of the Claude chatbot, reported that a Chinese hacker used Claude as a full-stack cyberattack assistant for over nine months. This hacker targeted Vietnamese telecommunications providers, agriculture systems, and even government databases. Additionally, OpenAI has noted that Chinese hackers have utilized ChatGPT to develop password brute-forcing scripts and to gather sensitive information on U.S. defense networks, satellite systems, and ID verification systems.

Cybersecurity experts express alarm over this shift in tactics. AI tools enable hackers to launch convincing phishing attacks, generate flawless scam messages, and conceal malicious code more effectively than ever before. “News that North Korean hackers used generative AI to forge deepfake military IDs is a wake-up call: The rules of the phishing game have changed, and the old signals we relied on are gone,” Williamson stated.

To navigate this new landscape, both individuals and organizations must remain vigilant. Cybersecurity measures should include verifying requests through trusted channels, employing strong antivirus software, and regularly updating operating systems and applications to patch vulnerabilities. Users should also scrutinize email addresses, phone numbers, and social media handles for discrepancies that may indicate a scam.

As AI continues to evolve, so too must our defenses against its misuse. The tools available to hackers are becoming cleaner, faster, and more convincing, making it imperative for companies to update their training and strengthen their defenses. Everyday users should cultivate a habit of questioning the legitimacy of digital requests and double-checking before taking action.

In conclusion, the rise of AI in cybercrime presents significant challenges. The responsibility to combat these threats lies not only with AI companies but also with everyday users who must adapt to this rapidly changing environment. As the landscape of cybersecurity evolves, staying informed and proactive is essential for safeguarding personal and organizational data.

Source: Original article

Elon Musk Names His Top Three CEOs Among Industry Peers

Elon Musk has identified Jeff Bezos, Larry Ellison, and Larry Page as the smartest CEOs, commending their visionary leadership and transformative impact on global industries.

Elon Musk, the CEO of several high-profile companies including Tesla, xAI, and SpaceX, recently shared his thoughts on the smartest CEOs in the tech industry during an appearance on the “Verdict with Ted Cruz” podcast. He named three influential figures: Jeff Bezos, Larry Ellison, and Larry Page, highlighting their intelligence, vision, and ability to reshape entire industries.

Jeff Bezos, the founder of Amazon and Blue Origin, has made significant contributions to both e-commerce and space exploration. Under his leadership, Amazon revolutionized online shopping, setting new standards for customer service and delivery. Meanwhile, Blue Origin competes directly with Musk’s SpaceX in the burgeoning field of private spaceflight. Despite their well-known rivalry, which has spurred advancements in rocket technology, Musk expresses admiration for Bezos’s visionary leadership and relentless drive. He recognizes Bezos’s ability to scale companies globally and appreciates his long-term vision for space colonization, which aligns with Musk’s own ambitions for Mars exploration.

Next on Musk’s list is Larry Ellison, co-founder of Oracle, who has built one of the largest software companies in the world. Ellison is known for his aggressive leadership style and bold business decisions, embodying resilience and strategic foresight. Musk respects Ellison’s sharp business acumen and his unwavering pursuit of innovation. Both entrepreneurs share a passion for ambitious projects and technological breakthroughs. Ellison’s ventures in sailing and space reflect a risk-taking mindset that Musk admires. Their occasional interactions and shared interests have fostered a mutual respect, with Musk viewing Ellison as a prime example of how to combine tech success with an adventurous spirit.

Lastly, Musk recognizes Larry Page, co-founder of Google and Alphabet, as a visionary entrepreneur focused on groundbreaking technologies such as artificial intelligence and autonomous vehicles. Musk admires Page’s intellect and forward-thinking approach, as both share a commitment to addressing humanity’s most pressing challenges through technology. Page’s investment in high-risk, ambitious projects mirrors Musk’s own endeavors with SpaceX and Tesla. Their shared enthusiasm for innovation and disruptive ideas lays the groundwork for a strong mutual respect, with Musk likely seeing Page as a kindred spirit who merges technical genius with bold entrepreneurship.

Musk’s acknowledgment of Bezos, Ellison, and Page as some of the smartest and most visionary CEOs underscores his appreciation for leadership that fosters innovation and transformative change. Each of these figures has made significant strides in their respective fields, driven by bold ideas, determination, and a willingness to challenge conventional boundaries.

By recognizing these peers, Musk sets a powerful example for current and future entrepreneurs, emphasizing that true intelligence and success are measured by impactful achievements. The collective influence of Bezos, Ellison, and Page signals a new era where technological advancement and entrepreneurial boldness can tackle some of humanity’s most urgent challenges.

Source: Original article

Perplexity Introduces New Search API to Enhance AI Applications

Perplexity has unveiled its new Search API, designed to enhance AI applications with advanced indexing, structured responses, and flexible pricing options.

AI startup Perplexity has officially launched its “Perplexity Search API,” providing developers with a robust infrastructure that supports the company’s services and offers an index encompassing “hundreds of billions” of webpages.

In a recent blog post, Perplexity emphasized the importance of context in AI applications, stating, “When it comes to AI, context is king. It is insufficient to operate simply at the document level. Our indexing and retrieval infrastructure divides documents up into fine-grained units.”

The new API is tailored to meet the specific needs of AI applications. Unlike other API offerings that limit access to a narrow range of information, Perplexity’s API delivers rich structured responses that are readily applicable in both AI and traditional applications.

Perplexity claims that its Search API minimizes the need for preprocessing, accelerates integration, and yields more valuable downstream results. The pricing structure for the API includes the Sonar API, priced at $1 per million input and output tokens, and the Sonar Pro, which costs $3 and $15 per million input and output tokens, respectively. Additionally, specialized options such as Sonar Reasoning, Sonar Reasoning Pro, and Sonar Deep Research are available, with varying costs based on the complexity of reasoning, citations, and search queries.

The company asserts that it holds a competitive advantage over its rivals in terms of quality and latency. Furthermore, Perplexity has introduced a Search SDK, which engineers can utilize alongside AI coding tools to create impressive product prototypes in under an hour. “We anticipate even more impressive feats from startups and solo developers, mature enterprises, and everyone in between,” the company added.

Recently, Perplexity achieved a valuation of $20 billion following a $200 million funding round. The company, led by Indian American Aravind Srinivas, has garnered attention for its ambitious $34.5 billion bid for Google’s Chrome.

In addition to its new API, Perplexity is reportedly working on integrations with educational platforms and enterprise knowledge systems, positioning itself as a leading search solution for both professional and personal use. However, the company has also faced challenges, including allegations of copyright violations. Notably, copyright holders such as Encyclopedia Britannica and Merriam-Webster have accused Perplexity of improperly using their content in its “answer engine” for online searches.

As Perplexity continues to innovate and expand its offerings, it remains to be seen how it will navigate these legal challenges while maintaining its rapid growth trajectory.

Source: Original article

New Theory Enhances Understanding of Alien Comet 3I/ATLAS

A new theory surrounding the interstellar object 3I/ATLAS suggests it may not just be a comet, prompting speculation about its potential origins, including the possibility of alien technology.

A mysterious interstellar object known as 3I/ATLAS has once again sparked intrigue among scientists and the public alike. A newly proposed theory suggests that this object might be more than just a comet; some researchers speculate it could even be a form of alien technology in disguise. This idea, introduced as a thought experiment, highlights the unusual properties of 3I/ATLAS and raises questions about whether conventional explanations adequately account for its behavior.

3I/ATLAS is notable for being only the third confirmed interstellar visitor to traverse our solar system. Its trajectory indicates that it is not gravitationally bound to the Sun, suggesting it originated from outside our solar system. Observations have revealed a coma—a fuzzy cloud of gas and dust—surrounding the object, which is characteristic of comets. However, certain anomalies associated with 3I/ATLAS have captured the attention of scientists, prompting more speculative hypotheses.

In a recent paper published on a preprint server, a group of scientists proposed an intriguing hypothesis: if 3I/ATLAS is not purely a natural object, it could potentially be a probe sent by an advanced civilization. The authors of the paper describe this notion as a pedagogical exercise, intended to provoke thought rather than serve as a definitive claim. They point to features such as the object’s trajectory and its deviations from typical comet behavior as aspects worthy of further investigation.

Despite the excitement surrounding this theory, mainstream astronomers remain skeptical about the possibility of alien origins for 3I/ATLAS. Many experts emphasize that the object exhibits numerous traits typical of comets. Its fuzzy envelope and its interactions with solar radiation strongly support the case for a natural origin. Critics of the alien theory argue that while exploring unconventional ideas can be beneficial to scientific discourse, extraordinary claims require extraordinary evidence.

The debate surrounding 3I/ATLAS is significant for several reasons. Beyond the allure of potential extraterrestrial origins, studying this interstellar object provides a rare opportunity to gain insights into materials from outside our cosmic neighborhood. Regardless of whether it shows signs of intelligent design, each new data point—from its composition to its trajectory—contributes to humanity’s understanding of exoplanetary systems, cosmic dust, and the mechanics of objects traversing deep space.

As researchers continue to analyze 3I/ATLAS, the conversation around its origins will likely evolve. The intersection of science and speculation often leads to groundbreaking discoveries, and this case is no exception. Whether the object is a natural comet or something more enigmatic, it serves as a reminder of the vast mysteries that still exist beyond our planet.

Source: Original article

Scammers Exploit iCloud Calendar to Distribute Phishing Emails

Scammers are exploiting Apple’s iCloud Calendar invite system to deliver sophisticated phishing emails, tricking users into calling fake support numbers.

Phishing scams are evolving, with attackers now leveraging Apple’s iCloud Calendar invite system to bypass spam filters and deceive users. This latest tactic represents a significant shift in how these scams are executed, utilizing a trusted platform to enhance their credibility.

Instead of sending generic or suspicious emails, these attackers send calendar invites directly from Apple’s email servers. This method allows their messages to appear more legitimate, increasing the likelihood that unsuspecting users will engage with the content. The primary objective is to instill fear, prompting victims to call a fraudulent support number under the guise of disputing a non-existent PayPal transaction.

Once the victim contacts the scammer, they are manipulated into granting remote access to their devices or sharing sensitive personal information. The scam’s effectiveness hinges on the use of Apple’s official infrastructure, which lends a veneer of authenticity to the phishing attempt.

According to reports from Bleeping Computer, the attackers send these calendar invites from the genuine Apple domain, noreply@email.apple.com. They embed the phishing message within the “Notes” section of the calendar event, making it appear as a legitimate notification. The invites are typically sent to a Microsoft 365 email address controlled by the attackers, which is part of a broader mailing list. This strategy allows the invites to be automatically forwarded to multiple real targets, significantly expanding the scam’s reach.

In most cases, when emails are forwarded, SPF (Sender Policy Framework) checks fail because the forwarding server is not recognized as an authorized sender. However, Microsoft 365 employs a technique known as the Sender Rewriting Scheme (SRS), which rewrites the return path, allowing the message to pass SPF checks. This makes the email appear entirely legitimate, both to the recipient’s inbox and to automated spam filters, increasing the chances that the message will reach its target without being flagged.

The sense of legitimacy conveyed by this campaign makes it particularly dangerous. Since the emails originate from Apple’s official servers, users are less likely to suspect any wrongdoing. The phishing message typically claims that a significant PayPal transaction has occurred without the recipient’s consent, urging them to contact support to dispute the charge. However, the number provided connects the victim to a scammer.

Once the victim calls, the scammer poses as a technical support agent, convincing the caller that their computer has been compromised. They often request that the victim download remote access software under the pretense of issuing a refund or securing their account. In reality, this access is exploited to steal banking information, install malware, or exfiltrate personal data. Because the original message passed security checks and appeared credible, victims frequently act without hesitation.

To protect yourself from such sophisticated phishing scams, there are several precautionary steps you can take. If you receive an unexpected calendar invite, especially one containing alarming claims or strange messages, do not open it or respond. Legitimate companies rarely use calendar invites to send payment disputes or security warnings. Always verify suspicious claims by logging into your official account directly.

Phishing scams often include phone numbers that connect you to fraudsters posing as support agents. Instead of calling the number in the message, use official contact details found on the company’s website. Additionally, utilizing antivirus software can help protect your computer from malware and phishing sites by blocking suspicious downloads and alerting you to unsafe websites.

Having strong antivirus software installed on all your devices is crucial for safeguarding against malicious links that could install malware or access your private information. Keeping your antivirus updated ensures it can defend against the latest threats.

Another effective strategy is to use a personal data removal service, which helps scrub your personal information from data broker websites. This makes it significantly harder for attackers to gather details about you and craft convincing phishing attacks. While no service can guarantee complete removal of your data from the internet, a data removal service is a wise choice for enhancing your privacy.

Additionally, employing a password manager can help you generate and securely store strong, unique passwords for every account. This practice reduces the risk of reusing weak passwords that scammers can exploit to gain unauthorized access to your accounts. Regularly updating your operating system, browser, and applications is also essential, as it helps patch security vulnerabilities that attackers often exploit in phishing scams.

As phishing attacks continue to evolve, it is crucial to remain vigilant. Treat any unexpected calendar invite, particularly those containing alarming messages or strange contact numbers, with extreme caution. Never call the number provided in the message or click on any links. Instead, verify any suspicious activity by visiting official websites or your account’s dashboard.

Have you ever been targeted by a phishing scam disguised as an official message? Share your experiences with us at Cyberguy.com.

Source: Original article

World’s First Flying Car Set for Takeoff After Successful Tests

The world’s first flying car, Alef Aeronautics’ Model A, is set to begin production by late 2025, following FAA approval for limited testing at five airport locations.

Alef Aeronautics is making strides toward the future of transportation with plans to begin production of its electric flying car, the Model A, by late 2025. This announcement follows the recent approval from the Federal Aviation Administration (FAA) for limited testing at five airport locations.

In a groundbreaking move, Alef has formalized agreements with Half Moon Bay and Hollister airports to initiate test operations of its innovative vehicle, which is designed to be road-legal and capable of vertical takeoff. This vehicle will not only drive but also take off vertically, operating alongside conventional aircraft. With the addition of these two airports, Alef now has five designated test locations for its flying car.

The company plans to start testing with its “Model Zero Ultralight” before transitioning to the commercial Model A. The Model A is engineered to drive on roads, take off and land vertically, and maneuver both on the ground and in the air. To ensure safety, Alef will notify other aircraft before its flying cars operate in the airspace or on the ground. The agreements with the airports also stipulate that conventional aircraft will retain priority and right of way over Alef’s operations.

The Model A is designed to be fully electric, with a range of up to 200 miles on the road and 110 miles in the air. However, it will be subject to specific operational rules, including restrictions on flying only during daylight hours and prohibitions against flying over densely populated areas or cities. Alef has already received the FAA’s Special Airworthiness Certification for limited testing, marking a significant milestone in the development of flying cars.

In 2022, Alef opened pre-orders for the Model A, and interest has surged, with over 3,300 pre-orders already placed. Prospective buyers can secure their place in line with a refundable deposit of $150 for the regular queue or $1,500 for priority status. The anticipated price for each vehicle is approximately $300,000, making it a significant investment for early adopters.

The prospect of flying cars could revolutionize daily commutes, allowing individuals to bypass traffic by driving a short distance before taking to the skies. However, current regulations limit ultralight flying to daylight hours and less populated routes, indicating that updates to these rules will be necessary to facilitate broader use of flying cars in urban and suburban areas.

Despite the existing limitations, the progress made by Alef Aeronautics signifies a shift toward a future where road and air travel may coexist. With new airport agreements and early FAA approval, the company is well-positioned to explore the possibilities of this emerging technology. If production timelines remain on track, the world may soon witness the first flying cars taking off alongside conventional vehicles.

As the concept of flying cars transitions from imagination to reality, Alef Aeronautics is paving the way for a new era of transportation. The ongoing tests and regulatory developments suggest that the dream of commuting by flying car could soon be within reach.

Source: Original article

Nvidia’s $100 Billion Investment in OpenAI: Implications and Insights

Nvidia’s $100 billion investment in OpenAI marks a pivotal moment for the semiconductor industry and the future of artificial intelligence.

Nvidia has announced a groundbreaking plan to invest approximately $100 billion in the artificial intelligence firm OpenAI as part of a new partnership. This strategic alliance was unveiled through a letter of intent, which details plans for Nvidia to supply OpenAI with at least 10 gigawatts of chips to enhance its AI infrastructure.

“Everything starts with compute,” said Sam Altman, CEO of OpenAI, in a press release. “Compute infrastructure will be the basis for the economy of the future, and we will utilize what we’re building with Nvidia to both create new AI breakthroughs and empower people and businesses with them at scale.”

The implications of this partnership extend beyond the two companies involved; it signals a transformative moment for the entire semiconductor industry, AI development, and global technology ecosystems. Nvidia’s substantial investment and strategic collaboration with OpenAI significantly bolster its position in the AI hardware market, particularly in graphics processing units (GPUs) tailored for AI workloads.

This development places considerable pressure on competitors such as AMD, Intel, and emerging AI-focused startups to innovate swiftly or risk losing market share. These companies may encounter challenges in securing significant AI partnerships and scaling their manufacturing capabilities to keep pace with Nvidia. However, the situation could also foster healthy competition, prompting innovation in alternative architectures, including AI-specific accelerators, neuromorphic chips, or quantum processors.

As firms strive to differentiate themselves from Nvidia’s extensive reach, they may explore niche areas or specialized AI applications.

The deal establishes a new benchmark for capital investment in AI infrastructure, underscoring the growing significance of AI as a key driver of technological and economic growth. It highlights the critical collaboration between cloud providers and hardware suppliers with AI developers to create robust, scalable systems. This collaboration is likely to accelerate the development of large-scale AI data centers, necessitating advancements not only in chip technology but also in cooling systems, power management, software optimization, and supply chain logistics.

Moreover, as the scale of AI hardware expands, there will be increasing scrutiny regarding sustainability and energy efficiency, compelling the industry to pursue greener technologies.

For the field of AI, this partnership signifies the availability of unprecedented computational power to train and operate increasingly sophisticated models. This could lead to accelerated breakthroughs in areas such as natural language processing, computer vision, robotics, and other subfields of AI, enabling applications that were previously deemed impractical or too resource-intensive.

However, the concentration of AI infrastructure among a few dominant players raises concerns about accessibility, equity, and control over the future direction of AI technology. Smaller companies, academic institutions, and startups may encounter higher barriers to entry, potentially hindering the democratization and diversity of innovation in the AI sector. To address these dynamics, regulation, open standards, and public-private partnerships may become essential.

Nvidia’s $100 billion investment in OpenAI illustrates the increasing scale and stakes of AI technology. While it promises rapid progress and innovation, it also presents challenges related to competition, accessibility, and sustainability that will shape the industry and society for years to come.

Source: Original article

Nvidia Makes Significant Investment in AI Voice Startup ElevenLabs

Nvidia has made a significant investment in ElevenLabs, a rapidly growing AI voice technology startup co-founded by Mati Staniszewski, enhancing its commitment to the AI sector.

Nvidia has announced a substantial new investment in ElevenLabs, an emerging player in the AI voice technology arena. The announcement was made by Nvidia CEO Jensen Huang, highlighting the company’s commitment to advancing artificial intelligence.

Founded in 2022 by Piotr Dąbkowski, a former Google machine learning engineer, and Mati Staniszewski, a former strategist at Palantir, ElevenLabs specializes in cutting-edge text-to-speech (TTS) and voice cloning technologies. The company is known for producing highly realistic and emotionally nuanced synthetic voices in multiple languages, making its tools invaluable across various sectors, including audiobooks, gaming, accessibility, and content creation.

In January, ElevenLabs successfully raised $180 million in a Series C funding round led by prominent investors, achieving a valuation of approximately $3.3 billion. By September, the company initiated a $100 million employee tender offer, which effectively doubled its valuation to $6.6 billion. This rapid growth underscores ElevenLabs’ increasing influence in the AI audio space and the rising demand for hyper-realistic voice applications. The company’s ongoing innovations position it as a formidable force in the evolving landscape of generative audio and speech technologies.

Celebrating the partnership on social media platform X, Staniszewski expressed enthusiasm about Nvidia’s investment, stating, “We’re excited to share that NVIDIA is investing in ElevenLabs, with support from Jensen Huang.”

In a video released by ElevenLabs, Huang praised the startup’s pioneering contributions to AI-powered audio, noting, “Whenever my voice is delivered digitally using artificial intelligence, it’s the ElevenLabs platform that I’m using.”

This investment aligns with Nvidia’s broader strategy in the UK, which includes a £2 billion commitment to AI startups and plans for up to £11 billion in AI factories. In 2025, Nvidia has continued to strengthen its position as a leader in artificial intelligence, making significant investments aimed at expanding its AI ecosystem and infrastructure.

A major highlight of Nvidia’s investment strategy was the announcement of a $100 billion strategic investment in OpenAI, aimed at accelerating the development and deployment of AI models such as ChatGPT. This initiative includes the construction of state-of-the-art Nvidia-powered AI data centers, with plans to install an initial gigawatt of compute capacity by late 2026. This move reflects Nvidia’s dedication to supporting large-scale AI workloads and advancing generative AI technologies.

In addition to its collaboration with OpenAI, Nvidia has actively invested in several AI startups to foster innovation across various sectors. Notably, the company participated in a $305 million Series B funding round for Together AI, a cloud-based AI model provider focused on scalable AI services.

Nvidia also backed Sakana AI, a Japanese startup that is developing cost-effective AI models trained on smaller datasets, securing $214 million in funding. These investments illustrate Nvidia’s strategic focus on diversifying AI applications and supporting emerging technologies that complement its core hardware offerings.

As Nvidia continues to invest in AI technologies, its partnership with ElevenLabs marks a significant step in enhancing the capabilities and applications of AI voice technology.

Source: Original article

Rocket Lab’s New Mission Aims to Discover Life on Mars

Rocket Lab has delivered two explorer-class spacecraft to NASA for a mission aimed at studying Mars’ magnetosphere and atmospheric escape, marking a significant step in interplanetary exploration.

Rocket Lab has announced the successful delivery of two explorer-class spacecraft to the Kennedy Space Flight Center for NASA’s Escape and Plasma Acceleration and Dynamics Explorers (Escapade) mission. This initiative is a collaborative effort with the University of California, Berkeley’s Space Sciences Laboratory.

The Escapade mission is designed to investigate Mars’ magnetosphere and the processes involved in atmospheric escape. The twin spacecraft will orbit the planet, gathering real-time data on plasma and magnetic fields, which are crucial for understanding the Martian environment.

Rocket Lab has completed the design, construction, integration, and testing of the spacecraft, named Blue and Gold, within an accelerated timeline. The company attributes this success to its extensive experience in spacecraft manufacturing and a vertically integrated supply chain that allows for in-house production of critical components, including solar arrays, star trackers, propellant tanks, reaction wheels, and flight software.

The Blue and Gold spacecraft will embark on a 22-month journey to Mars, where they will enter complementary elliptical orbits to conduct their scientific investigations. This dual approach will enable the spacecraft to simultaneously collect data from two distinct regions of Mars’ magnetosphere, enhancing the mission’s overall effectiveness.

Peter Beck, CEO of Rocket Lab, emphasized the significance of the Escapade mission, stating, “Escapade is a perfect example of why Rocket Lab exists – to make ambitious space science faster and more affordable. Delivering two interplanetary spacecraft on schedule and within budget for a Mars mission is no small feat, and it speaks to the determination and agility of our team.”

Looking ahead, Beck noted that this mission is just the beginning for Rocket Lab in terms of Mars exploration. He mentioned concepts like the Mars Telecommunications Orbiter, indicating that the company is laying the groundwork for more complex and essential missions that will support future human exploration of the Red Planet.

In addition to the Escapade mission, Rocket Lab has expressed interest in assisting NASA with the return of samples collected by the Perseverance rover. Recently, NASA announced that a Martian surface sample from Perseverance contains mineral textures that may indicate a possible biosignature, suggesting the potential for ancient life on Mars.

Scientists believe that determining whether these features were created by extraterrestrial life will require analysis using advanced terrestrial equipment. Beck is optimistic about Rocket Lab’s capabilities in this area, stating, “As a planetary science geek … on my own personal quest to look for life on other planets, the recent Martian discovery is super exciting. We have all the right pieces in place for a Mars return mission, and it would be great if that program got a new lease of life.”

This mission represents a significant advancement in our understanding of Mars and the potential for life beyond Earth, showcasing Rocket Lab’s commitment to pushing the boundaries of space exploration.

Source: Original article

OpenAI CEO Predicts AI Will First Transform Customer Service Roles

OpenAI CEO Sam Altman asserts that artificial intelligence will primarily disrupt the customer service sector, leading to significant changes in the job market.

OpenAI CEO Sam Altman has made a bold prediction regarding the future of the customer service industry, stating that artificial intelligence (AI) will be the primary force behind job displacement in this sector. During a recent appearance on “The Tucker Carlson Show,” Altman expressed his confidence that many customer support roles, particularly those conducted over the phone or online, will be replaced by AI technologies.

“I’m confident that a lot of current customer support that happens over a phone or computer, those people will lose their jobs, and that’ll be better done by an AI,” Altman remarked. He referenced a historical trend, noting that, on average, about 50 percent of jobs undergo significant changes every 75 years. However, he suggested that the current evolution may resemble a “punctuated equilibria moment,” where rapid changes occur in a condensed timeframe.

Altman, a prominent figure in the tech industry, is best known for his leadership at OpenAI, the organization behind the widely recognized AI language model ChatGPT. Born in 1985 in Chicago, he co-founded Loopt, a location-based social networking app, in 2005, which was later acquired. After serving as president of the influential startup accelerator Y Combinator from 2014 to 2019, Altman shifted his focus to artificial intelligence by joining OpenAI, where he has played a crucial role in advancing AI technologies.

Under Altman’s guidance, OpenAI has achieved significant milestones, including the launch of ChatGPT and plans to introduce new, compute-intensive features aimed at exploring the limits of AI capabilities. He predicts that AI agents will increasingly enter the workforce by 2025, fundamentally transforming various industries and enhancing productivity.

Despite his predictions about customer service roles, Altman acknowledges that not all jobs will be susceptible to AI replacement. He believes that positions requiring human connection, such as nursing and emotional support roles, will remain vital. “No matter how good the advice of the AI is or the robot, you’ll really want that,” he explained, emphasizing the importance of human reassurance, especially for vulnerable customers.

However, Altman’s views on the impact of AI on employment are not universally accepted. At a recent Axios event, Anthropic cofounders Dario Amodei and Jack Clark raised concerns about the potential for AI to replace human jobs. “I think it is likely enough to happen that we felt there was a need to warn the world about it and to speak honestly,” Amodei stated.

While the rise of AI may lead to job displacement in certain sectors, it also highlights the evolving nature of work. As technology takes over routine tasks, human workers may find themselves focusing on roles that require empathy, creativity, and complex problem-solving skills. Altman’s perspective underscores the irreplaceable value of human connection in fields such as healthcare and emotional support, suggesting a future where humans and AI collaborate rather than compete.

As the landscape of work continues to change, the conversation around AI’s role in the job market is becoming increasingly critical. Altman’s insights serve as a reminder of the need for ongoing dialogue about the implications of AI advancements on employment and society as a whole.

Source: Original article

Nvidia Commits Up to $100 Billion to Support OpenAI’s AI Goals

Nvidia has announced a partnership to invest up to $100 billion in OpenAI, aiming to enhance AI infrastructure and accelerate advancements in artificial intelligence.

Nvidia made headlines on Monday with its announcement of a groundbreaking partnership with artificial intelligence firm OpenAI, pledging to invest as much as $100 billion. This strategic alliance comes at a time when technology leaders worldwide are competing to secure the computing power and energy resources essential for advancing AI development.

The two companies have outlined their intentions in a letter of intent, which details plans to provide OpenAI with a minimum of 10 gigawatts of Nvidia chips to bolster its AI infrastructure. This collaboration is expected to play a crucial role in advancing OpenAI’s upcoming models and accelerating its pursuit of artificial general intelligence.

“Everything starts with compute,” said Sam Altman, CEO of OpenAI, in a press release. “Compute infrastructure will be the basis for the economy of the future, and we will utilize what we’re building with Nvidia to both create new AI breakthroughs and empower people and businesses with them at scale.”

The partnership aims to jointly develop AI supercomputing systems, beginning with the rollout of Nvidia’s Vera Rubin platform. Jensen Huang, founder and CEO of Nvidia, emphasized the historical collaboration between the two firms, stating, “Nvidia and OpenAI have pushed each other for a decade, from the first DGX supercomputer to the breakthrough of ChatGPT. This investment and infrastructure partnership mark the next leap forward—deploying 10 gigawatts to power the next era of intelligence.”

The companies anticipate finalizing the terms of their collaboration in the coming weeks, with the initial rollout scheduled for the latter half of 2026. Greg Brockman, cofounder and president of OpenAI, expressed enthusiasm for the partnership, stating, “We’ve utilized their platform to create AI systems that hundreds of millions of people use every day. We’re excited to deploy 10 gigawatts of compute with Nvidia to push back the frontier of intelligence and scale the benefits of this technology to everyone.”

This agreement not only combines OpenAI’s software capabilities with Nvidia’s hardware strength but also aims to create a unified AI roadmap. Under the terms of the partnership, OpenAI will designate Nvidia as its primary partner for computing and networking, thereby expanding its AI infrastructure.

The deal also enhances OpenAI’s existing network of infrastructure partners, which includes major players such as Microsoft, Oracle, SoftBank, and Stargate. Currently, OpenAI serves over 700 million active users each week, encompassing a diverse range of businesses and developers globally.

This announcement follows closely on the heels of Nvidia’s recent commitment of $5 billion to support Intel, which has been navigating challenges in the chipmaking sector. The strategic investment in OpenAI signifies Nvidia’s ongoing dedication to advancing AI technology and its applications across various industries.

As the partnership unfolds, both companies are poised to make significant strides in the realm of artificial intelligence, potentially reshaping the landscape of technology and its impact on society.

Source: Original article

IIT Madras Collaborates with Caterpillar Inc. for Research and Innovation

The Indian Institute of Technology Madras has signed a Memorandum of Understanding with Caterpillar Inc to enhance research and innovation across multiple advanced technology fields.

In a significant development aimed at enhancing research and innovation, the Indian Institute of Technology Madras (IIT Madras) has entered into a Memorandum of Understanding (MoU) with Caterpillar Inc., a prominent US-based manufacturing company. This collaboration is part of IIT Madras’s Global University Partner initiative and seeks to advance research in several cutting-edge fields.

The partnership will focus on joint research in various key areas, including advanced manufacturing, artificial intelligence and data science, mechanical engineering, autonomous mining equipment, energy systems, and electrification technologies. These areas were selected for their long-term relevance to industry and the potential for collaborative innovation.

In the realm of advanced manufacturing, the partnership aims to innovate and improve existing manufacturing processes. The collaboration will also delve into artificial intelligence and data science, developing intelligent systems and data-driven solutions that can enhance operational efficiency.

Mechanical engineering will see advancements through the enhancement of mechanical systems and components, while the development of autonomous mining equipment will focus on creating self-operating machinery for mining operations. Additionally, research into energy systems will cover gas turbines, engines, and sustainable energy solutions, contributing to the growing demand for cleaner energy alternatives.

The partnership will also explore electrification technologies, specifically the development of batteries and fuel cells that support cleaner energy initiatives. By targeting these areas, the collaboration aims to address pressing industrial challenges and foster innovation.

Beyond research, the collaboration will extend to several broader impacts. This includes the establishment of continuing education programs that offer advanced learning opportunities for both students and professionals. The partnership will also engage in consulting efforts, providing expert advice and solutions to various industry challenges.

Talent development activities will be a key focus, aimed at identifying and nurturing future leaders in technology and engineering. The partnership will also sponsor innovation clubs and technical events, encouraging student engagement in innovation and technical activities. Furthermore, internships and employment opportunities will be made available, providing students with hands-on experience and potential career paths with Caterpillar.

This partnership builds upon a longstanding relationship between IIT Madras and Caterpillar Inc., which began in 2006. In 2008, Caterpillar established a co-located office at the IIT Madras Research Park, marking the beginning of their collaborative efforts. Over the years, their partnership has encompassed various research initiatives, continuing education programs, consulting services, and student engagement activities.

The new MoU formalizes this partnership under Caterpillar’s Global University Collaboration Model, expanding the scope for future projects and reinforcing the commitment to advancing technology and innovation.

This collaboration is expected to significantly impact the fields of engineering and technology, providing students with valuable opportunities and contributing to the development of advanced solutions for global challenges, according to Global Net News.

Source: Original article

Beware of Fake Wi-Fi Networks That Can Compromise Your Data

Travelers are increasingly vulnerable to fake Wi-Fi networks that can compromise their personal data while flying, as attackers exploit the growing reliance on in-flight internet services.

As air travel becomes more reliant on in-flight internet for entertainment and services, travelers face heightened risks from fake Wi-Fi networks. Cybersecurity experts warn that these malicious networks are designed to steal personal information, and recent incidents highlight the dangers involved.

Earlier this year, Australian authorities arrested a passenger for operating a fraudulent Wi-Fi network at an airport and during a flight. This setup mimicked the airline’s official Wi-Fi service, but it was actually an “evil twin” hotspot, a term used by cybersecurity researchers to describe a fake network that tricks users into providing their credentials.

While the concept of fake Wi-Fi networks is not new, the context in which it is being used has evolved. Historically, these deceptive networks have been prevalent in cafes, hotels, and airports. However, the recent case marks a troubling trend of attackers extending their reach into the skies, taking advantage of travelers’ increasing dependence on in-flight Wi-Fi.

An evil twin hotspot operates by impersonating a legitimate network, often by copying its name, known as the SSID. When multiple networks with the same name are available, devices typically connect to the one with the strongest signal, which is often the attacker’s network. Once connected, unsuspecting victims may be redirected to a counterfeit login page that requests personal information such as email addresses, passwords, or social media credentials, all under the guise of accessing the airline’s entertainment system.

The implications of such attacks can be severe, leading to account takeovers, identity theft, or further cyberattacks. Travelers are particularly vulnerable in these situations, as they often have limited options for internet access. Mobile data can be unreliable or expensive, pushing individuals toward available Wi-Fi networks that appear legitimate.

Moreover, a shift in how travel providers deliver entertainment and services has exacerbated the issue. Airlines are increasingly replacing traditional seatback screens with streaming portals, cruise lines are promoting app-based services, and hotels are directing guests to digital check-in platforms. This trend means that more travelers are connecting to Wi-Fi networks than ever before, often without considering the potential risks.

In the Australian case, the attacker utilized a portable hotspot onboard, naming it to match the airline’s official Wi-Fi network. Passengers, drawn in by the stronger signal, connected to the malicious network and were subsequently led to a fake login page requesting personal details. In-flight, the stakes are even higher; passengers may feel compelled to share their data to regain access to entertainment options, making the success rate of such attacks alarmingly high.

To protect against rogue Wi-Fi networks, cybersecurity experts recommend using a Virtual Private Network (VPN). A VPN creates an encrypted tunnel between your device and the internet, significantly reducing the risk of data interception, even if you inadvertently connect to a malicious hotspot. However, it is important to note that in-flight Wi-Fi systems may require users to disable their VPN temporarily to access the onboard portal. Once connected, re-enabling the VPN can help secure any subsequent browsing or messaging activities.

While a VPN is a crucial defense, it should not be the sole line of protection. Travelers should ensure their devices have robust antivirus software installed, which serves as the first line of defense against malicious sites and apps that may be pushed through fake portals. This software can also alert users to phishing emails and ransomware threats, safeguarding personal information and digital assets.

Additionally, implementing two-factor authentication (2FA) can provide an extra layer of security. Whenever possible, opt for app-based authenticators rather than SMS codes, as they function offline and are more difficult for attackers to intercept.

Many devices are set to automatically reconnect to familiar networks, making it easier for a fake hotspot with the same name to deceive users. To mitigate this risk, travelers should disable auto-connect features and manually select the correct airline Wi-Fi network before logging in.

When browsing in-flight, it is advisable to look for the padlock icon in the browser’s address bar, indicating that the connection is encrypted via HTTPS. This encryption makes it more challenging for attackers to intercept data transmitted over public Wi-Fi.

Even with these precautions, in-flight Wi-Fi should be treated as untrusted. Travelers are advised to avoid logging into sensitive accounts, such as online banking or work systems, and to limit their activities to light browsing, streaming, or messaging until they can connect to a secure network.

Keeping devices updated is also essential, as outdated operating systems and applications can harbor security vulnerabilities that attackers may exploit. Before traveling, ensure that all software is up to date, as many updates include critical security patches.

When possible, consider switching your device to airplane mode and enabling only Wi-Fi. This reduces exposure to other signals, such as Bluetooth or cellular roaming, which attackers may target during flights.

Be cautious of pop-ups or redirects that may appear on fake in-flight portals. If a page requests unnecessary information, such as your full Social Security number or banking details, treat it as a red flag and close the page immediately.

After the flight, it is important to sign out of the airline’s Wi-Fi portal and any accounts accessed during the journey. This step helps prevent session hijacking if the system retains cached tokens.

The rise of evil twin attacks in the air serves as a reminder that convenience often comes with hidden risks. As airlines increasingly push passengers toward in-flight Wi-Fi, attackers are finding new ways to exploit this dependency. The next time you fly, consider whether it is worth the risk to connect to the first Wi-Fi network that appears. Sometimes, the safest choice is to remain offline until you reach your destination.

Source: Original article

Shaping the Future of AI: Tomas Lamanauskas Discusses UN’s ITU Role

At the “AI for Good” summit in Geneva, Tomas Lamanauskas discussed the International Telecommunication Union’s pivotal role in governing artificial intelligence and ensuring its benefits are shared globally.

At the recent “AI for Good” summit held in Geneva, Sanjay Puri, host of the “Regulating AI” podcast, engaged in a comprehensive discussion with Tomas Lamanauskas, the deputy secretary-general of the International Telecommunication Union (ITU). Their conversation focused on the historic role of ITU in global communication and its evolving responsibilities in the governance of artificial intelligence.

Established 160 years ago, the ITU is one of the oldest agencies within the United Nations, originally created to standardize telegraph communication. Lamanauskas explained that when the telegraph was first invented, it functioned only within national borders. To facilitate cross-border communication, nations needed to reach agreements, leading to the establishment of the International Telegraph Union and the signing of the International Telegraph Convention in Paris.

Over the years, the ITU has expanded its oversight to include wireless communication, satellite regulation, and mobile networks, laying the groundwork for the digital era we experience today. Now, the organization finds itself at the forefront of another technological revolution: artificial intelligence.

While many view AI as a recent development, Lamanauskas reminded listeners that its roots extend far beyond the advent of popular applications like ChatGPT. He provided an example of AI’s longstanding presence, noting that the technology has been in use for decades in systems that photograph vehicles to issue speeding tickets, translating images into numbers.

Since launching its “AI for Good” summit in 2017, the ITU has been a key player in fostering international discussions on AI governance. Lamanauskas emphasized the challenge of balancing rapid innovation with the need for global standardization. He stated, “You encourage interoperability… that means that different islands of technology can work together. So, these worlds actually drive each other.”

He further elaborated on the necessity of innovation, asserting that it must progress quickly to introduce new ideas and opportunities. However, he underscored the importance of standardization, which ensures that innovations can be widely adopted and utilized.

The ITU’s unique structure, comprising 194 member states and over 1,000 sector members from academia, government, and industry, enables it to build consensus in an inclusive manner. On the topic of enforcement, Lamanauskas clarified that ITU’s role is collaborative rather than regulatory. He stated, “ITU is a part of the ecosystem, so it’s not a beginning or end of all… The enforcement role, most of the time, falls into national governments.” He explained that national governments are responsible for policy decisions and enforcement actions to ensure compliance, while ITU supports these governments in various ways.

The discussion also touched on the geopolitical divides in AI governance, with the European Union, the United States, and China pursuing different paths. Lamanauskas noted that such diverse approaches are not unprecedented, recalling that competing standards like GSM and CDMA existed in the telecommunications sector. Over time, convergence occurred, and he emphasized that ITU’s role is to provide a platform for dialogue, enabling countries to learn from one another and ensuring that smaller nations are not left behind.

One of the more pressing issues raised during the conversation was the fragility of global connectivity. Lamanauskas pointed out that 99% of international internet traffic relies on undersea cables, a network consisting of approximately 500 cables worldwide. With around 200 breaks occurring in these cables each year, ensuring resilience has become critical. The ITU has convened governments, regulators, and private sector players to streamline repairs, enhance monitoring, and ensure that small island states are included in the digital infrastructure.

Lamanauskas expressed a commitment to advancing dialogue among all stakeholders, stating, “We hope to really progress that dialogue with everyone and to make sure that AI is not just a kind of fancy technology that we can talk about few countries in the world that can benefit from that, but the AI power, the positive power is really felt around the world by everyone.”

From the beeps of the telegraph to the rise of artificial intelligence, the mission of the ITU remains steadfast: to build bridges across borders and ensure that technology serves humanity. Lamanauskas believes that while innovation moves rapidly, common standards are essential for ensuring that everyone can benefit from technological advancements.

Source: Original article

Indian-American Dr. Bijoy Sagar Advocates Responsible AI in Pharma and Agriculture

Dr. Bijoy Sagar of Bayer discusses how responsible AI innovation can enhance efficiency and equity in the pharmaceutical and agricultural sectors, aligning with the mission of “health for all, hunger for none.”

In a recent episode of the CAIO Connect podcast, Dr. Bijoy Sagar, Chief Information Technology and Digital Transformation Officer at Bayer, shared insights on the transformative potential of artificial intelligence (AI) in the pharmaceutical and agricultural sectors. Hosted by Sanjay Puri, the discussion emphasized the importance of adopting an “AI-first” approach that prioritizes both productivity and ethical considerations.

Dr. Sagar expressed his deep commitment to Bayer’s mission of “health for all, hunger for none.” He stated, “If you are any human being on this planet, those are two things you can’t do without. That propels the basic purpose of your life forward.” He believes that both the pharmaceutical and agricultural industries are driven by the need for innovation, particularly in light of the vast amounts of data available.

“To have people live healthy lives, to have them achieve sustenance in the best healthful way… these are two industries which are highly propelled by innovation,” he explained. Sagar emphasized that technology is a natural ally in this mission, as it can help meet unmet needs. By integrating AI into workflows, Bayer aims to create “frictionless integration” between human interactions and technology, reducing barriers to efficiency.

During the conversation, Sagar highlighted the distinct roles of generative AI and agentic AI. He described generative AI as a tool for personal productivity, while agentic AI focuses on organizational productivity. “This hybrid balance is essential for long-term adoption and success,” he noted. Sagar underscored the importance of establishing frameworks and guardrails that encourage experimentation while maintaining alignment with organizational goals.

“We have helped people think through what they want to use. We have built guardrails around it. And then we do encourage experimentation within that framework,” he said. He believes that allowing innovation within guided parameters is crucial for driving effective change. “You can still let people innovate and create agents within some framework, but I also believe it’s really important to set organizational principles and large organizational goals to drive that conversation,” he added.

Dr. Sagar also addressed the evolving landscape of software access, noting a shift from traditional interfaces to more flexible, autonomous methods. However, he acknowledged that in highly regulated industries like pharmaceuticals, balancing innovation with compliance remains a significant challenge. “You have to have a starting point, which is universal, not predefined, but accessible so it serves you the right thing as you need,” he explained. This approach allows for autonomy while ensuring adherence to necessary constraints.

Looking to the future, Sagar pointed to emerging technologies such as quantum computing and synthetic data. He remarked, “This could be a quantum topic and standard AI topic… you can do a tremendous amount of modeling already without making that about human data.” He expressed optimism about the potential of quantum computing, particularly in areas like protein folding, which he believes could revolutionize the field. However, he cautioned against over-reliance on synthetic data, advocating for a hybrid approach that combines both synthetic and real data.

Equity and inclusivity emerged as central themes in Sagar’s discussion. He warned that the AI divide could exacerbate existing inequalities, stating, “We have to build models and we have to build these solutions in a way that benefits the largest amount of humanity possible.” He emphasized that achieving “health for all, hunger for none” requires a commitment to inclusivity, particularly for vulnerable populations.

Dr. Sagar also highlighted the human aspect of transformation, stating, “We’re really transforming the way companies work, behave, sell, innovate.” He emphasized that this transformation is not merely technological but fundamentally about people and organizational culture. “Technology is a driver to that change,” he said, underscoring the need for humility and adaptability in the face of such significant shifts.

In conclusion, Dr. Sagar painted a vision of an AI-driven future where innovation is intertwined with responsibility. He believes that the success of AI adoption hinges not only on technological advancements but also on fostering a meaningful mission that attracts talent and drives collective transformation.

Source: Original article

iPhone Users Become Prime Targets for Scammers in 2023

New research indicates that iPhone users are more susceptible to online scams due to overconfidence in Apple’s security, making them easier targets for cybercriminals compared to Android users.

Recent findings from a survey conducted by Malwarebytes, a global cybersecurity firm, reveal that iPhone users are more likely to fall victim to online scams than their Android counterparts. This vulnerability stems not from the devices themselves, but from the habits and mindsets of their users.

The survey, which included responses from 1,300 adults across the United States, United Kingdom, Austria, Germany, and Switzerland, highlights a concerning trend: many iPhone owners exhibit a blind trust in Apple’s security measures. This misplaced confidence makes them prime targets for scammers who exploit such overconfidence.

For years, Apple has cultivated a reputation for superior security, leading many iPhone users to believe that their devices inherently shield them from online threats. However, this study underscores a crucial reality: cybercriminals are less concerned about the brand of phone you own and more focused on how easily they can deceive you. Currently, many iPhone users are letting their guard down, making them more vulnerable to scams.

To enhance online safety, iPhone users must adopt smarter habits. Here are some essential strategies to keep scammers at bay:

First and foremost, if something seems suspicious—whether it’s a text, link, or offer—take a moment to pause. Scammers often rely on urgency to trick individuals into acting quickly without thinking.

It is also crucial to avoid clicking on links or QR codes from unknown sources. Instead, visit the company’s official website directly. Additionally, using robust antivirus software can help block malicious links before they reach your device. This software can also alert you to phishing emails and ransomware threats, safeguarding your personal information and digital assets.

Regular updates are another key aspect of maintaining security. Apple frequently releases updates that include security patches designed to combat new threats. Ensuring that your iPhone is running the latest version of iOS and that all apps are up to date can significantly reduce the risk of hackers exploiting outdated vulnerabilities.

Using the same password across multiple accounts is a common mistake that can make you an easy target for hackers. It is advisable to create unique passwords for each account. A password manager can be a valuable tool, securely storing and generating complex passwords, thereby minimizing the risk of password reuse.

Furthermore, it is wise to check if your email has been compromised in past data breaches. Many password managers now include built-in breach scanners that can alert you if your email address or passwords have appeared in known leaks. If you find a match, it is imperative to change any reused passwords and secure those accounts with new, unique credentials.

iPhone users often share personal information online, which can be exploited by scammers. To mitigate this risk, consider using a personal data removal service that helps erase your information from data broker sites and other platforms that may fuel targeted scams. While no service can guarantee complete erasure, these tools can make it significantly harder for criminals to connect the dots and deceive you.

Turning on two-factor authentication (2FA) is another effective measure to secure your accounts. This feature adds an extra layer of protection by requiring a code each time someone attempts to log in, even if they have your password.

Additionally, be cautious about sharing your phone number or email address just to receive discounts or enter giveaways. Scammers often use this information to target individuals later with spam, phishing attempts, and identity theft schemes. Instead, consider creating an alias email address for sign-ups and promotions to keep your primary inbox private.

While Apple provides built-in security features, it is essential for iPhone users to remain vigilant. Android users appear to be more proactive in their security measures, but the reality is that everyone is vulnerable to scams. True security comes from user habits rather than the hardware itself.

The bottom line is clear: iPhone users are falling for scams more frequently because of their excessive trust in Apple’s security and a lack of protective measures. The solution is straightforward: exercise caution, maintain skepticism, and implement additional security measures. In the realm of online scams, it is not the device that determines safety; it is the user’s approach to online interactions.

Do you still believe that owning an Apple device guarantees safety, or are you ready to acknowledge that scammers can outsmart any phone? Share your thoughts with us at CyberGuy.com/Contact.

Source: Original article

AI Browsers Create New Opportunities for Online Scams

AI browsers from major tech companies are increasingly vulnerable to scams, completing fraudulent transactions and clicking on malicious links without human verification.

Artificial intelligence (AI) browsers, developed by companies such as Microsoft, OpenAI, and Perplexity, are no longer a futuristic concept; they are now a reality. Microsoft has integrated its Copilot feature into the Edge browser, while OpenAI is experimenting with a sandboxed browser in agent mode. Perplexity’s Comet is one of the first to fully embrace the idea of browsing on behalf of users. This shift towards agentic AI is transforming daily activities, from searching and reading to shopping and clicking.

However, this evolution brings with it a new wave of digital deception. While AI-powered browsers promise to streamline tasks like shopping and managing emails, research indicates that they can fall victim to scams more quickly than humans. This phenomenon, termed “Scamlexity,” describes a complex, AI-driven scam landscape where the AI agent can be easily tricked, leading to financial loss for the user.

AI browsers are not immune to traditional scams; in fact, they may be more susceptible. Researchers at Guardio Labs conducted an experiment where they instructed an AI browser to purchase an Apple Watch. The browser completed the transaction on a fraudulent Walmart website, autofilling personal and payment information without hesitation. The scammer received the funds, while the human user failed to notice any warning signs.

Classic phishing tactics remain effective against AI as well. In another test, Guardio Labs sent a fake Wells Fargo email to an AI browser, which clicked on a malicious link without verification. The AI even assisted the user in entering login credentials on the phishing page. By removing human intuition from the equation, the AI created a seamless trust chain that scammers could exploit.

The real danger lies in attacks specifically designed for AI. Guardio Labs developed a scam disguised as a CAPTCHA page, which they named PromptFix. While a human would only see a simple checkbox, the AI agent read hidden malicious instructions embedded in the page code. Believing it was performing a helpful action, the AI clicked the button, potentially triggering a malware download. This type of prompt injection circumvents human awareness and directly targets the AI’s decision-making processes. Once compromised, the AI can send emails, share files, or execute harmful tasks without the user’s knowledge.

As agentic AI becomes more mainstream, the potential for scams to scale rapidly increases. Instead of targeting millions of individuals separately, attackers need only compromise a single AI model to reach a vast audience. Security experts caution that this represents a structural risk, extending beyond traditional phishing issues.

While AI browsers can save time, they also introduce risks if users become overly reliant on them. To mitigate the chances of falling victim to scams, individuals should take practical steps to maintain control over their online activities. Always double-check sensitive actions such as purchases, downloads, or logins, ensuring that final approval remains with the user rather than the AI. This practice helps prevent scammers from slipping past your awareness.

Scammers often exploit exposed personal information to enhance the credibility of their schemes. Utilizing a trusted data removal service can help eliminate your information from broker sites, decreasing the likelihood that your AI agent will inadvertently disclose details already circulating online. While no service can guarantee complete removal of personal data from the internet, employing a data removal service is a wise choice. These services actively monitor and systematically erase personal information from numerous websites, providing peace of mind in an increasingly digital world.

Additionally, installing and maintaining strong antivirus software is crucial. This software adds an extra layer of defense, catching threats that an AI browser might overlook, including malicious files and unsafe downloads. Strong antivirus protection can alert users to phishing emails and ransomware scams, safeguarding personal information and digital assets.

Using a reliable password manager is also advisable. These tools help generate and store strong, unique passwords and can notify users if an AI agent attempts to reuse weak or compromised passwords. Regularly reviewing bank and credit card statements is essential, especially if an AI agent manages accounts or makes purchases on your behalf. Prompt action on suspicious charges can prevent further scams.

As AI browsers continue to evolve, they bring both convenience and risk. By removing human judgment from critical tasks, they expose users to a broader range of potential scams than ever before. Scamlexity serves as a wake-up call: the AI you trust could be deceived in ways you may not perceive. Staying vigilant and demanding stronger safeguards in every AI tool you use is essential for maintaining security in this new digital landscape.

Source: Original article

How to Convert Any File to PDF Format Easily

Saving files as PDFs is a straightforward process that ensures document integrity and security across various platforms and devices.

The Portable Document Format (PDF) is one of the most widely utilized file formats for storing and sharing documents. Its popularity stems from its ability to maintain layout, fonts, colors, and images, regardless of the device used to view it. Many individuals prefer PDFs for sending resumes, receipts, tickets, contracts, and school papers, as these documents retain their formatting no matter who opens them. Additionally, unlike proprietary formats such as DOCX, XLSX, and PPTX, PDFs are less likely to become obsolete. They also offer robust options for securing and encrypting sensitive information.

The good news is that you can convert nearly any text document or image into a PDF. Below, we explore various methods for creating PDFs across different platforms.

For users on Windows or Mac, there is a built-in option that allows you to save files as PDFs with just a few clicks. This method typically works well for text documents, images, and emails. On Windows, you can use the print function in many applications to save a file as a PDF. Similarly, many macOS apps provide the option to save files as PDFs when printing.

Whether you are viewing a document, image, or webpage, as long as the application supports printing, you can save it as a PDF. On Android and iOS devices, you can utilize the share function to save files as PDFs, which requires only a few taps. The easiest method on Android is to use the print function when sharing a file. Settings may vary depending on your phone’s manufacturer. On an iPhone, you can save a file as a PDF in apps like Photos, Files, and Notes.

Numerous apps and online services offer built-in tools for converting files to PDF format. If you are using Microsoft Office applications such as Word, Excel, and PowerPoint, you can easily save your documents as PDFs. For Google Workspace apps like Docs, Sheets, and Slides, the option to download files as PDFs is readily available.

If you wish to save a webpage in browsers like Chrome, Edge, or Firefox, the process is straightforward. In Adobe Acrobat Reader, users with a premium subscription can also convert files to PDFs. Notetaking applications like Evernote, OneNote, and Notion allow users to export files as PDFs, with specific steps varying by application.

Online conversion tools also provide a convenient means of converting files to PDFs. For example, using CloudConvert is a popular option. However, it is advisable to avoid uploading sensitive documents—such as tax returns, medical records, financial statements, legal contracts, or personal identification documents—to online services, as these may store copies of files on their servers, increasing the risk of security breaches. For sensitive documents, it is best to use built-in tools or trusted applications.

For mobile users, there are many apps available for scanning documents and saving them as PDFs. Adobe Scan is frequently recommended and can be downloaded from the App Store or Google Play. The app allows users to capture documents and convert them to PDFs easily.

Once you have saved your file as a PDF, you may want to enhance its functionality or security. There are various online tools available for merging PDFs for free. Adobe also offers a free online tool for compressing PDFs. Additionally, users can password-protect their PDFs for free on the Adobe website.

Signing documents is another common requirement, and the simplest method is to use Adobe Acrobat Reader. As demonstrated, saving any file as a PDF is a simple process across devices and platforms, typically requiring just a few clicks or taps. PDFs are an excellent choice for sharing documents while preserving their formatting. It is essential to follow best practices when sharing PDFs, particularly if they contain sensitive information. Adding an extra layer of security through password protection or encryption is always advisable.

For more information on converting files and utilizing PDFs, visit CyberGuy.com.

Source: Original article

New Robot Technology Aims to Revolutionize Household Chores

The X Square Robot company has launched Quanta X2, an advanced robotic butler, alongside an open-source AI model, Wall-OSS, aimed at revolutionizing household and workplace tasks.

X Square Robot has unveiled its latest innovation, the Quanta X2, a highly advanced robotic butler designed to perform a variety of tasks in both home and industrial settings. This launch is accompanied by the introduction of Wall-OSS, an open-source artificial intelligence (AI) model that empowers robots to adapt to unpredictable real-world scenarios.

The company recently secured approximately $100 million in Series A+ funding, led by Alibaba Cloud, with additional investments from HongShan, INCE Capital, Meituan, Legend Star, and Legend Capital. This financial boost is set to enhance the development and deployment of their cutting-edge technology.

Quanta X2 stands out with its impressive specifications. The robot measures about 5 feet 8 inches tall and weighs around 210 pounds. It boasts 62 degrees of freedom, allowing for smooth and lifelike movements. Its seven-degree-of-freedom robotic arm is equipped with dexterous hands capable of sensing pressure changes, enabling it to perform delicate tasks.

This robotic assistant is versatile, capable of gripping, cleaning, and even expressing emotions through gestures. A modular clamp system allows it to attach various tools, such as brushes or mop heads, for comprehensive 360-degree cleaning. With an arm reach of 30 inches and a payload capacity of approximately 13 pounds, Quanta X2 is engineered for precision, achieving fine movements down to 0.001 inches.

In conjunction with the Quanta X2, X Square Robot introduced Wall-OSS, an innovative open-source embodied AI model. This model is trained on vision-language-action data, enabling robots to “think” and act more like humans when confronted with unpredictable tasks. Unlike traditional task-specific systems that struggle outside narrow scenarios, Wall-OSS generalizes across various robot types, addressing significant challenges such as catastrophic forgetting and the synchronization of vision, language, and action.

Robots powered by Wall-OSS can seamlessly reason, plan, and execute tasks, making them suitable for real-world applications beyond laboratory settings. Developers will have access to Wall-OSS on platforms like GitHub and Hugging Face, fostering community-driven datasets that could accelerate the adoption of this technology.

The vision of a robot capable of vacuuming, delivering food, or assisting with complex tasks is becoming increasingly attainable. The Quanta X2 exemplifies how robots can transition from factory environments to homes, hotels, and offices. By open-sourcing Wall-OSS, X Square Robot encourages developers worldwide to contribute to the evolution of the next generation of robots, potentially leading to a future where robotic assistants are as ubiquitous as smartphones.

X Square Robot is optimistic that embodied AI and open-source collaboration will drive robots beyond mere demonstrations and into everyday life. With the Quanta X2 and Wall-OSS, the company is laying the foundation for robots that can adapt to diverse needs rather than being limited to singular tasks. However, a critical question remains: can these robots prove to be reliable, affordable, and safe enough for widespread adoption?

If a robot like Quanta X2 could handle your household chores, would you feel comfortable inviting it into your home? Share your thoughts with us at Cyberguy.com.

Source: Original article

World’s First Personal Robocar: Would You Consider Buying One?

Silicon Valley startup Tensor is set to revolutionize personal transportation with the introduction of the world’s first consumer-owned self-driving car, dubbed the personal robocar.

Silicon Valley startup Tensor is making waves in the automotive industry with its ambitious vision for the future of driving. Unlike competitors focused on robotaxi fleets, Tensor aims to empower consumers by introducing the first true self-driving car, which it has branded as the world’s first personal robocar.

This luxury electric vehicle (EV) is designed to offer Level 4 autonomy, allowing passengers to take their eyes off the road while the steering wheel seamlessly folds away into the dashboard. In its place, a large screen transforms the driver’s seat into a comfortable lounge or a mobile office, enhancing the overall travel experience.

Tensor has engineered this vehicle from the ground up, integrating a comprehensive array of technology. The robocar is equipped with 37 cameras, five custom lidars, 11 radars, as well as microphones, ultrasonics, and water detectors. Each sensor is outfitted with cleaning systems to ensure a clear view in all driving conditions.

The vehicle operates on Tensor’s proprietary Foundation Model, a transformer-based artificial intelligence designed to replicate human driving decisions. A key advantage of this system is its ability to function without constant cloud support, which enhances user privacy and eliminates reliance on remote servers.

While many autonomous startups, including Tensor’s previous brand AutoX, began by developing robotaxi fleets, Tensor is taking a more challenging route by focusing on consumer-owned vehicles. This approach requires the robocar to adapt to a variety of driving environments, including highways and urban roads, without a safety net. Although it may not be able to navigate every road from the outset, owners will have the option to take control whenever necessary.

Tensor is committed to ensuring safety through full redundancy in steering, braking, and computing systems. In the event of a system failure, backup systems are designed to take over immediately. The interior of the robocar adds another layer of appeal, featuring retractable pedals and a foldable steering mechanism that creates a living space atmosphere rather than a traditional driver’s seat.

To bring this innovative vehicle to market, Tensor has partnered with VinFast, a Vietnamese automaker. While pricing details remain undisclosed, company executives have indicated that the cost will likely exceed that of other luxury electric vehicles, such as the Lucid Air.

Tensor’s approach represents a significant shift in the automotive landscape. Rather than waiting for ride-hailing services to deploy self-driving fleets, consumers may soon have the opportunity to purchase autonomy directly. If successful, this could not only transform daily commuting but also change the way we perceive car ownership altogether.

With a solid foundation built on its AutoX heritage, Tensor has accumulated years of testing experience, including obtaining permits for driverless operations in California since 2020. Now rebranded, the company is racing to deliver the first consumer-ready robocar by 2026. This venture is a considerable gamble; while luxury buyers may be attracted to the futuristic design and privacy features, widespread acceptance will hinge on trust, safety, and real-world performance.

As the prospect of autonomous driving becomes more tangible, the question remains: would you be willing to relinquish control of your daily commute to a car that promises to drive itself?

Source: Original article

Apple Watch Series 11 Receives FDA Clearance for Silent Killer Alert

Apple Watch Series 11 introduces FDA-cleared hypertension notifications, enabling users to passively monitor blood pressure patterns and potentially identify undiagnosed hypertension.

Apple has announced a significant new feature for its Apple Watch Series 11 that aims to combat hypertension, often referred to as the “silent killer.” This feature passively monitors blood pressure patterns over a 30-day period, utilizing advanced sensors to detect signs of chronic high blood pressure.

According to the World Health Organization, nearly 1.3 billion adults worldwide live with hypertension, many of whom are unaware of their condition. The introduction of hypertension notifications on the Apple Watch could be a game-changer for these individuals. The feature will begin rolling out next week in over 150 locations, including the United States, European Union, Hong Kong, and New Zealand. It will also be available on Apple Watch Series 9 and later models, as well as Apple Watch Ultra 2 and later, through the upcoming watchOS 26 update.

Hypertension can lead to serious health issues, including heart attacks, strokes, and kidney disease, often without any noticeable symptoms. By incorporating passive blood pressure monitoring, Apple aims to help millions detect early warning signs of this condition. The watch employs its optical heart sensor to analyze how blood vessels respond to heartbeats over the month-long monitoring period. If it identifies consistent patterns indicative of hypertension, users will receive a notification.

Apple estimates that this new feature could alert more than 1 million individuals with undiagnosed hypertension within its first year of operation. The hypertension notification feature builds upon years of health research conducted by Apple. Since the launch of the Apple Watch, various heart health tools, including ECG readings and AFib history tracking, have empowered users to identify potential health issues early. The addition of hypertension notifications extends this mission to address one of the most prevalent and dangerous silent conditions.

The feature functions in the background during waking hours, analyzing photoplethysmography (PPG) signals, which reflect changes in blood volume beneath the skin. This method allows the watch to detect patterns that suggest chronic high blood pressure without requiring users to calibrate the device or take direct blood pressure readings. Instead, the watch continuously tracks signals over 30 days and alerts users if consistent signs of hypertension emerge.

To develop this algorithm, Apple utilized data from over 100,000 study participants representing a diverse range of ages, races, body types, and health statuses. The accuracy of the feature was validated through a pivotal clinical study involving more than 2,000 participants, who wore the Apple Watch alongside traditional at-home blood pressure cuffs for comparison. The study demonstrated that the feature achieved a specificity rate exceeding 92%, effectively minimizing false positives. Sensitivity rates were particularly strong for Stage 2 hypertension, the more severe form of the condition, with the feature identifying over half of users at risk.

This level of accuracy has the potential to prevent serious health events, such as strokes and heart attacks, in individuals who may otherwise remain unaware of their hypertension. Importantly, the validation study confirmed that the feature performed consistently across various demographic groups, including age, gender, race, and skin tone, ensuring reliability for Apple’s global user base. Apple also conducted usability testing to refine the onboarding process and notification language, ensuring users understand the alerts and the appropriate actions to take.

By passively monitoring and flagging potential signs of hypertension, the Apple Watch addresses a critical gap in diagnosis. Hypertension often goes unnoticed for years, but with this new feature, users can receive alerts within just one month of wearing the device. Dr. Harlan Krumholz, a cardiologist and scientist at Yale University and Yale New Haven Hospital, expressed his support for Apple’s focus on hypertension. He noted, “I’m glad to see Apple turning attention toward hypertension—the number one preventable cause of heart attack and stroke. Their approach automatically flags signals that suggest you may have high blood pressure and encourages you to check it out. That’s especially important because so many people remain undiagnosed.” He emphasized that while the feature is beneficial, it should not replace regular medical care.

For those who receive a hypertension alert, Apple recommends following up with a healthcare provider for further evaluation. The hypertension notifications are not exclusive to the Apple Watch Series 11. Users of Apple Watch Series 9 and later models, as well as Apple Watch Ultra 2 and later, can access the feature once they update to watchOS 26.

Updating the watch is straightforward. After the update, users can enable hypertension notifications in the Health app, allowing their device to begin monitoring for signs of chronic high blood pressure.

The Apple Watch Series 11 is now available for preorder, with in-store availability starting on Friday, September 19. Prices start at $399. The lineup includes the flagship Apple Watch Series 11, which features FDA-cleared hypertension notifications and the latest health and fitness tools, making it an ideal choice for those seeking cutting-edge technology.

Additionally, the Apple Watch Ultra 3, designed for outdoor enthusiasts, offers enhanced durability, a larger display, and longer battery life, along with the same hypertension notification feature.

With the introduction of FDA-cleared hypertension notifications, the Apple Watch is evolving beyond merely tracking workouts and fitness goals. It now serves as a proactive tool for alerting users to one of the most significant health risks they may face. For millions who infrequently visit healthcare providers, this feature could prove to be a life-saving addition to their daily routine. While the Apple Watch is not a substitute for professional medical care, it provides an essential safety net for users.

Would you trust your smartwatch to be the first to alert you to a serious health risk, such as hypertension? Share your thoughts in the comments below.

Source: Original article

New Phishing Scam Exploits Emotional Event Invitations to Target Victims

Scammers are using fake Evite invitations with emotionally charged subjects to trick victims into clicking malicious links, highlighting the importance of verifying sender details and using strong antivirus software.

In a recent incident, a user received an email titled “Special Celebration of Life,” which appeared to be a legitimate Evite invitation. However, upon clicking the “View Invitation” button, their antivirus software intervened, blocking the site and flagging it as a phishing attempt. This email was one of the most convincing scams seen lately, featuring Evite branding, a realistic design, and a personal touch that could easily deceive unsuspecting recipients.

Scammers are increasingly employing emotionally charged subjects in their fake Evite messages to lure individuals into clicking on malicious links. These emails are designed to mimic the appearance of genuine Evite communications, often making it seem as though they are coming from someone the recipient knows, which can lower their guard.

Because these invitations feel personal and urgent, they can bypass the typical skepticism that users might have. It is crucial to verify sender details before opening any event links, especially for sensitive occasions. Even the most convincing invitation can be a trap, as demonstrated by the fake Evite email that was received.

Strong antivirus software is essential for preventing users from landing on dangerous sites. In the case mentioned, the antivirus program successfully blocked the fraudulent Evite link and flagged it as a phishing attempt before any harm could occur. Users are encouraged to choose robust antivirus solutions that include phishing detection and automatic blocking features to protect against threats that may not be immediately recognizable.

To safeguard against malicious links that could install malware or access private information, it is vital to have strong antivirus software installed on all devices. This protection can also alert users to phishing emails and ransomware scams, helping to keep personal information and digital assets secure.

Scammers often utilize email addresses that closely resemble legitimate ones, with slight alterations such as an extra letter, a missing character, or a different domain extension. In the case of the fake Evite email, while the branding appeared perfect, the sender’s address did not match Evite’s official domain. Always double-check the sender’s email address before trusting any communication.

Before clicking on links such as “You’re Invited!”, “View Invitation,” or “RSVP Now,” it is advisable to hover over the link to reveal the destination URL. In the phishing email received, the link directed to a suspicious domain rather than Evite.com. A closer inspection revealed that the link was misspelled as “envtte.” If the address looks odd or unfamiliar, it is best not to click on it.

Reducing the amount of personal information available online can also make it more difficult for scammers to target individuals with convincing phishing attempts. Utilizing a personal data removal service can help scrub personal details, such as phone numbers, home addresses, and email addresses, from public databases. This can significantly lower the risk of falling victim to scams like the fake Evite email.

It is also advisable to verify with the sender directly before clicking on any links. If an invitation appears to come from a friend, do not assume it is legitimate. Scammers frequently spoof the names of people you know. A quick text or phone call can confirm whether the invite was genuinely sent by that person, and in many cases, they may be just as surprised to hear about it.

Phishing scams are evolving to look more authentic than ever. Even if a message seems to originate from someone you trust, a single careless click can jeopardize your personal data. Having strong cybersecurity tools in place and knowing how to identify a scam are your best defenses against these threats.

In this instance, the user was fortunate that their antivirus software blocked the attack before any damage was done. However, not everyone has that safety net. The next time an unexpected invitation or urgent message arrives in your inbox, take a few extra seconds to verify its authenticity before clicking.

Have you ever almost fallen for a fake event invite? What happened? Share your experiences by reaching out at Cyberguy.com/Contact.

Source: Original article

Earth Says Goodbye to ‘Mini Moon’ Asteroid Until 2055

Earth is set to bid farewell to a “mini moon” asteroid that has been orbiting the planet for the past two months, with a return visit planned for 2055.

Earth is preparing to part ways with an asteroid that has been accompanying it as a “mini moon” for the last two months. This harmless space rock is expected to drift away on Monday, as it succumbs to the stronger gravitational pull of the sun.

However, the asteroid will make a brief return visit in January, during which NASA plans to utilize a radar antenna to observe the 33-foot object, designated 2024 PT5. This observation aims to enhance scientists’ understanding of the asteroid, which may be a fragment that was ejected from the moon by an impacting asteroid that created a crater.

While NASA clarifies that 2024 PT5 is not technically a moon—having never been fully captured by Earth’s gravity—it is nonetheless considered “an interesting object” worthy of scientific study. The asteroid was identified by astrophysicist brothers Raul and Carlos de la Fuente Marcos from Complutense University of Madrid, who have collaborated with telescopes in the Canary Islands to conduct hundreds of observations of the object.

Currently, the asteroid is located more than 2 million miles away from Earth, making it too small and faint to be seen without a powerful telescope. In January, it will pass within approximately 1.1 million miles of Earth, maintaining a safe distance before continuing its journey deeper into the solar system. The asteroid is not expected to return until 2055, when it will be nearly five times farther away than the moon.

First detected in August, 2024 PT5 began its semi-orbit around Earth in late September after coming under the influence of Earth’s gravity, following a horseshoe-shaped path. By the time it returns next year, it will be traveling at more than double its speed from September, making it unlikely to linger, according to Raul de la Fuente Marcos.

NASA is set to track the asteroid for over a week in January using the Goldstone solar system radar antenna located in California’s Mojave Desert, which is part of the Deep Space Network. Current data indicates that during its anticipated visit in 2055, the sun-orbiting asteroid will once again make a temporary and partial loop around Earth.

Source: Original article

Chrome VPN Extension Found to Secretly Collect User Data

This article discusses the security risks associated with the FreeVPN.One Chrome extension, which was found to be secretly capturing users’ browsing data.

A recent report from Koi Security has raised alarms about a Chrome extension masquerading as a free VPN service. The extension, named FreeVPN.One, has over 100,000 installations and even boasts a “Featured” badge, yet it has been discovered to be capturing screenshots of users’ browsing sessions without their consent.

While browser extensions are often designed to enhance user experience, some can pose significant security threats. FreeVPN.One, once installed, did not merely facilitate VPN traffic; it secretly recorded screenshots of every website visited, including sensitive information such as bank logins, private photos, and confidential documents. These images were sent to servers controlled by the extension’s developer.

Alarmingly, the extension gradually added permissions under the guise of “AI Threat Detection,” transforming what appeared to be a helpful feature into a tool for continuous surveillance. Users typically install VPNs to safeguard their privacy, but FreeVPN.One subverted this expectation by exploiting Chrome’s permissions to gain access to every page users opened.

Koi Security’s researchers tested the extension and confirmed that it captured screenshots even on trusted platforms like Google Photos and Google Sheets. The developer claimed that these images were not stored but provided no evidence to support this assertion.

There were several warning signs regarding FreeVPN.One. While some free VPN services operate responsibly, many rely on alternative revenue streams, often involving the sale of user data. Following Koi Security’s findings, the developer offered a partial explanation, asserting that the automatic screenshot captures were part of a “background scanning” feature meant only for suspicious domains. However, the evidence of screenshots taken from reputable sites contradicted this claim.

When pressed for proof of legitimacy, such as a company profile or professional contact information, the developer ceased communication. The only public link associated with the extension led to a basic Wix starter page, raising further concerns about its credibility.

In response to the report, FreeVPN.One has been removed from the Chrome Web Store. Attempts to access its page now return a message indicating that the item is no longer available. While this removal mitigates the risk of new downloads, it underscores a troubling gap in security oversight. The extension exhibited spyware behavior for months while still maintaining a verified label, prompting questions about the thoroughness of Chrome’s review process for featured extensions.

If you have installed FreeVPN.One or any suspicious Chrome VPN extension, it is crucial to take immediate action to protect your cybersecurity. Users should navigate to Chrome, select Window, then Extensions, and remove any questionable extensions.

It is advisable to stick to reputable VPN providers that have established track records, transparent operations, and audited policies. Choosing a legitimate VPN allows users to maintain control over their privacy rather than relinquishing it to an anonymous developer. A trustworthy VPN is essential for ensuring online privacy and providing a secure, high-speed connection.

Additionally, running a reliable antivirus tool can help detect hidden malware. Strong antivirus software can alert users to phishing emails and ransomware scams, safeguarding personal information and digital assets.

Users should also consider employing a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. It is important to check whether passwords have been exposed in previous data breaches. The top password managers often include built-in breach scanners that can identify compromised passwords, prompting users to change any reused credentials.

Extensions like FreeVPN.One illustrate how easily personal information can be collected and exploited. Even after uninstalling such spyware, personal data may already be circulating on data broker sites, where it can be sold to marketers, scammers, and cybercriminals. Utilizing a personal data removal service can help scan for personal information across numerous broker sites and request its removal, limiting the potential for misuse.

Before adding any extension, it is essential to review the permissions it requests. If a VPN seeks access to “all websites,” this should raise a red flag. FreeVPN.One serves as a stark reminder that “free” services often come with hidden costs—namely, the compromise of user data. Users should remain vigilant, conduct thorough vetting, and utilize privacy tools backed by reputable companies.

In conclusion, the question remains: Would you trade your browsing privacy for a free tool, or is it time to reconsider the true cost of “free” services?

Source: Original article

Interstellar Voyager 1 Resumes Operations Following Communication Pause

NASA’s Voyager 1 has resumed communications and operations after a brief pause, reconnecting with Earth using a lower-power communication system for the first time in over 40 years.

NASA has confirmed that Voyager 1 has regained its voice and resumed regular operations following a pause in communications that occurred in late October. The interstellar spacecraft, which is currently located approximately 15.4 billion miles from Earth, unexpectedly switched off its primary radio transmitter, known as the X-band, and activated its weaker S-band transmitter.

This switch to the S-band, which had not been utilized in over four decades, was initiated by Voyager 1’s fault protection system. The system automatically activated the S-band to conserve power after engineers turned on a heater on the spacecraft. As a result, nonessential systems were powered down to ensure that critical systems remained operational.

During this period, communication between NASA and Voyager 1 became sporadic, preventing the mission team from downloading vital science data and information regarding the spacecraft’s status. The S-band transmitter, while functional, limited the team’s ability to gather comprehensive data from the spacecraft’s instruments.

Earlier this month, engineers successfully reactivated the X-band transmitter, allowing for the collection of data from the four operating science instruments onboard Voyager 1. With communications restored, the engineering team is now focused on completing several remaining tasks to return the spacecraft to its previous operational state. One of these tasks includes resetting the system that synchronizes Voyager 1’s three onboard computers.

Voyager 1’s journey began in 1977, when it, along with its twin Voyager 2, was launched on a mission to explore the gas giant planets of the solar system. The spacecraft has since transmitted stunning images of Jupiter’s Great Red Spot and Saturn’s iconic rings. Voyager 2 continued its journey to Uranus and Neptune, while Voyager 1 used Saturn’s gravity to propel itself past Pluto.

NASA has equipped both Voyager spacecraft with ten science instruments each, four of which are currently operational on Voyager 1. These instruments are being utilized to study the particles, plasma, and magnetic fields present in interstellar space.

As Voyager 1 continues its historic mission, the recent restoration of communications marks a significant milestone in the ongoing exploration of the cosmos. The spacecraft remains a testament to human ingenuity and the quest for knowledge beyond our solar system.

According to NASA, the successful reestablishment of communication with Voyager 1 highlights the resilience of the mission team and the enduring capabilities of the spacecraft.

Source: Original article

Backlash Over Mystery Company’s Data Center in Fox News AI Newsletter

Residents in Wisconsin are expressing strong opposition to a proposed $1.6 billion data center, raising concerns about its impact on the local community and environment.

The Fox News AI newsletter provides insights into the latest advancements in artificial intelligence technology, as well as the challenges and opportunities that AI presents both now and in the future.

In today’s newsletter, a significant issue has emerged in Wisconsin, where a proposed $1.6 billion data center has drawn the ire of local residents. This facility, backed by a mystery company, has sparked concerns among those living in a region celebrated for its natural beauty and outdoor recreational opportunities.

Residents are voicing their skepticism about the potential impact of the data center on their community. Many are worried about environmental degradation and the strain on local resources that such a large-scale project could entail.

In other news, artificial intelligence giant OpenAI announced that its nonprofit parent organization will maintain control of the company while securing an equity stake valued at over $100 billion. This move is seen as a significant development in the tech industry, highlighting the growing influence and financial backing of AI technologies.

Additionally, a prominent figure in the semiconductor and AI sectors has praised the Trump administration’s efforts to ensure that the United States remains a leader in artificial intelligence. This endorsement underscores the ongoing competition in the tech landscape, particularly as nations vie for dominance in AI capabilities.

In a related development, Oracle’s stock has surged, significantly increasing co-founder Larry Ellison’s net worth by tens of billions of dollars in just two days. This financial boost has positioned Ellison ahead of Tesla CEO Elon Musk as the richest person in the world, showcasing the volatility and potential for wealth creation within the tech industry.

On a more practical note, a new robot named HARR-E, developed by Oshkosh Corp., aims to revolutionize waste collection. This autonomous trash collector can be summoned to a resident’s door, offering a convenient alternative to traditional garbage collection methods.

Meanwhile, in Tarboro, North Carolina, residents are urging their town council to reject a proposal for a 50-acre, 300-megawatt Energy Storage Solutions LLC site. While the project promises to create 500 jobs and generate millions in tax revenue, community members are expressing concerns about its long-term implications for their town.

As artificial intelligence continues to infiltrate everyday life, tools such as AI notetakers are becoming commonplace in virtual meetings. Platforms like Zoom and Google Meet now offer features that record and summarize discussions. While these tools can enhance productivity, they also raise privacy concerns, as they capture comments that users may not intend to share.

President Trump’s initiative to establish “America’s global AI dominance” may face challenges from the effective altruism movement, a small but influential group that harbors a more cautious view of artificial intelligence. This emerging conflict highlights the diverse perspectives on the future of AI and its implications for society.

As the trucking industry undergoes significant transformation, artificial intelligence is enhancing efficiency and productivity across various sectors, including logistics. The integration of AI technologies is reshaping traditional practices, paving the way for a more automated future.

Stay informed about the latest advancements in AI technology and the challenges and opportunities it presents by following the Fox News AI newsletter.

Source: Original article

Shamos Malware Deceives Mac Users with Phony Fixes

A new malware campaign, Shamos, is targeting Mac users by exploiting fake troubleshooting websites to install malicious software through deceptive terminal commands.

A dangerous new malware campaign is on the rise, specifically targeting Mac users globally. Security researchers at CrowdStrike have identified Shamos, a new variant of the Atomic macOS Stealer (AMOS), developed by a cybercriminal group known as COOKIE SPIDER.

This attack employs ClickFix tactics, where victims searching for Mac troubleshooting assistance are lured to counterfeit websites or GitHub repositories. These fraudulent sites trick users into copying and pasting a one-line command into Terminal, which is purportedly meant to fix an error. Instead of resolving issues, this command silently downloads Shamos, bypassing macOS Gatekeeper protections and installing the malware.

Once installed, Shamos begins to search for sensitive information, including Apple Notes, Keychain items, browser passwords, and even cryptocurrency wallets. The stolen data is compressed and sent directly to the attackers, often alongside additional malware such as botnet modules or counterfeit Ledger wallet applications.

Cybercriminals distribute these deceptive “fixes” through malvertising campaigns and spoofed tech support websites, which often bear names like mac-safer[.]com or rescue-mac[.]com. These sites masquerade as trusted troubleshooting guides and appear prominently in search results for common Mac issues, such as “how to flush resolver cache.”

Victims are encouraged to copy and paste commands that download malicious Bash scripts. These scripts can capture the user’s password, remove file protections, and launch Shamos. With persistence tools in place, the malware can even restart alongside the system, maintaining control long after the initial infection.

To avoid falling victim to Shamos and similar threats, users should take proactive measures. While copy-pasting commands into Terminal may seem like a quick fix, it is also one of the easiest ways for attackers to circumvent Apple’s built-in protections. If you encounter a command on a website, forum, or GitHub repository, do not execute it unless you fully understand its function. Instead, verify the command with Apple’s official support site or the Apple Community forums, where experienced users and moderators can confirm safe troubleshooting steps.

Hackers are aware that when a Mac experiences issues, users often seek quick solutions. This urgency is exploited through sponsored ads that push fake troubleshooting websites higher in search results. Clicking on the top link may seem natural, but it could lead to a trap. It is advisable to stick with trusted sources like Apple Support or scroll past the ads to locate legitimate guides.

While GitHub is a valuable resource for developers, it has also become a hotspot for malicious repositories that mimic legitimate software. Attackers frequently clone popular applications or tools, embedding malware within them. Before downloading anything, users should check the publisher’s name, the number of stars, and the activity history. If the account appears suspicious, inactive, or newly created, it is best to avoid it.

Mac malware is evolving rapidly, and Apple’s built-in security features cannot catch everything. Utilizing a robust antivirus solution adds another layer of defense by scanning downloads, blocking malicious scripts, and detecting suspicious behavior in real time. Some security tools can even identify the one-line Terminal commands used by Shamos before they can inflict damage.

As Shamos is designed to steal personal information and transmit it to cybercriminals, reducing your online footprint can help mitigate the potential fallout. A personal data removal service can scan data broker sites and eliminate your exposed information, making it more difficult for attackers to resell or exploit it following a breach. Although this measure won’t prevent malware from stealing data already on your Mac, it does provide an additional layer of protection by minimizing the data available for criminals to use against you.

Apple regularly patches vulnerabilities in macOS that malware attempts to exploit. Keeping your system updated is crucial for closing the doors that attackers rely on. Enabling automatic updates ensures that your Mac receives the latest patches as soon as they become available. Coupled with good digital hygiene, such as avoiding dubious downloads, this practice significantly lowers the risk of infection.

Cybercriminals understand that when a Mac malfunctions, users are likely to seek immediate solutions. Shamos capitalizes on this urgency by disguising itself as helpful assistance. Staying safe requires users to slow down before copying, pasting, or downloading anything. If something seems off, it probably is.

Should Apple be doing more to protect Mac users from evolving threats like Shamos? Share your thoughts by reaching out to us at Cyberguy.com/Contact.

Source: Original article

NASA Finalizes Strategy for Sustaining Human Presence in Space

NASA has finalized its strategy for maintaining a human presence in space, focusing on the transition from the International Space Station to future commercial platforms.

NASA has finalized its strategy for sustaining a human presence in space, outlining plans as the International Space Station (ISS) approaches its planned de-orbiting in 2030. This strategy emphasizes the necessity of enabling extended stays in orbit beyond the ISS’s operational life.

The newly released document, titled “NASA’s Low Earth Orbit Microgravity Strategy,” aims to guide the agency toward establishing a new era of continuous human presence in low Earth orbit. It also highlights the potential for economic growth and the importance of maintaining international partnerships in space exploration.

This commitment comes amid uncertainties regarding the readiness of upcoming commercial space stations to replace the ISS. With the recent efforts by the Trump administration to reduce spending through the Department of Government Efficiency, there are concerns that NASA may face budget cuts that could impact its operations.

“Just like everybody has to make hard decisions when the budget is tight, we’ve made some choices over the last year to cut back programs or cancel them altogether to ensure that we’re focused on our highest priorities,” said NASA Deputy Administrator Pam Melroy.

Commercial space company Voyager is actively developing one of the potential replacements for the ISS. Jeffrey Manber, Voyager’s president of international and space stations, expressed support for NASA’s strategy, emphasizing the need for a clear commitment from the U.S. government to reassure investors. “We need that commitment because we have our investors saying, ‘Is the United States committed?’” he stated.

The initiative to maintain a human presence in space dates back to President Reagan, who first launched the effort for a permanent residence in space. In his 1984 State of the Union address, he underscored the importance of private partnerships, stating, “America has always been greatest when we dared to be great. We can reach for greatness.” He also noted that the market for space transportation could exceed the nation’s capacity to develop it.

Since the launch of the first ISS module in 1998, the station has hosted over 28 astronauts from 23 countries, maintaining a continuous human presence in space for 24 years. The Trump administration’s national space policy, released in 2020, called for a “continuous human presence in Earth orbit” and emphasized the transition to commercial platforms, a policy that the Biden administration has continued to uphold.

In June, NASA Administrator Bill Nelson discussed the potential for extending the ISS’s operational life if commercial stations are not ready by the time the ISS is scheduled to de-orbit. “Let’s say we didn’t have commercial stations that are ready to go. Technically, we could keep the space station going, but the idea was to fly it through 2030 and de-orbit it in 2031,” he explained.

Recent discussions have raised questions about the definition of “continuous human presence.” Melroy addressed these concerns at the International Astronautical Congress in October, stating, “I just want to talk about the elephant in the room for a moment, continuous human presence. What does that mean? Is it continuous heartbeat or continuous capability?” She noted that while there were hopes for a seamless transition, ongoing conversations were necessary to clarify the concept.

NASA’s finalized strategy reflects the concerns of commercial and international partners regarding the potential loss of the ISS without a ready commercial alternative. “Almost all of our industry partners agreed. Continuous presence is continuous heartbeat. And so that’s where we stand,” Melroy affirmed. She emphasized that the U.S. leads in human spaceflight, and without a commercial destination, the only other space station in orbit after the ISS de-orbits would be the Chinese space station.

Three companies, including Voyager, are collaborating with NASA to develop commercial space stations. Axiom signed an agreement with NASA in 2020, while contracts were awarded to Nanoracks, now part of Voyager Space, and Blue Origin in 2021.

Melroy acknowledged the challenges posed by budget caps resulting from agreements between the White House and Congress for fiscal years 2024 and 2025. However, she expressed optimism about the potential for a commercial space station to be operational by the end of 2030, ensuring a continuous presence of American astronauts in orbit. “I think we’re still able to make it happen before the end of 2030,” she said.

Voyager remains confident in its development timeline, planning to launch its starship space station by 2028. Manber stated, “We’re not asking for more money. We’re going ahead. We’re ready to replace the International Space Station.” He highlighted the importance of maintaining a permanent presence in space, warning that losing it could disrupt the supply chain that supports the burgeoning space economy.

Additional funding has been allocated to the three companies since the initial contracts for space station development. A second round of funding could be critical for advancing some projects, and NASA may also consider new proposals for space stations. One such prospect is Vast Space, based in Long Beach, California, which recently unveiled concepts for its Haven modules and plans to launch the Haven-1 as early as next year.

Melroy emphasized the importance of competition in the development of commercial space stations, stating, “We absolutely think competition is critical. This is a development project. It’s challenging. It was hard to build the space station. We’re asking our commercial partners to step up and do this themselves with some help from us.” She reiterated the agency’s commitment to exploring multiple options to identify the most viable solutions for the future of human presence in space.

Source: Original article

Orbiter Photos Reveal Lunar Modules from First Two Moon Landings

Recent aerial images from India’s Chandrayaan 2 orbiter reveal the Apollo 11 and Apollo 12 lunar landing sites more than 50 years after the historic missions.

Photos captured by the Indian Space Research Organization’s moon orbiter, Chandrayaan 2, provide a stunning view of the Apollo 11 and Apollo 12 landing sites over half a century after these groundbreaking missions. The images, taken in April 2021, were recently shared on the Curiosity page on X, a platform dedicated to space exploration.

In a post accompanying the images, Curiosity stated, “Image of Apollo 11 and 12 taken by India’s Moon orbiter. Disapproving Moon landing deniers,” highlighting the significance of the photos in affirming the historic lunar landings.

Apollo 11, which landed on the moon on July 20, 1969, marked a monumental achievement in human history, with astronauts Neil Armstrong and Buzz Aldrin becoming the first men to walk on the lunar surface. Their colleague, astronaut Michael Collins, remained in lunar orbit during their historic excursion.

The lunar module, known as Eagle, was left in lunar orbit after it successfully rendezvoused with Collins’ command module the following day. Eagle eventually returned to the moon’s surface, where it remains today.

Apollo 12 followed as NASA’s second crewed mission to land on the moon, occurring on November 19, 1969. Astronauts Charles “Pete” Conrad and Alan Bean became the third and fourth men to walk on the moon during this mission.

The Apollo program continued until December 1972, concluding with astronaut Eugene Cernan, who became the last person to walk on the moon. The legacy of these missions continues to inspire space exploration efforts today.

The Chandrayaan-2 mission, which launched on July 22, 2019, coincided with the 50th anniversary of the Apollo 11 mission. It captured the images of the 1969 lunar landers two years later, furthering our understanding of the moon’s surface.

In addition to Chandrayaan 2, India launched Chandrayaan 3 last year, achieving a historic milestone as the first mission to successfully land near the moon’s south pole. This accomplishment underscores India’s growing capabilities in space exploration.

As we continue to explore the cosmos, the images from Chandrayaan 2 serve as a reminder of humanity’s achievements in space and the enduring legacy of the Apollo missions.

Source: Original article

Newly Discovered Asteroid Identified as Tesla Roadster in Space

Astronomers recently misidentified Elon Musk’s Tesla Roadster, launched into space in 2018, as an asteroid before correcting the mistake just a day later.

A curious case of mistaken identity unfolded earlier this month when astronomers confused a Tesla Roadster, launched into orbit by SpaceX in 2018, for an asteroid. The incident highlights the complexities of tracking artificial objects in space.

Elon Musk’s Tesla Roadster was sent into orbit during the maiden flight of SpaceX’s Falcon Heavy rocket in February 2018. The vehicle was intended to enter an elliptical orbit around the sun, extending slightly beyond Mars before returning toward Earth. However, it appears that the roadster has exceeded the orbit of Mars and ventured into the asteroid belt.

On January 2, 2023, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics registered the object as 2018 CN41. Just a day later, they deleted the entry after realizing that the object in question was, in fact, Musk’s roadster. The center announced on its website that the registry for 2018 CN41 was removed after it was determined that the orbit matched that of an artificial object, specifically the Falcon Heavy upper stage carrying the Tesla Roadster.

The Minor Planet Center stated, “The designation 2018 CN41 is being deleted and will be listed as omitted.” This quick correction underscores the challenges astronomers face when tracking unmonitored objects in space.

At the time of the misidentification, the roadster was located less than 150,000 miles from Earth, which is closer than the moon’s orbit. This proximity raised concerns among astronomers about the need to monitor such objects, as they could pose risks if their trajectories change.

Astrophysicist Jonathan McDowell from the Center for Astrophysics commented on the implications of the error, noting, “Worst case, you spend a billion launching a space probe to study an asteroid and only realize it’s not an asteroid when you get there.” His remarks highlight the potential consequences of misidentifying celestial objects.

The Tesla Roadster, equipped with a mannequin named “Starman” in the driver’s seat, has become a symbol of SpaceX’s innovative spirit and Musk’s penchant for blending technology with entertainment. As it continues its journey through space, the roadster serves as a reminder of the intersection between human ingenuity and the vastness of the cosmos.

As the field of astronomy evolves, the need for improved tracking systems for both natural and artificial objects in space becomes increasingly critical. The recent incident serves as a wake-up call for astronomers and space agencies to enhance their monitoring capabilities to avoid similar mix-ups in the future.

Fox News Digital has reached out to SpaceX for further comment regarding the incident.

Source: Original article

FBI Issues Warning About QR Code Scam in Mystery Packages

Federal authorities warn that scammers are sending unexpected packages containing QR codes that can lead to identity theft and malware, exploiting curiosity to trick victims into revealing personal information.

Scammers are increasingly using QR codes in a new scheme that involves sending unexpected packages to unsuspecting individuals. These packages contain QR codes that, when scanned, can redirect victims to fraudulent websites or download malicious software designed to steal sensitive information.

Once considered a convenient tool for checking menus or making payments, QR codes have now become a weapon in the hands of criminals. The latest warning from federal authorities highlights the extent of these tactics, which include fake delivery texts, counterfeit payment links, and malicious codes that replace legitimate ones.

In this latest scam, criminals send packages that recipients never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts, or malware that operates silently in the background of a victim’s phone.

The FBI has issued a public notice regarding this scam, stating, “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone.” The agency notes that scammers often ship these packages without sender information to entice victims into scanning the QR code.

This scheme is a variation of what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipients’ details to post fake reviews. While brushing scams were more of a nuisance, this new approach has escalated to deliberate fraud. Instead of receiving a product, victims often find only a printed QR code that leads to fraudulent websites asking for sensitive personal information, such as banking details, credit card numbers, or login credentials.

Some QR codes go even further, installing malicious software that can track activity and steal data directly from the device. The consequences of falling victim to such scams can be severe, as fake websites may harvest names, addresses, and financial details, while malware can monitor accounts, log keystrokes, or even target cryptocurrency wallets. Often, victims do not realize they have been compromised until they notice unauthorized charges or suspicious withdrawals, by which time their information may already be in the hands of criminals.

Scammers exploit curiosity and convenience to trick individuals into scanning malicious QR codes. To avoid becoming a target, it is essential to adopt a few simple habits. First, avoid scanning QR codes from mystery deliveries, random flyers, or stickers on public signs. A QR code is essentially a disguised link, and until you know where it leads, it should not be trusted.

Even if you accidentally scan a risky code, keeping strong antivirus software on your phone can help. Mobile security apps can block fraudulent sites, warn you before downloads, and protect against malicious QR code attacks. It is also advisable to scan QR codes only from businesses and organizations you already trust, such as your bank’s mobile app or a known retailer’s checkout page.

Most smartphones allow users to press and hold a QR code link to preview where it leads. If the URL appears suspicious—featuring misspellings, random numbers, or shortened links—do not open it. Taking a moment to check can save you from falling into a phishing trap.

Additionally, the less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. While no service can guarantee the removal of all your data from the internet, utilizing a removal service can help you monitor and automate the process of eliminating your information from numerous sites over time.

Even if your login details are compromised, two-factor authentication (2FA) can make it more difficult for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA adds an extra layer of security to your banking, email, and trading accounts.

Regular software updates are also crucial, as they often contain fixes for security vulnerabilities that scammers may exploit. Keeping your phone’s operating system and apps up to date provides stronger protection against malware that can be delivered through malicious QR codes.

If you receive an unexpected package containing a QR code, do not simply discard it. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting these incidents not only helps protect you but also provides law enforcement with valuable information to track the spread of these scams.

While this scam may not be widespread yet, it illustrates how quickly criminals can adapt to new technology. QR codes were intended to simplify life, and they often do, but that convenience can become a vulnerability when curiosity overrides caution. The key takeaway is that a mystery package with a QR code is not a fun puzzle to solve; it is a red flag. The safest course of action is to resist the urge to scan and report any suspicious packages instead.

Source: Original article

Mars’ Red Color Linked to Potentially Habitable Past, Study Finds

Mars’ red color may be linked to its potentially habitable past, according to a new study that identifies ferrihydrite as a key mineral responsible for the planet’s distinctive hue.

A recent study suggests that the reddish hue of Mars is primarily due to a mineral known as ferrihydrite, which forms in the presence of cool water. This finding indicates that Mars may have once had conditions suitable for sustaining liquid water before transitioning to its current dry state billions of years ago.

The research, published in the journal Nature Communications, was partially funded by NASA. It draws on data collected from various Mars missions, including information from several rovers. The study’s authors compared these findings with laboratory experiments that simulated Martian conditions, examining how light interacts with ferrihydrite particles and other minerals.

Adam Valantinas, the lead author of the study and a postdoctoral fellow at Brown University, noted that the question of why Mars is red has intrigued scientists for centuries. “From our analysis, we believe ferrihydrite is everywhere in the dust and also probably in the rock formations,” he stated. Valantinas began this research during his Ph.D. studies at the University of Bern in Switzerland.

While ferrihydrite has been previously considered as a contributor to Mars’ color, this study provides a more robust framework for testing the hypothesis using both observational data and innovative laboratory techniques. “We can essentially make Martian dust in the lab,” Valantinas explained.

Jack Mustard, the study’s senior author and a professor at Brown University, described the research as a “door-opening opportunity.” He emphasized the importance of the ongoing sample collection by the Perseverance rover, which will allow scientists to verify their findings once the samples are returned to Earth. “When we get those back, we can actually check and see if this is right,” Mustard said.

The study’s findings suggest that Mars had a cool, wet, and potentially habitable climate in its ancient past. Although the planet’s current atmosphere is too cold to support life, evidence points to an abundance of water existing billions of years ago, as indicated by the presence of ferrihydrite in Martian dust.

Geronimo Villanueva, Associate Director for Strategic Science of the Solar System Exploration Division at NASA’s Goddard Space Flight Center and a co-author of the study, remarked on the significance of the research. “These new findings point to a potentially habitable past for Mars and highlight the value of coordinated research between NASA and its international partners when exploring fundamental questions about our solar system and the future of space exploration,” he said.

Valantinas added that the researchers aim to deepen their understanding of the ancient Martian climate and the chemical processes occurring both in the past and present. He emphasized the importance of understanding the conditions that existed during the formation of ferrihydrite to address the habitability question: “Was there ever life?”

To answer this question, scientists need to investigate the environmental conditions that allowed for the reaction of oxygen with iron and water, which were markedly different from today’s dry and cold Martian environment. As winds on Mars spread this dust across the planet, they contributed to its iconic red appearance.

This research not only sheds light on Mars’ geological history but also enhances our understanding of the planet’s potential for past life, paving the way for future explorations and studies.

Source: Original article

Private Lunar Lander Blue Ghost Successfully Lands on Moon for NASA

A private lunar lander, Blue Ghost, successfully landed on the moon on Sunday, delivering equipment for NASA and marking a significant milestone for private space exploration.

A private lunar lander carrying equipment for NASA successfully touched down on the moon on Sunday, marking a significant achievement in the realm of commercial space exploration. The landing was confirmed by the company’s Mission Control based in Texas.

Firefly Aerospace’s Blue Ghost lander descended from lunar orbit on autopilot, targeting the slopes of an ancient volcanic dome located in an impact basin on the moon’s northeastern edge. The successful landing was celebrated by the team at Firefly, as it made them the first private company to successfully place a spacecraft on the moon without crashing or tipping over.

“You all stuck the landing. We’re on the moon,” said Will Coogan, chief engineer for the lander, as he announced the successful touchdown.

The Blue Ghost lander, named after a rare species of firefly found in the United States, stands 6 feet 6 inches tall and spans 11 feet wide. Its design features four legs, which provide enhanced stability during landing. This successful mission is particularly noteworthy, as only five countries—Russia, the United States, China, India, and Japan—have previously achieved successful lunar landings.

Approximately half an hour after landing, Blue Ghost began transmitting images from the lunar surface. The first photo released was a selfie of the lander, though it was somewhat obscured by the sun’s glare.

In addition to Firefly Aerospace, two other companies are preparing to launch their lunar landers, with the next mission anticipated to join Blue Ghost on the moon later this week. This surge in private lunar exploration underscores a growing interest in commercial opportunities on Earth’s natural satellite, particularly in anticipation of future astronaut missions.

The successful landing of Blue Ghost is a pivotal moment for Firefly Aerospace and the broader private space industry, showcasing the potential for commercial entities to contribute to lunar exploration and scientific research.

According to the Associated Press, the advancements made by private companies in space exploration could pave the way for more ambitious missions in the future.

Source: Original article

New AI Applications Assist Rental Drivers in Avoiding Damage Fees

Rental car drivers are increasingly using AI-powered apps to safeguard against unjust damage fees as major companies implement automated vehicle inspection tools.

Rental car drivers are turning to artificial intelligence to shield themselves from unexpected damage fees. Major rental companies, including Hertz and Sixt, have adopted automated inspection tools designed to identify scratches and dents. While these technologies promise efficiency, they have drawn criticism from renters who claim they have been unfairly charged for minor imperfections.

In response to these concerns, new consumer-focused applications are emerging to help level the playing field. One such app, Proofr, recently launched to empower renters by enabling them to create secure, time-stamped before-and-after photos of their vehicles. The app employs AI technology to detect even the most subtle changes, encrypting and storing the images to prevent alterations.

Founded by 21-year-old college student Eric Kuttner, Proofr aims to assist drivers in generating tamper-proof evidence when renting a car. The app secures each scan with geotags and timestamps, while its AI functionality automatically flags potential damage or alterations. This information is then organized into smart, exportable reports, providing renters with substantial leverage against unjust claims.

Proofr simplifies the documentation process, allowing users to compile a detailed before-and-after report in under a minute with just eight quick scans. Additionally, users can instantly generate polished PDF reports, which can be beneficial when dealing with rental agencies, landlords, or insurance claims. While the primary focus of the app is on car rentals, it is also utilized for documenting Airbnbs, eBay listings, moving into new apartments, and even safeguarding valuable possessions. Approximately 85% of users rely on Proofr for car rentals, while the remaining 15% use it for vacation homes.

By combining secure evidence with AI-powered detection, Proofr positions itself as an essential travel tool. Beyond convenience, it has the potential to save travelers significant amounts of money by preventing hidden fees and providing a counterbalance to large rental agencies.

The app is free to download, but full features require a Pro subscription, which costs $2.89 weekly, $9.90 monthly, or $89.90 annually. Pricing is standardized in the United States, with Apple automatically adjusting it for local currencies, taxes, and exchange rates in other countries.

Proofr is not the only app in this space. Ravin AI, which initially collaborated with Avis and Hertz, has shifted its focus toward insurers and dealerships. However, it still offers a free demo on its website, allowing drivers to scan vehicles and compare damage before and after rentals. Ravin’s system has been trained on two billion images over the past decade, but like Proofr, it is not without its flaws. Testers have reported missed paint chips and false positives caused by reflections. Both companies acknowledge that lighting, angles, and photo quality remain ongoing challenges.

This frustration arises as rental agencies increasingly implement AI inspection systems from firms such as UVeye and ProovStation. For instance, Sixt has already installed ProovStation’s AI-powered scanners at several U.S. airport locations, including Fort Lauderdale, Atlanta, Charlotte, Miami, and Maui, with plans for additional installations in Orlando, Washington, and Nashville. These scanners automatically photograph vehicles at the beginning and end of each rental, comparing images to flag potential damage, which is then reviewed by staff before any claims are issued.

Critics argue that these automated tools can turn minor scratches into profit sources. Some even highlight ProovStation’s marketing, which describes routine inspections as “gold mines of untapped opportunities.” Industry experts emphasize that rental companies should only pursue claims for significant damage and refrain from charging exorbitant fees for minor scuffs.

For frequent renters, AI is already influencing their experiences. Rental companies are utilizing automated inspections to justify new charges, sometimes for barely visible marks. Apps like Proofr and Ravin provide similar technology, but from the renter’s perspective. By scanning their vehicle before and after a rental, users create a digital record that can help them contest unfair claims.

The rental car industry is undergoing a technological transformation. What was once a quick inspection by an employee is now a machine-driven process capable of generating steep charges. Consumer apps not only enhance transparency but also underscore the pressing need for fairness in damage claims.

Would you trust an AI app to protect you from rental car fees, or do you believe rental companies should revise their policies first? Share your thoughts with us at Cyberguy.com/Contact.

Source: Original article

Columbia University Data Breach Affects 870,000 Individuals

Columbia University has confirmed a significant data breach affecting nearly 869,000 individuals, exposing sensitive personal information, including Social Security numbers and academic records.

Columbia University has recently disclosed a major cyberattack that has compromised the personal, financial, and health-related information of approximately 869,000 individuals, including current and former students, employees, and applicants. Notifications to those affected began on August 7 and are ongoing.

The breach was discovered following a network outage in June, which Columbia attributed to unauthorized access by an external party. Investigators are currently assessing the full extent of the data theft, which reportedly includes about 460 gigabytes of sensitive information.

According to a breach notification filed with the Maine Attorney General’s office, the compromised data encompasses admissions, enrollment, and financial aid records, as well as certain employee information. However, Columbia has confirmed that patient records from the Columbia University Irving Medical Center were not affected by this breach.

The university has taken steps to report the incident to law enforcement and is collaborating with cybersecurity experts to address the situation. In response to the breach, Columbia has implemented new safeguards and enhanced protocols to prevent similar incidents in the future.

As part of its response, Columbia began mailing letters to affected individuals, offering two years of complimentary credit monitoring, fraud consultation, and identity theft restoration services. While the university has stated that there is currently no evidence of misuse of the stolen data, the risk of identity theft and fraud remains a significant concern, as criminals often exploit stolen information months after a breach.

Individuals affected by the breach are encouraged to take proactive measures to safeguard their personal information. Regularly checking credit reports through AnnualCreditReport.com can help identify unauthorized accounts or changes. Additionally, using personal data removal services can assist in scrubbing information from data brokers and people search sites, making it more difficult for criminals to exploit exposed details.

While no service can guarantee complete removal of personal data from the internet, utilizing a data removal service can be a prudent choice. These services actively monitor and systematically erase personal information from various websites, reducing the risk of identity theft.

In addition to these measures, placing a fraud alert on credit reports can make it more challenging for identity thieves to open accounts in an individual’s name. A credit freeze offers even stronger protection by blocking new credit applications altogether.

Creating long, complex passwords for each account is another essential step in protecting personal information. A password manager can assist in generating and securely storing these passwords. Furthermore, individuals should check if their email addresses have been exposed in past breaches, as many password managers include breach scanners to alert users of potential vulnerabilities.

Turning on two-factor authentication (2FA) wherever possible adds an extra layer of security to accounts, helping to protect them even if a password is compromised. It is also crucial to be vigilant against potential scams that may arise in the wake of the breach, as criminals often exploit fear to target victims with fraudulent emails or texts.

To protect against malicious links that could install malware, individuals should ensure they have strong antivirus software installed on all devices. This software can help detect phishing emails and ransomware scams, safeguarding personal information and digital assets.

Beyond the free credit monitoring services offered by Columbia, additional paid services can help track personal data across the dark web and provide extra safeguards. Identity theft protection companies can monitor sensitive information, such as Social Security numbers and email addresses, alerting users if their information is being sold or used fraudulently.

The breach at Columbia University underscores the vulnerability of even trusted institutions to cyberattacks. As the investigation continues and notifications are expected to roll out through the fall, individuals are advised to remain vigilant and proactive in protecting their personal information.

As discussions around data security continue, questions arise regarding what further measures universities and large institutions should implement to safeguard the personal data of those who place their trust in them.

Source: Original article

Athena Lunar Lander Reaches Moon; Condition Still Uncertain

Athena lunar lander successfully reached the moon, but its condition and landing location remain uncertain, according to mission controllers.

Mission controllers have confirmed that the Athena lunar lander has successfully touched down on the moon. However, they are currently unable to determine the spacecraft’s condition following its landing.

The lander, which is operated by Intuitive Machines, made its descent earlier on Thursday. Despite the successful touchdown, ground controllers have not been able to ascertain the status of Athena or the precise location of its landing site. According to reports from the Associated Press, the lander was equipped with an ice drill, a drone, and two rovers.

Officials indicated that Athena was able to establish some communication with its controllers, although details about its condition remain unclear. Mission director and co-founder Tim Crain was heard instructing the team to “keep working on the problem,” even as the craft appeared to send “acknowledgments” back to the team based in Texas.

The uncertainty surrounding Athena’s status comes on the heels of a successful lunar landing by another private company. Firefly Aerospace’s Blue Ghost successfully landed on the moon on Sunday, marking a significant achievement as it became the first private company to deploy a spacecraft on the lunar surface without it crashing or landing sideways.

NASA and Intuitive Machines concluded their online live stream shortly after Athena’s landing and announced plans to hold a news conference later on Thursday to provide updates on the lander’s status.

This week has been notable for lunar exploration, with Athena being the second craft to land on the moon in just a few days. Last year, Intuitive Machines faced challenges when its Odysseus lander landed sideways, which has added pressure to the current mission.

As the situation develops, the space community eagerly awaits further information regarding Athena’s condition and the implications of its landing.

Source: Original article

IIT Professor Recognized in TIME’s Top 100 AI Innovators List

Mitesh Khapra, an associate professor at IIT Madras, has been named to TIME magazine’s 2025 list of the 100 most influential people in artificial intelligence for his contributions to language technology.

NEW DELHI – Mitesh Khapra, an associate professor at the Indian Institute of Technology (IIT) Madras, has earned a spot on TIME magazine’s 2025 list of the 100 most influential people in artificial intelligence. His recognition places him alongside prominent figures such as Elon Musk and Sam Altman, but it is his unique focus on academic research that sets him apart.

Khapra’s work primarily revolves around natural language processing and machine learning, particularly as they pertain to India’s diverse linguistic landscape. As a co-founder of the AI4Bharat initiative, he has played a pivotal role in developing open-source tools and datasets that have become essential for a thriving ecosystem of startups focused on voice technology for local languages.

His commitment to making artificial intelligence accessible across India’s myriad languages is evident in his research efforts. Recognizing that many Western AI models do not adequately address the needs of underrepresented languages, Khapra’s lab embarked on an ambitious project. Researchers traveled to nearly 500 of India’s 700 districts to record thousands of hours of speech, resulting in a comprehensive dataset that encompasses all 22 official languages of the country.

This extensive data collection has not only supported startups but has also aligned with the Indian government’s ‘Bhashini’ mission. This initiative aims to provide digital services in local languages through AI, making technology more inclusive. The open-source datasets generated by Khapra’s team are also utilized by major global tech companies to enhance their AI models for Indian languages, including Hindi and Marathi.

Khapra has observed a significant shift in India’s academic landscape as a result of his work. “Fifteen years ago, an average PhD student in India working on language technology would mostly focus on English-related problems,” he noted. “But now, with the availability of these datasets, I see a shift; Indian students are increasingly working on challenges specific to Indian languages.”

His contributions to the field of AI and language technology are not only shaping the future of artificial intelligence in India but are also fostering a new generation of researchers dedicated to addressing the unique linguistic challenges of the country.

As Khapra continues to innovate and inspire, his recognition by TIME serves as a testament to the importance of inclusivity in technology and the potential for AI to bridge linguistic divides.

Source: Original article

Notorious People Search Site Resurfaces Following Major Data Breach

The notorious people search site National Public Data has relaunched under new ownership after a massive data breach that exposed the personal information of 3 billion individuals, raising significant privacy concerns.

National Public Data (NPD), a controversial people search site, has made its return to the internet despite a previous breach that affected the personal information of 3 billion individuals. The site’s relaunch has reignited concerns about privacy and data security.

More than a year ago, NPD gained notoriety for one of the largest data breaches in history, which led to the exposure of sensitive information belonging to billions. Following its disappearance from the web, the site has resurfaced under new ownership, specifically Perfect Privacy LLC. It is important to note that this company is not affiliated with the VPN service of the same name.

Despite the change in ownership, the business model of NPD remains unchanged. The site continues to allow users to search for personal data about friends, relatives, or even strangers using just a name. This functionality raises ongoing concerns about how such data can be misused, particularly in contexts like employment, housing, or credit decisions.

NPD claims that the information it provides comes from various sources, including public records, property ownership databases, social media, and government agencies. The company asserts that it verifies and filters this data to ensure accuracy and currency. However, users may still encounter inaccuracies, as a quick test search revealed a mix of outdated and correct information. The site appeared to struggle with hyphenated names but successfully retrieved accurate details in other instances.

Attempts to reach NPD for comment went unanswered before the deadline for this article.

For individuals who prefer not to have their information accessible on NPD’s platform, there is an option to request removal. However, each profile requires a separate request and confirmation email. After submitting a request, users should follow up in a few days to ensure their data has been removed. A helpful tip is to use an alias or disposable email address for these requests, making it easier to track confirmations and keep the main inbox uncluttered.

Removing personal information from NPD is just the beginning of the privacy battle. Numerous other people search sites may still display personal details, as many of these platforms draw from the same public databases. Consequently, addresses, phone numbers, and relatives’ names can continue to resurface online.

The return of NPD serves as a stark reminder of how quickly data can reappear on the internet. While a breach may fade from public attention, the exposed information often remains accessible. To safeguard privacy, individuals need a comprehensive strategy. Regularly searching for one’s name on various people search engines is advisable, as it helps identify new profiles before they proliferate.

In addition to NPD, other sites such as Whitepages, Spokeo, and Radaris often host similar data. Conducting periodic checks can help users stay informed about their online presence.

For those seeking a more efficient approach, data removal services can scan multiple databases simultaneously. These services request opt-outs on behalf of users and monitor for new listings. While no service can guarantee complete removal of personal data from the internet, employing a data removal service can be a prudent choice. Such services actively work to erase personal information from numerous websites, providing peace of mind and reducing the risk of scammers accessing data from breaches.

In addition to removing profiles, individuals should remain vigilant about monitoring their bank statements, credit reports, and online accounts. Exposed data can be exploited for phishing attempts, fraudulent loan applications, or identity theft. Staying alert to suspicious activity can provide early warnings of potential issues.

To further protect against malicious links that could install malware and compromise personal information, it is essential to have robust antivirus software installed on all devices. This software can also alert users to phishing emails and ransomware scams, safeguarding personal information and digital assets.

Setting up alerts for identity theft is another proactive measure. Many banks and credit monitoring services allow users to create alerts for suspicious activity. Additionally, individuals can establish free fraud alerts with credit bureaus, prompting lenders to take extra steps to verify identity before issuing new credit.

People search sites frequently pull records from government databases. Therefore, reviewing local county property, court, or voter registration records can be beneficial. Some jurisdictions permit requests for redactions or limitations on what is displayed online. Furthermore, tightening privacy settings on social media platforms can help limit what strangers can see, reducing the amount of public information available for collection.

The resurgence of National Public Data highlights the ongoing challenge of protecting personal information in an increasingly digital world. Even if individuals successfully remove their data from one site, numerous others may still retain their details. Consequently, safeguarding privacy requires more than a simple opt-out; it necessitates regular monitoring, credit freezes, and enhanced account vigilance to stay ahead of potential threats.

As the conversation around data privacy continues, individuals are left to ponder whether stronger laws should be enacted to prevent companies from collecting and selling personal data or if the responsibility lies solely with individuals to protect themselves.

Source: Original article

Addressing Home Wi-Fi Security Risks Before Connecting Is Essential

Ensuring the security of your home Wi-Fi network is crucial for protecting personal and professional information from potential cyber threats.

Home Wi-Fi networks serve as the backbone for internet connectivity in most households, linking laptops, smartphones, smart TVs, and various other devices. When properly secured, these networks provide a convenient and private means to browse the internet, stream content, and work remotely. However, the term “private” does not always equate to “safe.” Wi-Fi security can be easily compromised if settings are weak or equipment is outdated.

A recent inquiry from Carol in Smithtown, New York, highlights a common concern: “Is it safe to browse the internet on your own laptop using only your home Wi-Fi?” This question underscores a broader issue; many individuals rely on their home networks daily without fully understanding their security status.

To ensure your home Wi-Fi network is secure, it is essential to understand the risks involved and implement protective measures. Your home Wi-Fi is not merely a gateway to the internet; it is a portal to your personal and professional life. Activities such as online banking, work emails, and video calls traverse this network. If security is lacking, sensitive information could be intercepted or exposed.

One prevalent misconception is that a home network is inherently safe due to its private nature. In reality, hackers often target residential networks, which typically have weaker defenses compared to corporate networks. A nearby individual could connect to your network if your password is weak or your encryption is outdated. This not only slows down your internet speed but also allows unauthorized users to exploit your connection for illegal activities. If compromised, sensitive information like passwords, credit card numbers, and personal documents could be intercepted.

Insecure networks can also serve as conduits for malicious software to infiltrate your devices, often without your knowledge. Smart devices, including security cameras, thermostats, and speakers, can be hijacked and used for spying or as part of larger cyberattacks. Even if you trust everyone in your household, your network remains vulnerable to external threats. With the increasing number of connected devices today—ranging from laptops and phones to tablets, TVs, and IoT gadgets—there are more entry points for attackers than ever before. Securing your Wi-Fi effectively closes these vulnerabilities.

The foundation of Wi-Fi security ultimately lies in your router, which acts as the gatekeeper for your entire home network. An old, poorly configured router lacking important updates can undermine even the strongest passwords and best digital habits. Investing in a reliable router is one of the most critical steps you can take to enhance your home Wi-Fi security. A modern, well-supported router offers stronger encryption, better control over connected devices, and regular updates that address security flaws.

It is also vital to check for firmware updates from the manufacturer regularly. While some newer routers update automatically, many require manual intervention to install patches. Outdated firmware can leave known vulnerabilities exposed.

Another essential step is to change the default login password for your router immediately. Most routers come with basic credentials like “admin/admin,” which are widely known and can easily be exploited by attackers. If your router supports it, enabling two-factor authentication (2FA) for logins adds an extra layer of security, making it significantly harder for attackers to gain control even if they manage to steal your password.

Encryption is crucial for ensuring that data transmitted across your network is scrambled, rendering it useless to anyone attempting to intercept it. The current gold standard for Wi-Fi encryption is WPA3, which provides the strongest protection. If your router does not support WPA3, WPA2 remains a safe and widely used option. It is advisable to log into your router’s settings to confirm the level of encryption your network is utilizing.

Your Wi-Fi password acts as the digital key to your home. A short or easily guessable password is akin to leaving a spare key under the doormat, making it accessible to anyone determined enough to find it. Instead, create a long passphrase that combines upper and lowercase letters, numbers, and symbols, aiming for at least 12 to 16 characters. Consider using a password manager to generate and store complex passwords securely.

In addition to a robust password, regularly checking which devices are connected to your network is wise. Most routers allow you to view a list of active devices. If you notice anything unfamiliar, investigate further; it could be a neighbor using your connection or, in the worst-case scenario, an intruder.

Disabling Wi-Fi Protected Setup (WPS) is another precautionary measure. While this feature was designed to simplify connecting new devices, it has security vulnerabilities that attackers can exploit. Some users opt to enable MAC address filtering, which restricts access to specific devices. To further reduce risk, consider setting up a separate guest network for smart devices and visitors. This way, if one device is compromised, your laptops and phones remain secure.

It is also crucial to keep all connected devices updated. From laptops and smartphones to smart bulbs and thermostats, every gadget represents a potential entry point. A weak link in one device can jeopardize your entire network.

A Virtual Private Network (VPN) is another essential tool for enhancing online privacy. By creating an encrypted tunnel between your device and the websites or apps you use, a VPN conceals your online activities from outsiders, including your internet service provider. A reliable VPN is vital for safeguarding your online privacy and ensuring a secure, high-speed connection.

While your Wi-Fi settings form the first line of defense, protecting the devices connected to your network is equally important. Installing robust antivirus software can block malware that may spread through downloads, emails, or malicious links. This additional layer of protection ensures that even if a threat bypasses your router’s defenses, your devices remain secure.

To answer Carol’s question: Is it safe to browse the internet on your home Wi-Fi? The answer is yes, but only if you take the necessary steps to secure it. Strong router settings, proper encryption, and a solid password do most of the heavy lifting. Developing habits such as regularly checking connected devices, keeping all devices updated, and utilizing tools like a VPN can provide even greater peace of mind.

When was the last time you checked your router settings or updated its firmware? Take the time to ensure your home network is secure.

Source: Original article

Spectacular Blue Spiral Light in Night Sky Likely From SpaceX Rocket

A stunning blue spiral light, likely from a SpaceX Falcon 9 rocket, illuminated the night sky over Europe, captivating viewers and sparking social media commentary.

A mesmerizing blue light graced the night skies over Europe on Monday, captivating onlookers and sparking intrigue across social media platforms. This mysterious spiraling phenomenon was likely caused by the SpaceX Falcon 9 rocket booster as it fell back toward Earth.

Time-lapse footage captured from Croatia around 4 p.m. EST (9 p.m. local time) showcased the glowing spiral, which many commentators likened to a cosmic whirlpool or spiral galaxy. The full video, recorded at normal speed, lasts approximately six minutes, providing a stunning visual of the event.

The Met Office in the United Kingdom reported receiving numerous accounts of an “illuminated swirl in the sky.” Experts have indicated that the display was likely linked to the SpaceX rocket that launched from Cape Canaveral, Florida, at around 1:50 p.m. EST as part of the classified NROL-69 mission for the National Reconnaissance Office (NRO).

“This is likely to be caused by the SpaceX Falcon 9 rocket, launched earlier today,” the Met Office stated on X. “The rocket’s frozen exhaust plume appears to be spinning in the atmosphere and reflecting sunlight, causing it to appear as a spiral in the sky.”

The phenomenon is often referred to as a “SpaceX spiral,” according to Space.com. These spirals typically occur when the upper stage of a Falcon 9 rocket separates from its first-stage booster. As the upper stage continues its journey into space, the lower stage descends back to Earth, releasing any remaining fuel. This fuel freezes almost instantly at high altitudes, and sunlight reflects off it, creating the striking glow observed in the sky.

Fox News Digital reached out to SpaceX for further comment but did not receive an immediate response. This spectacular display followed closely on the heels of a successful mission in which a SpaceX team, in collaboration with NASA, returned two stranded astronauts from space.

The captivating blue spiral not only highlighted the wonders of modern space exploration but also served as a reminder of the intricate processes involved in rocket launches and landings. As technology continues to advance, such breathtaking displays may become more common, further igniting public interest in space travel and exploration.

Source: Original article

10 Effective Strategies to Protect Your Older Mac from Malware

Older Mac computers may be vulnerable to security threats, but implementing essential precautions can help protect them from malware and other risks.

Apple’s Mac computers are widely regarded as more secure than their Windows counterparts, largely due to the company’s stringent control over both hardware and software. Whether you own a MacBook, iMac, or Mac Mini, these devices come equipped with built-in protections designed to shield against common threats. However, no system is entirely immune to attacks. Hackers have consistently discovered methods to bypass Apple’s defenses, particularly on older Macs that no longer receive regular security updates.

The good news is that an aging Mac does not have to be a sitting target for cyber threats. By taking a few smart precautions, you can keep your device safe and functioning smoothly, even if it is no longer eligible for the latest version of macOS.

Even if your Mac is no longer compatible with the latest macOS, Apple frequently releases security patches for older versions. To ensure your device remains protected, it is crucial to enable automatic updates. This way, your system can receive important security fixes as they become available.

Apps, particularly web browsers, are prime targets for attackers. If you are using browsers such as Chrome, Firefox, or Brave, it is essential to keep them updated. Most browsers have their own independent update systems, which is beneficial if you are running an older operating system. If you use Safari, you can rest easy, as it updates automatically alongside your device’s software.

In addition to web browsers, make sure to check for updates for other applications, including productivity tools, media players, and email clients. Developers often release patches to address vulnerabilities quietly, so keeping all software current is a wise practice, even if the Mac itself is outdated.

A secure Mac begins with a strong password. Avoid simple combinations or anything that includes easily obtainable personal information. If you struggle to remember complex passwords, consider using a passphrase. It is also important to avoid reusing passwords across different services; if one account is compromised, others may be at risk as well. A password manager can help you generate and securely store complex passwords.

Implementing two-factor authentication (2FA) adds an additional layer of security to your accounts. Even if someone manages to guess or steal your password, they will not be able to log in without the second code, which is typically sent to your phone or generated by an app. Ensure that 2FA is enabled on your Apple ID, Gmail, social media accounts, banking apps, and any cloud services you utilize. This simple step can significantly enhance your account security.

While Macs come with built-in security features like Gatekeeper and XProtect, older systems may not receive the latest threat definitions. Installing third-party antivirus software can help bridge this gap. Antivirus software serves as a safeguard against malicious links that could install malware and potentially access your private information. Additionally, it can alert you to phishing emails and ransomware scams, helping to keep your personal information and digital assets secure.

Even if your Mac is older, you can still utilize FileVault to encrypt your entire hard drive. This encryption protects your data in the event that your device is lost or stolen. If your Mac is too old to support FileVault 2 (full-disk encryption), consider manually encrypting sensitive files using Disk Utility.

Outdated versions of macOS may be susceptible to DNS hijacking or network-based attacks. To secure your internet traffic, consider enabling a VPN to encrypt your data during transmission. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. Opt for a VPN that adheres to a no-logs policy for added privacy and protection.

Older applications and background processes can introduce vulnerabilities if they are no longer maintained. Running your Mac as an administrator all the time increases your risk. Instead, create a standard user account for everyday use, which limits what malware can do if it manages to infiltrate your system.

In the event that malware does infiltrate your system or if your system crashes, having a recent backup can be a lifesaver. Set your backup system to run automatically, ideally on a weekly basis, to ensure your data is safe. Following step-by-step instructions to back up your Mac can help you safeguard your important files.

Just because your Mac is aging does not mean it is defenseless. By implementing regular updates, using strong passwords, and adding layers of protection such as FileVault and antivirus software, you can stay ahead of potential threats. Taking the time now to secure your device, remove risky applications, and back up your data can make a significant difference in keeping your older Mac secure.

Source: Original article

Wolf Extinct for 12,500 Years Allegedly Revived by U.S. Company

A Dallas-based company claims to have successfully resurrected the dire wolf, an extinct species that last roamed the Earth over 12,500 years ago, using advanced genetic technologies.

A U.S. company, Colossal Biosciences, has announced that it has brought back the dire wolf, a species that became widely recognized due to the HBO series “Game of Thrones.” The dire wolf, which last roamed the American midcontinent during the Ice Age, has not existed for over 12,500 years.

Colossal Biosciences claims to have successfully created three dire wolves through genome-editing and cloning technologies, marking what they describe as the world’s first successful “de-extincted animal.” However, some experts argue that the company has merely genetically modified existing wolves rather than truly reviving an extinct species.

According to Colossal, the dire wolves were created using blood cells taken from a living gray wolf. The team employed CRISPR technology, which stands for “clustered regularly interspaced short palindromic repeats,” to make 20 specific genetic modifications. These alterations were designed to replicate traits believed to have helped the dire wolves survive the harsh climates of the Ice Age, such as larger body sizes and longer, fuller, light-colored fur.

The ancient DNA used for these modifications was extracted from two dire wolf fossils: a tooth from Sheridan Pit, Ohio, estimated to be around 13,000 years old, and an inner ear bone from American Falls, Idaho, which is approximately 72,000 years old. The modified genetic material was then transferred into an egg cell from a domestic dog, and the embryos were implanted into surrogate dogs. After a gestation period of 62 days, the genetically engineered pups were born.

Ben Lamm, CEO of Colossal Biosciences, described the achievement as a significant milestone, emphasizing that it demonstrates the effectiveness of the company’s de-extinction technology. “It was once said, ‘any sufficiently advanced technology is indistinguishable from magic,’” Lamm stated. “Today, our team gets to unveil some of the magic they are working on and its broader impact on conservation.”

Colossal Biosciences has previously announced similar projects aimed at genetically altering living species to resemble extinct animals, including woolly mammoths and dodos. In a recent announcement, the company also revealed the birth of two litters of cloned red wolves, the most critically endangered wolf species in the world. This development, they claim, provides evidence of their ability to conserve species through de-extinction technology.

In March, Colossal representatives met with officials from the U.S. Department of the Interior to discuss their projects. Interior Secretary Doug Burgum praised the work on social media as a “thrilling new era of scientific wonder.” However, some scientists remain skeptical about the feasibility and implications of restoring extinct species.

Corey Bradshaw, a professor of global ecology at Flinders University in Australia, expressed doubts about the claims made by Colossal Biosciences. “So yes, they have slightly genetically modified wolves, maybe, and that’s probably the best that you’re going to get,” Bradshaw remarked. “And those slight modifications seem to have been derived from retrieved dire wolf material. Does that make it a dire wolf? No. Does it make a slightly modified gray wolf? Yes. And that’s probably about it.”

Colossal Biosciences has stated that the genetically engineered wolves are currently thriving in a secure, 2,000-acre ecological preserve in Texas, which is certified by the American Humane Society and registered with the USDA. The company plans to eventually restore the species in secure ecological preserves, potentially on indigenous land.

Source: Original article

Pilots Test Innovative Cockpit Alert System for Runway Collision Detection

Honeywell Aerospace is testing a groundbreaking cockpit alert system designed to prevent runway collisions by providing pilots with timely warnings.

KANSAS CITY, Mo. – Engineers at Honeywell Aerospace are in the final stages of testing a new cockpit alert system that aims to enhance safety on runways. Known as the “Surface Alert System,” or “SURF-A,” this innovative technology is designed to detect unauthorized aircraft that may pose a collision risk to planes cleared for takeoff or landing.

The SURF-A system provides pilots with two aural alerts when an unauthorized aircraft enters the runway on a collision course. The first alert activates 30 seconds before a potential collision, followed by a second alert 15 seconds prior. Honeywell Test Pilot Doug Rybczynski emphasized the importance of these warnings, stating, “It sounds like such a small amount of time, but things happen so rapidly, and 15 to 30 seconds is actually a very, very large margin when you’re moving at the speeds that we’re moving in an aircraft like this.”

The aural alerts feature an automated voice that announces, “traffic on runway,” which Rybczynski describes as a direct and effective call-out. During a recent test flight from Kansas City Downtown Airport to Topeka, Kansas, the Honeywell crew demonstrated the system’s capabilities. A crew member parked a smaller Gulfstream aircraft at the end of the runway, triggering the SURF-A alerts. In response, the pilot executed a “go-around” maneuver to avoid a potential collision.

This demonstration was reminiscent of a close call that occurred in 2023 at Austin-Bergstrom International Airport in Texas. In that incident, a FedEx B767 was cleared to land under poor conditions when the pilots spotted a Southwest Airlines B737 on the runway below them. Although the FedEx pilots managed to perform a last-second go-around, Honeywell asserts that the SURF-A system would have provided them with an additional 28 seconds of warning, potentially averting the dangerous situation.

The SURF-A system utilizes technology mandated by the Federal Aviation Administration (FAA) called “Smart X,” which has been in use since 2008. This technology alerts pilots if they are taking off from a taxiway or approaching a landing too quickly or from too high an altitude. Honeywell began developing the SURF-A system in 2020, prompted by a rise in runway close calls within the aviation industry. By employing “ADS-B” Out technology, which utilizes GPS to broadcast an aircraft’s position to other pilots, engineers were able to track the trajectories of planes on a collision course.

In 2024, the FAA reported a total of 1,664 runway incursions, incidents where an aircraft enters a runway without proper clearance. Among these, seven involved two planes on a collision course. As of 2025, the FAA has recorded 657 runway incursions.

Thea Feyereisen, a Distinguished Technical Fellow at Honeywell Aerospace, highlighted a critical gap in current safety measures, stating, “Shockingly, I think for a lot of passengers, there’s not an alert system available today to let you know that you’re about ready to run into another aircraft on the runway.”

In response to the growing concern over runway safety, the FAA has advocated for improvements in airport infrastructure. This includes the installation of edge lights, pavement markers, and clearer signage, as well as simplifying taxiway layouts. Since 2021, the FAA has allocated nearly $12 billion to enhance airport infrastructure across the United States.

Despite these efforts, Feyereisen underscored the crucial role of pilots as the last line of defense in aviation safety. “Pilots have a shared destiny on the aircraft,” she noted. “The pilot can be doing everything correct, but on a path to disaster.”

Honeywell Aerospace is actively promoting the SURF-A prototype to major airlines and is optimistic about obtaining certification for the system by September. If successful, the technology could be integrated into commercial flights as early as 2026.

Source: Original article

Google Develops AI Technology to Decode Dolphin Communication

Google is leveraging artificial intelligence to decode dolphin communication, aiming to facilitate future interactions between humans and these intelligent marine mammals.

Google is embarking on an ambitious project to harness artificial intelligence (AI) in order to study dolphin communication, with the ultimate goal of enabling humans to converse with these highly intelligent creatures.

Dolphins have long been celebrated for their cognitive abilities, emotional depth, and social interactions with humans. In collaboration with researchers from the Georgia Institute of Technology and the Wild Dolphin Project (WDP), a Florida-based non-profit organization that has dedicated over 40 years to studying and recording dolphin sounds, Google is developing a new AI model named DolphinGemma.

The Wild Dolphin Project has spent decades correlating various dolphin sounds with specific behavioral contexts. For example, signature whistles are often used by mothers to reunite with their calves, while burst pulse “squawks” are typically observed during conflicts among dolphins. Additionally, “click” sounds are frequently employed during courtship or when dolphins are chasing sharks, according to a blog post from Google detailing the project.

DolphinGemma builds upon Google’s existing AI lightweight open model, known as Gemma, and is designed to analyze the extensive library of recordings collected by WDP. The model aims to detect patterns, structures, and even potential meanings behind dolphin vocalizations. Over time, DolphinGemma will categorize these sounds into groupings that resemble words, sentences, or expressions in human language.

According to Google, the model’s ability to identify recurring sound patterns, clusters, and reliable sequences will assist researchers in uncovering hidden structures and meanings within dolphin communication. This task, which previously required significant human effort, could be streamlined through the use of AI.

Eventually, the patterns identified by DolphinGemma, combined with synthetic sounds created by researchers to refer to objects that dolphins enjoy interacting with, may lead to the establishment of a shared vocabulary for interactive communication between humans and dolphins.

To ensure high-quality sound recordings of dolphin vocalizations, DolphinGemma utilizes audio recording technology from Google’s Pixel phones. This technology is capable of isolating dolphin clicks and whistles from background noise, such as waves, boat engines, or underwater static. Clean audio is essential for AI models like DolphinGemma, as noisy data can hinder the AI’s ability to learn and analyze effectively.

Google plans to release DolphinGemma as an open model this summer, allowing researchers worldwide to utilize and adapt it for their own studies. While the model is initially trained on Atlantic spotted dolphins, it has the potential to assist in the study of other dolphin species, such as bottlenose or spinner dolphins, with some adjustments.

By providing tools like DolphinGemma, Google aims to empower researchers globally to explore their own acoustic datasets, accelerate the search for patterns, and collectively enhance our understanding of these remarkable marine mammals.

Source: Original article

Soviet-Era Spacecraft Returns to Earth After 53 Years in Orbit

Soviet spacecraft Kosmos 482 reentered Earth’s atmosphere on Saturday after 53 years in orbit, following a failed attempt to launch to Venus.

A Soviet-era spacecraft made its dramatic return to Earth on Saturday, more than half a century after its unsuccessful launch aimed at Venus. The European Union Space Surveillance and Tracking confirmed the spacecraft’s uncontrolled reentry, noting its absence from subsequent orbital observations.

The European Space Agency’s space debris office also reported that Kosmos 482 had reentered the atmosphere after failing to appear on radar over a German station. At this time, it remains unclear where the spacecraft descended or how much, if any, of the half-ton vehicle survived the intense heat of reentry.

Experts had anticipated that some, if not all, of the spacecraft might crash to Earth, given its design to withstand the extreme conditions of a landing on Venus, the hottest planet in the solar system. Scientists emphasized that the likelihood of anyone being struck by debris from the spacecraft was exceedingly low.

Launched in 1972 by the Soviet Union, Kosmos 482 was part of a series of missions intended for Venus. However, a rocket malfunction left it stranded in Earth’s orbit, preventing it from reaching its intended destination. Most of the spacecraft had already fallen back to Earth within a decade of its failed launch, but the spherical lander, measuring approximately three feet (one meter) across and encased in titanium, was the last component to descend.

Weighing over 1,000 pounds (495 kilograms), the lander could not resist gravity’s pull as its orbit gradually decayed. As scientists and military experts tracked the spacecraft’s downward spiral, they struggled to determine the precise timing and location of its reentry.

Adding to the uncertainty were fluctuations in solar activity and the spacecraft’s deteriorating condition after decades in space. As of Saturday morning, the U.S. Space Command had not yet confirmed the spacecraft’s demise, as it continued to gather and analyze data from orbit.

The U.S. Space Command routinely monitors dozens of reentries each month, but Kosmos 482 garnered additional attention from both government and private space trackers due to its potential to survive reentry. Unlike many other decommissioned satellites, it was coming in uncontrolled, without any intervention from flight controllers, who typically aim to direct old satellites and debris toward vast oceanic expanses.

As the world reflects on this historic spacecraft’s long journey, the reentry of Kosmos 482 serves as a reminder of the complexities and challenges of space exploration, even decades after a mission’s intended goal has been abandoned.

Source: Original article

Scammers Exploit DocuSign Emails to Facilitate Apple Pay Fraud

Scammers are increasingly using fake DocuSign emails to impersonate Apple Pay transactions, aiming to steal personal information through fraudulent phone numbers and deceptive receipts.

Phishing scams are becoming more sophisticated, with one of the latest tactics involving fake DocuSign emails that appear to show charges from reputable companies like Apple. At first glance, these fraudulent messages seem legitimate, often including a receipt, order ID, and even a support number. However, instead of connecting recipients to Apple or another legitimate service, that number leads directly to scammers.

These phishing emails typically masquerade as billing receipts for recent Apple Pay purchases. They often claim that a subscription has been charged to the recipient’s account and prompt them to call a phone number if they do not recognize the charge. To enhance their credibility, the emails frequently reference well-known brands such as Apple, Netflix, and Expedia, or even local service providers.

Some of these emails include a “DocuSign” link accompanied by a security code, creating the illusion that recipients must access a file to confirm the transaction. In reality, neither Apple nor any of these other companies sends billing receipts through DocuSign, which serves as a significant red flag.

Another telltale sign of these scams is the sender’s email address. Scammers often use addresses that contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps them bypass spam filters.

The scam is designed to catch individuals off guard and pressure them into acting quickly. The email claims that the recipient’s Apple Pay account has been charged for a subscription or purchase, providing an order ID, a charge amount, and a DocuSign link that supposedly contains a receipt or confirmation file. To make the message even more convincing, some versions include a security code to “unlock” the document.

The email also lists a phone number and urges recipients to call if the charge was not authorized. Unfortunately, that number is central to the scam. Instead of reaching Apple, Netflix, or whichever company the email claims to represent, individuals end up speaking with a scammer posing as a support agent.

Once on the call, the scammer attempts to convince the victim that their account has been compromised or that the payment must be reversed immediately. From there, the tactics can vary. Scammers may ask for personal information, such as Apple ID, banking details, or credit card numbers. They might pressure victims to download remote access software under the guise of “fixing” the issue on their device. In some cases, they even demand payment for fictitious account protection or reversal fees.

The ultimate goal of these scams is consistent: to gain enough access to lock victims out of their accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams particularly dangerous is their combination of multiple red flags within a single message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.

Scammers rely on individuals reacting quickly without questioning the details. However, there are several practical steps that people can take to protect themselves from falling victim to these schemes.

First, be wary of email addresses that closely resemble official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not originate from an official domain like @apple.com, it is likely illegitimate.

Second, remember that Apple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt arrives in this format, it is safe to assume it is a scam. Legitimate receipts always come directly from the service provider.

Additionally, exercise caution with any links in suspicious emails. Scammers often disguise harmful links behind text that appears legitimate, such as “View Document” or “Review Payment.” Hovering over the link without clicking can reveal the true web address. If it does not match the official company domain, do not click on it.

Installing strong antivirus software on all devices is another effective way to safeguard against malicious links. This protection can alert users to phishing emails and ransomware scams, helping to keep personal information and digital assets secure.

Instead of relying solely on the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing appears, the receipt is likely fake. Other services offer similar methods for checking transaction history.

Finally, limiting the information available about oneself online can make it more challenging for scammers to craft convincing attacks. Consider removing old accounts that are no longer in use, restricting personal details shared on social media, and utilizing data removal services when possible. This approach reduces the risk of having your name, email, or phone number targeted in scams like this.

While no service can guarantee complete removal of personal data from the internet, data removal services can actively monitor and systematically erase personal information from numerous websites. This proactive approach can provide peace of mind and significantly reduce the risk of being targeted by scammers.

Phishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is to maintain a healthy dose of skepticism. If something feels off, take a moment to stop, double-check, and confirm details through official channels. Scammers thrive on panic and quick reactions. By slowing down and verifying information, individuals can better protect themselves from falling into these traps.

Source: Original article

Cybersecurity Expert Shares Tips to Prevent Online Shopping Tracking

Using email aliases for online shopping can enhance your privacy by preventing companies from tracking your online activities across various platforms.

In today’s digital landscape, many individuals underestimate the significance of their email addresses. While most view their email as a simple identifier for receiving receipts and shipping updates, it serves a much larger purpose. Your email is essentially a key to your online identity, utilized by companies to construct behavioral profiles, target advertisements, and, in some cases, facilitate fraud following data breaches. When you consistently use the same email address across different platforms, you create a universal key that can be exploited.

To safeguard my privacy, I employ email aliases for online shopping. This practice not only helps me remain anonymous but also significantly reduces the amount of spam I receive. In this article, I will explain what email aliases are, their importance, and how they can shift the balance of power in your favor.

Every time you enter your primary email address on a shopping website, you provide that company with a lasting connection to your behavior across various platforms and devices. Although companies may hash or encrypt your email, the underlying behavioral patterns remain intact. This means you can still be tracked. However, using aliases can disrupt this tracking chain.

Instead of sharing my actual email address, I create a unique alias for each website I interact with. While these emails still reach my primary inbox through forwarding, the company never sees my real address. This minor adjustment prevents them from linking my activities to other accounts or websites. Although it is not a foolproof solution, it introduces enough friction to hinder tracking systems.

Each alias I utilize acts as a tracker. If one begins to receive spam, I can identify which site sold or compromised my data. Many individuals are unaware of where a data breach occurs; they simply assume that “it happens.” My approach is different. When an alias starts receiving unwanted emails, I do not waste time trying to unsubscribe or set up filters. Instead, I disable the alias, effectively eliminating the problem.

Research indicates that the average e-commerce site employs between 15 and 30 third-party scripts, analytics trackers, ad pixels, and behavioral beacons. Even if the site itself operates honestly, its underlying infrastructure may not. Your email traverses multiple layers, including mailing tools, CRM platforms, and shipping plugins. A single misconfiguration or a careless developer can lead to your data being mishandled.

Using an alias minimizes the risk. In the event of a data breach, your core identity remains secure. Furthermore, aliases not only enhance privacy but also promote more thoughtful online behavior. Since I began using them, I have become more deliberate about where I sign up and why. The mental pause required to generate a new alias encourages me to think critically about my online interactions. I can also establish rules, such as directing all product warranties to products@myalias.com and all newsletters to news@myalias.com.

However, relying solely on aliases is not sufficient for online safety. It is essential to start with a secure email provider. By creating email aliases, you can protect your personal information and minimize spam. These aliases forward messages to your primary address, streamlining the management of incoming communications and reducing the risk of data breaches. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

While we have made strides in password hygiene—many now use password managers and enable two-factor authentication—our email habits have largely remained unchanged. Most individuals still depend on a single email address for all their activities, including shopping, banking, subscriptions, work, and family communication. This practice is not only inefficient but also poses a significant security risk. Utilizing email aliases is a straightforward method to fragment your digital identity, complicating matters for potential attackers and decreasing the likelihood that a single breach will affect multiple accounts.

Would you continue using your primary email for all your activities if you understood that it made you more susceptible to tracking? Share your thoughts with us at Cyberguy.com.

Source: Original article

Researchers Create E-Tattoo to Monitor Mental Workload in Stressful Jobs

Researchers have developed a novel electronic tattoo, or “e-tattoo,” designed to monitor mental workload in high-stress professions by measuring brain activity and eye movements.

In an innovative breakthrough, scientists have introduced a wire forehead e-tattoo that utilizes electroencephalogram (EEG) and electrooculogram (EOG) technologies to assess brain activity and cognitive performance. This electronic tattoo device aims to assist individuals in high-pressure work environments by providing a means to track their brainwaves and mental workload.

The research, published in the journal Device, highlights the e-tattoo as a more cost-effective and user-friendly alternative to traditional monitoring devices. Dr. Nanshu Lu, the senior author of the study from the University of Texas at Austin, emphasized the importance of mental workload in human-in-the-loop systems, noting its significant impact on cognitive performance and decision-making.

Dr. Lu explained that the motivation behind this device stems from the needs of professionals in high-demand roles, including pilots, air traffic controllers, doctors, and emergency dispatchers. The e-tattoo could also benefit emergency room doctors and operators of robots or drones, enhancing both training and performance in these critical fields.

One of the primary objectives of the study was to develop a method for measuring cognitive fatigue in professions that require intense mental focus. The e-tattoo is designed to be temporarily affixed to the forehead and is notably smaller than many existing devices.

According to the study, the e-tattoo operates by measuring brain waves and eye movements through its EEG and EOG capabilities. While conventional EEG and EOG machines tend to be bulky and costly, the e-tattoo presents a compact and affordable solution for monitoring mental workload.

Dr. Lu described the device as “a wireless forehead EEG and EOG sensor designed to be as thin and conformable to the skin as a temporary tattoo sticker.” She further noted that understanding human mental workload is crucial in the realms of human-machine interaction and ergonomics, given its direct influence on cognitive performance.

The research involved six participants who were tasked with responding to a series of letters displayed on a screen. Each letter appeared one at a time in various locations, and participants were instructed to click a mouse if either the letter or its position matched a previously shown letter. The tasks varied in difficulty, allowing the researchers to observe how brainwave activity shifted in response to increasing mental workload.

The e-tattoo consists of a battery pack, reusable chips, and a disposable sensor, making it a practical option for ongoing use. Dr. Lu indicated that the current prototype is priced at approximately $200.

While the e-tattoo shows promise, Dr. Lu noted that further development is necessary before it can be commercialized. This includes enhancing the device’s capabilities for real-time mental workload decoding and validating its effectiveness in more diverse and realistic settings.

As research continues, the e-tattoo may pave the way for improved monitoring of cognitive performance in high-stress jobs, potentially leading to better decision-making and enhanced overall performance in critical situations.

Source: Original article

Over 2 Billion Users at Risk of Phishing Following Google Data Leak

Over two billion users are at risk of phishing attacks following a recent data breach involving Google’s Salesforce system, which has led to an increase in scam attempts targeting individuals.

Google, a leader in technology and cybersecurity, has confirmed a breach of one of its corporate Salesforce instances, exposing business data. Earlier this month, the company disclosed that attackers gained access to this system, which primarily contained publicly available business information, including contact details and notes from small and medium-sized enterprises. Notably, the breach did not compromise customer data from Google Cloud or consumer products such as Gmail, Drive, or Calendar.

In response to the incident, Google stated that it has terminated the malicious activity, conducted an impact analysis, and implemented mitigations. The company reassured users that no further action is required on their part.

Despite the breach being contained, scammers are leveraging the situation to launch phishing and vishing attacks. Reports indicate that some users have already experienced a surge in phishing attempts that reference Google services, according to PC World.

One prevalent tactic involves vishing, or voice phishing, where scammers make phone calls pretending to be Google employees. A recent Reddit post highlighted a series of calls originating from the 650 area code, which is associated with Google’s headquarters. During these calls, scammers inform victims of a fictitious security breach and instruct them to reset their Gmail passwords, ultimately gaining control of their accounts.

In addition to the Salesforce incident, Google Cloud customers are facing another threat. Hackers are attempting to exploit outdated access addresses through a method known as the “dangling bucket.” This technique can allow them to inject malware or steal sensitive data, putting both businesses and individuals at risk of losing control over their information.

With Gmail and Google Cloud serving nearly 2.5 billion users, the scale of the risk is considerable. Although the initial breach did not expose passwords, attackers are using the incident to deceive individuals into revealing their login credentials.

Google accounts are often prime targets for scammers. Fortunately, protecting oneself does not require advanced technical skills. Simple, practical steps can significantly reduce the likelihood of falling victim to these scams.

Phishing remains the most common method for scammers to steal Google account credentials. A fraudulent email or text may claim that an account has been locked or that suspicious activity needs verification. Clicking on the provided link typically redirects users to a counterfeit login page that closely resembles the authentic Google sign-in screen.

To avoid such traps, users should carefully check the sender’s email address, hover over links before clicking, and refrain from entering their Google password on any page that does not begin with accounts.google.com.

Installing antivirus software on all devices is another effective way to safeguard against malicious links that could install malware and compromise private information. This software can also alert users to phishing emails and ransomware scams, helping to protect personal data and digital assets.

Reusing weak passwords across multiple sites can make users vulnerable to scammers. If one site is breached, it can expose Google accounts. A strong, unique password serves as the first line of defense.

Using a password manager can simplify the process of managing complex passwords. These tools can generate secure passwords, store them safely, and autofill them when needed, eliminating the need to remember numerous logins and making it difficult for attackers to guess passwords.

Additionally, users should check if their email addresses have been exposed in past breaches. Many password managers offer built-in breach scanners that can identify whether an email address or password has appeared in known leaks. If a match is found, users should promptly change any reused passwords and secure those accounts with new, unique credentials.

Scammers often utilize information found online to craft convincing attacks. If personal details such as email addresses, phone numbers, or previous passwords are available on data broker sites, criminals have more tools at their disposal to impersonate victims or trick them into revealing additional information.

Employing a data removal service can help clean up one’s digital footprint. By reducing the amount of exposed information, it becomes more challenging for scammers to target individuals directly. While no service can guarantee complete removal of data from the internet, these services actively monitor and systematically erase personal information from numerous websites, providing peace of mind.

Even the strongest password can be compromised, but enabling two-factor authentication (2FA) adds an extra layer of security. When activated, Google will request a one-time code or prompt on the user’s phone before granting access. This means that even if a scammer obtains a password, they cannot log in without also having the user’s device.

Google offers various 2FA methods, including SMS codes, app-based prompts, and hardware security keys. For optimal protection, users are encouraged to choose app-based or hardware verification over text messages.

Many scams exploit outdated software. Keeping phones, browsers, and operating systems up to date is crucial, as attackers may use known vulnerabilities to install malware or hijack sessions. Setting devices to update automatically can help ensure that users are always running the latest security patches, minimizing potential openings for scammers.

Google provides built-in tools to help users identify suspicious activity. By visiting the security page of their Google Account, users can review signed-in devices, recent account activity, and verify that recovery options, such as phone numbers and backup emails, are current.

Conducting a Google Security Checkup is a quick process that offers a comprehensive overview of any weaknesses in an account. This serves as a vital health check for one’s digital life.

The recent breach serves as a stark reminder that even major tech companies are not immune to security lapses. While Google asserts that no passwords were exposed, the subsequent rise in phishing and vishing scams illustrates how swiftly criminals can exploit even partial leaks. What began as a breach of business data has evolved into a significant threat for millions of everyday users, raising concerns about the overall security of Google’s ecosystem.

Do you believe regulators should implement stricter rules regarding how cloud providers manage security breaches? Share your thoughts with us at Cyberguy.com/Contact.

Source: Original article

Astronauts Return to Earth After ISS Mission to Relieve Stranded Crew

A NASA crew, including astronauts Anne McClain and Nichole Ayers, successfully splashed down in the Pacific after a mission to the ISS, marking the agency’s first Pacific landing in 50 years.

NASA astronauts Anne McClain and Nichole Ayers, along with two international crew members, made a historic splashdown in the Pacific Ocean off the coast of California on Saturday. This marked NASA’s first such landing in 50 years.

The crew, which included Japan’s Takuya Onishi and Russia’s Kirill Peskov, returned to Earth at 11:33 a.m. ET in a SpaceX capsule. This event was notable not only for its significance to NASA but also as the third crewed splashdown for SpaceX.

The last time NASA astronauts splashed down in the Pacific was during the Apollo-Soyuz mission in 1975, which was the first crewed international space mission involving American and Soviet astronauts.

The astronauts launched in March to relieve their colleagues, Suni Williams and Butch Wilmore, who had been stranded at the International Space Station (ISS) for nine months. Their extended stay was due to issues with the Boeing Starliner capsule, which experienced thruster problems and helium leaks.

NASA determined that returning Wilmore and Williams to Earth in the Starliner would be too risky, leading to the decision for the Starliner to return without crew. Wilmore and Williams eventually returned home in a SpaceX capsule after their replacements arrived.

In a poignant reflection before departing the ISS, McClain expressed hope that their mission would serve as a reminder of the potential for collaboration and exploration during challenging times. “We want this mission, our mission, to be a reminder of what people can do when we work together, when we explore together,” she said.

Upon their return, McClain mentioned her eagerness to relax and enjoy some downtime, while her crewmates looked forward to indulging in hot showers and burgers.

Earlier this year, SpaceX made the strategic decision to shift their splashdowns from Florida to California. This change was implemented to minimize the risk of debris falling on populated areas during the landing process.

After exiting the spacecraft, the crew underwent medical checks before being transported via helicopter to meet a NASA aircraft bound for Houston.

“Overall, the mission went great, glad to have the crew back,” said Steve Stich, manager of NASA’s Commercial Crew Program, during a press conference following the splashdown. “SpaceX did a great job of recovering the crew again on the West Coast.”

Dina Contella, deputy manager for NASA’s International Space Station program, expressed her satisfaction with the crew’s return, stating, “I was pretty happy to see the Crew 10 team back on Earth. They looked great, and they are doing great.”

During their 146 days at the ISS, the crew orbited the Earth 2,368 times and traveled over 63 million miles.

Source: Original article

Google and Trump Administration Strike AI Deal for Federal Agencies

Google has reached an agreement with the Trump administration to implement its artificial intelligence platform across federal agencies, enhancing the U.S. government’s technological capabilities.

The General Services Administration (GSA) announced on Thursday a new partnership with Google aimed at deploying its suite of artificial intelligence (AI) and cloud services throughout the federal government. This agreement marks a significant step in integrating advanced technology into governmental operations.

This initiative aligns with President Donald Trump’s broader strategy to maintain the United States’ position as the leading force in AI development globally. In July, a gathering of prominent figures in American technology celebrated the launch of this ambitious plan, which seeks to bolster the nation’s defenses against emerging threats, particularly from nations like China.

As the digital landscape evolves, the challenges posed by cybercriminals also intensify. Hackers are continually devising new methods to deceive users, often employing phishing tactics that target browsers’ security measures. Although major browsers and search engines, including Google Chrome, actively work to combat these threats, they depend heavily on automated systems to manage the overwhelming volume of malicious activities online.

In a related development, Meta CEO Mark Zuckerberg recently announced the company’s commitment to developing a personal superintelligence aimed at enhancing creative and leisurely pursuits for users. This move reflects a growing trend among tech giants to harness AI for more personalized and user-friendly applications.

As AI technology continues to advance, it presents both challenges and opportunities for individuals and organizations alike. The ongoing collaboration between Google and the federal government is expected to play a crucial role in shaping the future of AI in the United States.

For those interested in staying informed about the latest advancements in AI technology, Fox News offers resources to explore the evolving landscape and its implications for society.

Source: Original article

Harvard Physicist Suggests Interstellar Object May Be Alien Probe

Harvard physicist Dr. Avi Loeb suggests that the interstellar object 3I/ATLAS, discovered recently, may be an alien probe due to its unusual characteristics and trajectory.

A recently discovered interstellar object, known as 3I/ATLAS, is raising eyebrows among astronomers, particularly Harvard physicist Dr. Avi Loeb, who posits that its peculiar features could indicate it is more than just a typical comet.

“Maybe the trajectory was designed,” Dr. Loeb stated in an interview with Fox News Digital. “If it had an objective to sort of be on a reconnaissance mission, to either send mini probes to those planets or monitor them… It seems quite anomalous.”

The object was first detected in early July by the Asteroid Terrestrial-impact Last Alert System (ATLAS) telescope located in Chile. This discovery marks only the third time an interstellar object has been observed entering our solar system, according to NASA.

While NASA has classified 3I/ATLAS as a comet, Dr. Loeb pointed out an intriguing detail: an image of the object reveals an unexpected glow appearing in front of it, rather than trailing behind, which he described as “quite surprising.”

“Usually with comets, you have a tail, a cometary tail, where dust and gas are shining, reflecting sunlight, and that’s the signature of a comet,” he explained. “Here, you see a glow in front of it, not behind it.”

Measuring approximately 20 kilometers across, 3I/ATLAS is larger than Manhattan and is unusually bright given its distance from Earth. However, Dr. Loeb emphasized that its most striking characteristic is its trajectory.

“If you imagine objects entering the solar system from random directions, just one in 500 of them would be aligned so well with the orbits of the planets,” he noted.

The interstellar object originates from the center of the Milky Way galaxy and is expected to pass near Mars, Venus, and Jupiter—an occurrence that Dr. Loeb argues is highly improbable to happen by chance.

“It also comes close to each of them, with a probability of one in 20,000,” he stated.

According to NASA, 3I/ATLAS will reach its closest point to the sun—approximately 130 million miles away—on October 30.

“If it turns out to be technological, it would obviously have a big impact on the future of humanity,” Dr. Loeb remarked. “We have to decide how to respond to that.”

In January, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics mistakenly identified a Tesla Roadster launched into orbit by SpaceX CEO Elon Musk as an asteroid, highlighting the complexities of identifying objects in space.

A spokesperson for NASA did not immediately respond to requests for comment regarding 3I/ATLAS.

Source: Original article

Google Introduces Preferred Sources Feature for Top Stories Selection

Google has introduced a new “preferred sources” feature, allowing users to customize their Top Stories section with their favorite news outlets, including Fox News.

Google has launched a new feature that enables users to personalize their search results by selecting their preferred news outlets. This “preferred sources” feature was officially rolled out on August 12 and allows users to tailor the Top Stories section of Google search results to include articles from outlets they choose, such as Fox News.

According to Google, when users select their preferred sources, they will begin to see more articles from those outlets prominently displayed in the Top Stories section, provided that those sources have published fresh and relevant content related to the user’s search queries. This customization aims to enhance the user experience by ensuring that individuals receive news from sources they trust and prefer.

In addition to appearing in the Top Stories section, content from the selected preferred sources may also be featured in a dedicated “from your sources” section, further streamlining access to favored news articles. The process of adding Fox News or any other outlet as a preferred source is straightforward and can be completed in just a few clicks.

Users have the flexibility to select multiple sites as their preferred sources and can modify their selections at any time, allowing for a dynamic and personalized news consumption experience. This feature is particularly beneficial for those who want to stay updated on specific topics or events through the lens of their chosen news providers.

To add Fox News as a preferred source, users can follow the simple steps outlined by Google. This ensures that they remain informed about the latest coverage and developments from Fox News, tailored to their interests.

As digital news consumption continues to evolve, features like Google’s “preferred sources” are becoming increasingly important for users who seek to curate their news experience. By allowing individuals to choose their preferred outlets, Google is responding to the demand for more personalized and relevant content in an age of information overload.

With this new feature, Google aims to empower users to take control of their news feeds, ensuring they receive the information that matters most to them from the sources they trust.

Source: Original article

The Mystery of Mysterious Shipment Emails in Your Inbox

Receiving unexpected order confirmations may indicate that your email address is being exploited in fraudulent operations targeting various retailers.

In recent months, an increasing number of individuals have reported receiving shipment confirmation emails for purchases they did not make. These emails typically originate from legitimate retailers, often in the sportswear or electronics sectors, and include real tracking numbers and delivery details. However, the products are shipped to different names and addresses, while the buyer’s contact email is the recipient’s.

This phenomenon might initially appear to be a simple clerical error or a case of someone mistyping an email address. Yet, when it occurs repeatedly across multiple unrelated orders, it raises concerns about a more sinister tactic at play. Arthur, a resident of Cape Coral, Florida, shared his experience, which reflects the frustrations of many others: “My wife’s email address is showing up in emails from various sports entities to notify her of shipping dates, etc. So far, three separate individuals have ordered products, shipped to a different name at a different address, but used her email as the contact. They didn’t use our credit card to place the order. What could be going on? I don’t believe it’s a coincidence.”

Arthur’s suspicions are well-founded. Scammers are increasingly using real email addresses to facilitate fraudulent purchases through retailer systems that have fewer verification checks. They exploit the trust associated with legitimate email addresses to carry out their schemes, even if they have not compromised the victim’s payment details.

It is improbable that someone is accidentally entering your email address every single time. Instead, scammers are deliberately using valid, active email addresses to circumvent retailer fraud filters. Numerous sources indicate that fake order and shipping confirmation emails are a common tactic in fraud operations, with criminals taking advantage of the trust systems built around legitimate email addresses.

When a stolen credit card is used, pairing it with a real email address that has not triggered spam alerts significantly increases the likelihood that the transaction will go unnoticed by anti-fraud systems. Retailers often verify whether an email address is active or bounces. If the system detects a functioning address, it may be less suspicious than an obviously fake one.

Once an order is placed, products are frequently sent to drop addresses or freight-forwarding services, as confirmed by official investigations into brushing scams. These services act as intermediaries, complicating the tracing of fraudulent activities. In this context, your email serves merely as a means to an end—a validated contact point that aids the operation’s progression.

Your email address may have fallen into the hands of scammers through several common methods. The most likely cause is a data breach. Many well-known companies have experienced leaks where customer emails and other information were exposed. Once your email is part of a leaked database, it often circulates on the dark web or in underground forums, where it is traded and reused. Even if you were not directly involved in a breach, scammers frequently employ a technique known as credential stuffing. This method involves testing stolen login details across various websites to confirm which email addresses are active.

To mitigate the risk of falling victim to such scams, consider investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, these services can help monitor and automate the process of removing your information from numerous sites over time.

Implementing a few straightforward yet effective measures can help protect your inbox, safeguard your identity, and stay ahead of scammers misusing your email. Start by securing your email account with a strong, unique password that you do not reuse elsewhere. Enabling two-factor authentication (2FA) adds an extra layer of security, ensuring that hackers cannot access your account even if they have stolen your password. A password manager can simplify this process by generating and securely storing complex passwords, reducing the risks associated with password reuse.

Regularly check if your email has been exposed in past breaches. Many password managers include built-in breach scanners that can alert you if your email address or passwords have appeared in known leaks. If you discover a match, promptly change any reused passwords and secure those accounts with new, unique credentials.

Periodically scan your inbox for order confirmations, shipping notices, or account sign-ups that you do not recognize. If something seems suspicious, report it directly to the retailer or platform, as it may be part of a larger scam utilizing your email address. Avoid clicking on dubious links, even if the message appears legitimate, and protect your devices with robust antivirus software to catch threats before they escalate.

To further safeguard yourself from malicious links that could install malware and compromise your private information, ensure that you have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets secure.

Avoid entering your email on questionable giveaway sites or dubious online forms. When in doubt, skip the sign-up or use a temporary email address. The fewer places your email is exposed, the more challenging it becomes for scammers to access it.

Consider establishing a dedicated email account for online purchases, newsletters, and subscriptions. This approach helps keep your primary inbox organized and makes it easier to identify unusual activity. Creating various email aliases can also be beneficial, allowing you to manage incoming communications while minimizing the risk of data breaches. An email alias can forward messages to your primary address, simplifying your email management.

Even if no purchases appear under your name, receiving order confirmations for items you did not buy can be a warning sign of potential identity theft. Set up alerts with your bank and consider enrolling in a credit monitoring service to detect unauthorized activity early.

If you are receiving order confirmations for items you did not purchase, do not dismiss it as a mere inconvenience. Your email is likely being misused as part of a larger fraud operation, not by accident but intentionally. Scammers are capitalizing on active, trustworthy email addresses to slip past retailer defenses and execute unauthorized purchases. The repeated use of your email indicates that fraud networks are already circulating it, even if your financial information remains secure.

Source: Original article

Harvard Physicist Suggests Interstellar Object May Be Nuclear-Powered Spaceship

A Harvard physicist suggests that the interstellar object 3I/ATLAS may be more than just a comet, possibly even a nuclear-powered spaceship.

Harvard physicist Avi Loeb has raised intriguing questions about the nature of the interstellar object known as 3I/ATLAS, which has recently passed through our solar system. Initially detected in early July by the Asteroid Terrestrial-impact Last Alert System (ATLAS) telescope in Chile, this object marks only the third instance of an interstellar object being observed entering our solar system, according to NASA.

While NASA has classified 3I/ATLAS as a comet, Loeb has pointed out an unusual feature in images of the object: a glow that appears in front of it rather than trailing behind, which he describes as “quite surprising.” In a blog post published this week, Loeb argued that the brightness profile of the object cannot be adequately explained by sunlight reflection or the typical outgassing associated with comets.

Loeb proposes that 3I/ATLAS might be generating its own light, potentially through nuclear energy. He speculated, “Alternatively, 3I/ATLAS could be a spacecraft powered by nuclear energy, and the dust emitted from its frontal surface might be from dirt that accumulated on its surface during its interstellar travel.” However, he emphasizes that this hypothesis requires further evidence to be considered viable.

Loeb has dismissed other natural power sources for the object’s brightness. He noted that a primordial black hole would generate only about 20 nanowatts, which is far too weak to account for the observed luminosity. Additionally, he deemed the likelihood of a radioactive fragment from a supernova as highly improbable due to its rarity. He also ruled out frictional heating from interstellar gas and dust based on momentum and density constraints.

According to Loeb, the simplest explanation for the observed gigawatt-level luminosity is a central, compact, high-power source, with nuclear power being the most plausible option. However, he is careful not to assert that the object is definitively nuclear-powered, stressing that proving this theory would require more substantial evidence.

3I/ATLAS is estimated to be about 20 kilometers across, making it larger than Manhattan. Loeb has also raised questions about the object’s unusual trajectory. He explained, “If you imagine objects entering the solar system from random directions, just one in 500 of them would be aligned so well with the orbits of the planets.”

The interstellar object, which originates from the center of the Milky Way, is expected to pass near Mars, Venus, and Jupiter, which Loeb considers another improbable coincidence. He noted that the probability of it coming close to each of these planets is about one in 20,000.

Nasa has indicated that 3I/ATLAS will reach its closest point to the sun, approximately 130 million miles away, on October 30. Loeb remarked, “If it turns out to be technological, it would obviously have a big impact on the future of humanity. We have to decide how to respond to that.”

As the scientific community continues to study 3I/ATLAS, the implications of its characteristics and trajectory could reshape our understanding of interstellar objects and their potential origins.

Source: Original article

Musk and Altman Rivalry: A Potential Indian-American Contender Emerges

In the ongoing rivalry between tech giants, Aravind Srinivas’s Perplexity emerges as a potential contender, challenging established players like ChatGPT.

The world of artificial intelligence is witnessing a fierce competition, particularly between prominent figures like Elon Musk and Sam Altman. Amidst this rivalry, a new player has emerged: Aravind Srinivas and his company, Perplexity. The question arises: is Perplexity a genuine contender in this high-stakes game, or is it merely a pawn in a larger strategy orchestrated by the tech giants?

As the landscape of AI continues to evolve, the dynamics between established companies and emerging startups become increasingly complex. Musk and Altman represent two sides of a coin, each with their own vision for the future of AI. Musk, known for his bold and often controversial statements, has been vocal about his concerns regarding the potential dangers of AI. On the other hand, Altman, the CEO of OpenAI, has focused on advancing AI technology while promoting safety and ethical considerations.

In this context, Perplexity’s rise can be seen as a strategic move by other tech giants who may be looking to support smaller players in order to challenge the dominance of established entities like ChatGPT. By lifting a “David” onto their shoulders, these companies might be aiming to create a more balanced competitive landscape.

Aravind Srinivas’s Perplexity has garnered attention for its innovative approach to AI, positioning itself as a formidable alternative to larger competitors. The startup’s focus on providing unique solutions and addressing specific market needs may resonate with users who are seeking alternatives to mainstream offerings.

However, the question remains whether Perplexity can sustain its momentum in a market that is heavily influenced by the actions and decisions of tech giants. The support from larger players could provide a significant boost, but it also raises concerns about the potential for overshadowing the startup’s unique identity and vision.

As the rivalry between Musk and Altman continues to unfold, the emergence of Perplexity serves as a reminder that the landscape of AI is not solely defined by the actions of a few prominent figures. Instead, it is a complex ecosystem where innovation can come from unexpected sources, challenging the status quo and reshaping the future of technology.

In conclusion, the competition in the AI sector is far from straightforward. With players like Aravind Srinivas and his Perplexity entering the fray, the dynamics of the industry are shifting. Whether this new contender can carve out its niche remains to be seen, but it undoubtedly adds an intriguing layer to the ongoing narrative of AI development.

Source: Original article

Google Invests $1B in AI Training for US College Students

Google is investing $1 billion over the next three years to advance artificial intelligence training and education initiatives in the United States, aiming to broaden access and influence the future of education.

Google announced a substantial investment of $1 billion dedicated to the implementation of artificial intelligence (AI) training and educational programs across the United States. Over the next three years, this initiative is set to transform how learning models are accessed and implemented, emphasizing the company’s commitment to shaping educational futures.

Core elements of Google’s investment include the development of new AI learning tools and the introduction of the Google AI for Education Accelerator. This innovative program will deliver free AI training and Google Career Certificates to every college student in over 100 U.S. universities and community colleges.

Further extending its reach, students aged 18 and above will be provided with a complimentary 12-month Google AI Pro plan. This subscription grants access to advanced AI tools such as NotebookLM for note-taking, Deep Research for custom reporting, and Veo 3 for video production.

Maureen Heymans, Google’s Vice President of Learning, highlighted the unique capabilities of Guided Learning—a feature designed to facilitate engaged learning through probing and open-ended questions. By acting as a companion, it strives to foster a deep understanding among students rather than simply providing answers. “Guided Learning represents an important step in our path to helping everyone in the world learn anything in the world,” Heymans stated, emphasizing the vast potential and shared responsibility accompanying the journey to ensure AI meets the diverse learning needs of all individuals.

This initiative follows Google’s release in June of new Gemini tools tailored for educational use, including Gemini for Education. Specifically crafted to address the unique demands of the educational community, this application aims to promote personalized learning, inspire idea generation, and enhance learning confidence within a secure framework.

Utilizing the advanced capabilities of Gemini 2.5 Pro, students and educators receive exclusive access to Google’s sophisticated AI models. The platform is underpinned by robust privacy measures, ensuring user data remains free from human review and untouched in AI model training. To expand accessibility, Google has integrated Gemini AI tools into Google Classroom for schools equipped with Google Workspace for Education, supplementing classroom capabilities with complementary resources.

Meanwhile, Microsoft’s June announcement detailed new AI features for educators within its Microsoft 365 Copilot, including a specific focus on Copilot Chat for teenage learners. AI is rapidly advancing educational practices, evidenced by a significant increase in AI usage among educators—growing from 59% to over 80% in one year, according to the tech firm’s findings. Despite this growth, a third of K-12 educators nationwide express a lack of confidence in deploying AI tools efficiently and ethically, with over half of the students surveyed indicating an absence of AI training.

Microsoft’s June statement highlighted the critical importance of collaborative engagement among students, educators, and the community. By addressing educational challenges collectively, stakeholders can forge a future equipped for AI and enable students to develop pertinent skills vital as various industries evolve.

Amazon, too, recognizes AI’s potential to revolutionize education and the workplace. The company projected in a 2024 blog that AI skills could propel productivity by at least 39% and boost salaries by up to 30%. However, it stresses the immediate necessity to bridge the AI skill gap within the workforce to fully capitalize on this technological potential.

Google’s current initiative not only earmarks a significant financial commitment but also paves the way for a transformative impact on future educational landscapes, as tech giants increasingly converge education with cutting-edge AI capabilities.

Vinay Mahajan: Championing Innovation, Community, and Industry Growth Through ITServe Alliance Celebrating Five Decades of Leadership and Transformational Initiatives

Vinay K Mahajan, President & CEO of NAM Info Inc., past National President and currently serving as the Governing Board member of ITServe Alliance, embodies five decades of dynamic leadership, innovation, and community empowerment in the technology sector. At the age of 71, Mahajan’s career spans entrepreneurship, technical innovation, and social responsibility, marking significant milestones for both NAM Info Inc. and the broader IT industry.

A Lifetime of Industry Leadership

VinayVinay Mahajan’s professional journey commenced with foundational roles at ICL and DCM Infotech Limited, followed by 38 years as an entrepreneur. After earning an engineering degree from Punjab Engineering College, Chandigarh, and an MBA from the Faculty of Management Studies, Delhi, Mahajan ventured into diverse arenas—IT hardware, manufacturing, software, telecom services, and most recently, data and artificial intelligence.

Mahajan’s extensive entrepreneurial portfolio includes over 100 projects in Communication/IVR/Call Centers software across India, launching a computer manufacturing unit in Bhiwadi, Rajasthan, and Healthcare Practice Management Software in the United States. His profound understanding of the IT landscape, innovation-focused leadership, and investment acumen have made him a pivotal figure in maintaining the US’s leadership in technology.

His entrepreneurial path has included both triumphs and setbacks, each enriching his expertise in R&D, finance, marketing, and leadership. Under his stewardship, the company has evolved from a consulting firm to a provider of data and AI solutions, specializing in Conversational AI, advanced data platforms, and analytics that drive digital transformation.

“A key part of this journey has been building NAM Info Inc, now a 25-year-old company with a global presence in the US, Canada, and India. NAM Info Inc. has evolved from a consulting organization into a provider of Data and AI products and solutions, with a strong focus on Conversational AI, Data Platforms, and Analytics, driving digital transformation for clients worldwide,” Mahajan says.

Mahajan has spearheaded strategic acquisitions, including a recent foray into Generative AI-enabled Telecom Services and Solutions launched in 2023, and the Inferyx Data Management and Data Analytics Platform, solidifying NAM’s leadership in emerging technologies. In 2024, Mahajan made a strategic investment in Inferyx and currently serves on its Board. Notably, Mahajan holds two patents, underscoring his commitment to innovation.

Driving Tech Innovation, Education, Empowerment, and Corporate Social Responsibility

As National President of ITServe Alliance, Vinay Mahajan expanded membership, launched new chapters, and increased advocacy for 2,000+ IT companies. Under his leadership, the organization grew to $12 billion in annual revenue, employing 175,000 IT professionals and championing high-skilled immigration reform and business-friendly policies nationwide.

Under Mahajan’s leadership, ITServe Alliance prioritized education and community empowerment, launching STEM scholarships, training programs, and initiatives supporting women and youth entrepreneurs. Monthly CSR activities and advocacy for favorable policies enhanced industry growth, job creation, and community support, reflecting Mahajan’s commitment to innovation, education, and social responsibility.

Global Perspective and Continued Learning

Mahajan’s influence extends globally through his engagement with the Punjabi Chamber of Commerce, where heVinay Majan Honored With IAPC ‘s Lifetime Achievement Award 1 fosters U.S.-India business cooperation and supports entrepreneurship within diaspora communities.

“If there’s one lesson this journey reinforces, it’s that learning has no age, and reinvention keeps you alive,” he says. Mahajan continues to pursue learning despite having spent 50 years in the industry. He recently enrolled in the Wharton Executive Education “Scaling a Business: How to Build a Unicorn” program, blending decades of experience with fresh insights to propel NAM Info Inc.’s data and AI initiatives to new heights.

“After five decades in business, the excitement of learning hasn’t dimmed. My goal is to combine years of practical experience with fresh insights to scale our #dataanalytics and #AI initiatives to the next level,” Mahajan says.

Mahajan was part of an esteemed panel at India’s premier tech event, the INDIA INNOVATION & TECHNOLOGY SUMMIT, 25th edition of IndiaSoft, held at Bharat Mandapam, New Delhi in March this year, along with Amitabh Roy (Founder & Director, Codelogic), Rohit Chauhan (Head, India Corporate Affairs, Tata Consultancy Services), and moderator Sanjay Agarwala (Director, Eastern Software Solutions) for a thought-provoking discussion on “Enhancing the Share of IT Products in the Indian Tech Industry.

“It was an honor to participate in IndiaSoft 2025 in Delhi organized by ESC India, representing NAM Info Inc. The event was a resounding success, bringing together over 700 international delegates from 70+ countries, 1,500+ exhibitors, and more than 50,000 visitors,” Mahajan added.

A Lasting Legacy

Deeply committed to community empowerment, Mahajan is an active member of the Punjabi Chamber of Commerce, where he brings a unique blend of business acumen, policy influence, and global partnership building. He regularly engages in dialogues that promote U.S.-India business cooperation, STEM education, and entrepreneurship among diaspora communities.

Recognizing his accomplishments and contributions, Vinay Mahajan was honored with the prestigious Lifetime Achievement Award during the 9th annual Gala and Awards ceremony organized by the Indo-American Press Club in October 2023 at the Stamford Hilton, CT.

Mahajan’s journey is a testament to the power of lifelong learning, reinvention, and community impact. His leadership at NAM Info Inc. and ITServe Alliance continues to shape the industry while empowering individuals and communities through innovation, education, and social responsibility.

Trump Proposes 100% Chip Tariff for Non-U.S. Manufacturers

President Donald Trump announced plans for a 100% tariff on semiconductor imports unless companies manufacture within the United States.

President Donald Trump stated on Wednesday that a 100% tariff on imported semiconductors and chips would be imposed. However, companies that manufacture their products in the United States will remain exempt from these duties. This new sector-specific tariff highlights Trump’s ongoing efforts to incentivize companies to relocate their manufacturing operations to the U.S.

The details surrounding this plan, such as the extent of U.S. manufacturing required to qualify for the tariff exemption, have not yet been revealed. Speaking from the Oval Office, Trump emphasized the significant impact of the impending tariffs. “We’re going to be putting a very large tariff on chips and semiconductors,” Trump remarked. The policy aims to encourage tech giants like Apple to continue expanding their U.S.-based manufacturing.

Trump cited Apple as an example of a company that would benefit from the exemption, provided they are “building in the United States or have committed to build, without question, committed to build in the United States.” As a result, Apple would avoid the 100% tariffs due to their recent commitment to increase their U.S. investment by $100 billion over the next four years, supplementing the $500 billion they have pledged previously.

Several prominent chip manufacturers, including Taiwan Semiconductor Manufacturing Company (TSMC), Nvidia, and GlobalFoundries, have already announced plans to extend their manufacturing operations in the U.S. The Semiconductor Industry Association reports that more than 130 projects, valued at a combined $600 billion, have been announced across the U.S. since 2020.

TSMC, recognized as the world’s largest contract chip producer, has pledged a $165 billion investment in U.S. manufacturing. In a similar move, Nvidia, identified as the world’s most valuable company in market terms, declared intentions in April to allocate $500 billion towards AI infrastructure in the U.S. over the following four years.

GlobalFoundries made a significant commitment in June, expressing plans to invest $16 billion to expand its semiconductor manufacturing facilities in New York and Vermont. Texas Instruments also revealed in June its intentions to enhance its presence in the U.S. market with a $60 billion investment into seven chip fabrication sites. This move aims to strengthen relationships with other major customers, including Apple, Ford, Medtronic, Nvidia, and SpaceX.

As companies navigate these tariffs and consider their implications, the incentive to base or expand manufacturing operations within the U.S. could reshape the semiconductor and chip industries significantly.

According to CNBC, the comprehensive details surrounding these tariffs and their potential ramifications for manufacturers will be closely watched by industry stakeholders.

OpenAI Provides ChatGPT to Federal Agencies for $1 Yearly

OpenAI will offer its ChatGPT service to federal agencies for $1 a year in a new partnership with the General Services Administration (GSA).

OpenAI announced on Tuesday that it will provide its artificial intelligence (AI) model, ChatGPT, to federal agencies for a nominal fee of $1 per year. This initiative is part of a new partnership with the General Services Administration (GSA).

The announcement followed the GSA’s decision to add OpenAI’s AI model to its government purchasing system. This update also includes options for Google’s Gemini and Anthropic’s Claude, expanding the AI tools available to federal agencies.

Sam Altman, CEO of OpenAI, emphasized the importance of making AI accessible to public servants. “One of the best ways to make sure AI works for everyone is to put it in the hands of the people serving the country,” he stated in a press release.

Altman further noted, “We’re proud to partner with the General Services Administration, delivering on President Trump’s AI Action Plan, to make ChatGPT available across the federal government, helping public servants deliver for the American people.”

This initiative offers participating federal agencies access to ChatGPT Enterprise at the symbolic price of $1 for the coming year. Additionally, these agencies will receive 60 days of unlimited access to more advanced ChatGPT features. OpenAI highlighted its commitment to security, reassuring users that data inputs and outputs would not be used to train its models.

Similarly, Anthropic is reportedly planning to provide its models to government agencies for just $1, according to Axios. Such efforts align with a broader governmental push to integrate advanced AI models more comprehensively, spurred by President Trump’s recent AI framework.

The AI framework announced last month calls for an accelerated adoption of AI technology by the government. Part of this plan includes the establishment of an AI procurement toolbox to be managed by the GSA. This toolbox will enable government agencies to select from a variety of AI models while remaining compliant with privacy, data governance, and transparency laws.

OPT Changes Could Impact Indian Talent, US Tech Economy

The potential elimination of the Optional Practical Training (OPT) program poses a significant threat not only to international students, particularly those from India, but also to the U.S. technology sector that relies heavily on skilled foreign talent.

In Washington, the Optional Practical Training (OPT) program is currently under scrutiny as potential legislation threatens its future. H.R. 2315, known as the “Fairness for High-Skilled Americans Act of 2023,” was introduced by Republican Congressman Paul Gosar on April 10, 2023. The bill, now under committee review, seeks to terminate the post-study work rights for international students on F-1 visas. Advocates of the bill argue OPT serves as a “shadow guestworker program,” but its opponents warn of significant consequences for the U.S. economy and global talent dynamics.

The OPT program allows international students to gain work experience in their field of study after graduation. According to the 2024 SEVIS “By the Numbers” report by U.S. Immigration and Customs Enforcement, 194,554 students were on OPT in 2024, a 21.1% increase from 2023. This included 95,384 students on a 24-month STEM-OPT extension, with Indian students comprising 48% of these participants—the equivalent of nearly 45,800 engineers, coders, analysts, and scientists contributing to American firms.

The critics of OPT often argue that it displaces U.S. graduates, but proponents emphasize that the tech economy relies on international expertise, with Indian students playing a crucial role. In 2024 alone, Amazon hired 5,379 OPT students and 6,632 STEM-OPT extension workers, with other tech giants like Google, Apple, Microsoft, and Tesla also employing thousands from this talent pool. Companies like Citigroup, Oracle, Bloomberg, Qualcomm, and NVIDIA are among the top STEM-OPT employers, offering roles in pivotal fields such as AI, cybersecurity, and quantum computing.

Should OPT be eliminated, Indian students will face substantial challenges. Without the program, they lose a valuable pathway to work experience, debt repayment, and career advancement. OPT serves as a critical bridge to the H-1B visa and long-term employment in the U.S. The financial implications are also severe; Indian students often invest between $60,000 and $100,000 in a U.S. STEM degree, and without OPT, the return on this investment becomes questionable.

University enrollment from Indian students has already shown signs of decline, decreasing by over 28% from March 2024 to March 2025, according to SEVIS data. This trend highlights the potential fallout if the OPT program is dissolved. Without the program, international students may seek opportunities in other countries with more accessible pathways, like Canada or Germany, causing a ripple effect on U.S. educational revenues and innovation.

Supporters of the bill argue that OPT is a backdoor to employment, asserting that the U.S. should prioritize local workers. However, critics suggest the bill could undermine the U.S.’s competitive edge and innovation by cutting off a critical supply of skilled labor. Many influential figures in tech, such as Google’s Sundar Pichai and IBM’s Arvind Krishna, began their U.S. careers on F-1 visas with OPT, further underscoring its importance to cultivating industry leadership.

The debate over OPT encapsulates a broader discussion about the balance between immigration policy and economic growth. The elimination of OPT not only threatens the dreams of international students but could also have a significant adverse impact on America’s tech future, university funding, and its innovation pipeline, which depends heavily on global talent.

In conclusion, the termination of the OPT program may have far-reaching consequences that extend beyond student hardships. It risks damaging the U.S.’s competitiveness, labor market, and position as a global leader in tech and innovation—concerns supported by organizations such as the Business Roundtable, TechNet, and the U.S. Chamber of Commerce, who have opposed the proposed legislation.

According to The Times of India, the situation remains fluid as the bill undergoes further review. Its outcome will significantly influence not only international students but also the very fabric of the U.S. tech economy.

Senate Republicans Continue Dispute with TSA on Facial Recognition Bill

Senate Republicans accuse the TSA of orchestrating lobbying efforts to derail legislation limiting the use of facial scanning technology at airports.

Senate Republicans are alleging that the Transportation Security Administration (TSA) played a pivotal role in undermining a bipartisan bill aimed at restricting the use of facial recognition technology in airport security. This accusation arises from a recent setback in advancing the legislation, which was shelved from consideration by the Senate Commerce Committee due to intense lobbying efforts.

Commerce Committee Chair Ted Cruz was forced to postpone the bill, which sought to impose limitations on airport security screening technologies. While the travel industry’s overt lobbying efforts created uncertainties among committee members, Republicans supporting the bill claim the TSA, bolstered by its political appointees, secretly orchestrated a campaign against the measure.

Sen. John Kennedy (R-La.), co-sponsor of the bill, expressed his frustration, likening the TSA’s opposition to diligent sabotage. “They’re working like an ugly stripper to kill this bill, which tells me we’re doing the right thing,” Kennedy remarked.

A senior GOP aide described the agency’s lobbying fingerprints as detrimental to the bill’s progress and suggested that this could negatively impact Ha Nguyen McNeill, the acting head of the TSA, especially as President Donald Trump is expected to nominate her for permanent administrator. The issue also highlights a potential discord within the administration, with DHS Secretary Kristi Noem reportedly not opposing the legislation.

The proposed bill mandates the TSA to inform passengers about their option to opt out of facial recognition screenings and to implement safeguards on storing biometric data. Sen. Jeff Merkley (D-Ore.), the bill’s primary advocate, has compared the TSA’s growing use of facial recognition with systems used by authoritarian governments like China, raising concerns over privacy violations.

Merkley attempted to incorporate these provisions in last year’s FAA reauthorization, but faced fierce opposition from various travel industry stakeholders. They argued that such measures would allow bad actors to evade security checks and extend wait times at airports. Ryan Propis, vice president of security at the U.S. Travel Association, noted the lack of transparency and hearings which were initially promised.

Despite public industry opposition, some lawmakers assert that the TSA’s behind-the-scenes maneuvers were instrumental in the bill’s withdrawal. Cruz affirmed these suspicions, saying, “undoubtedly,” when asked if he believed the TSA itself was expressing concerns about the legislation.

The debate also involves technology companies benefiting from sophisticated biometric systems, now employing AI algorithms for identity verification. Associations representing these industries, including the Security Industry Association and the International Biometrics and Identity Association, sent correspondence to chair Cruz, opposing the bill on the grounds that it contradicted the administration’s goals of reducing personnel through technological advancements.

President Trump’s administration has emphasized cost-cutting measures in federal agencies, advocating for technological integration such as artificial intelligence as a more efficient alternative. During a May House appropriations meeting, McNeill spotlighted the TSA’s ongoing adoption of state-of-the-art screening technologies as a crucial investment.

Despite the recent delay in committee proceedings, Cruz and other committee members remain optimistic about reconciling differences, expressing confidence that the bill will advance in forthcoming sessions. Cruz stated, “I think the bill will get marked up, and it’s going to pass.”

According to Politico, the episode sheds light on the tension between agency endeavors to embrace new technologies and legislative oversight focused on privacy concerns.

Google CEO Sundar Pichai Addresses IT Layoffs with Employees

Google CEO Sundar Pichai has urged employees to do more as the tech giant navigates challenges brought on by widespread layoffs in the IT industry, primarily due to artificial intelligence advancements and economic uncertainties.

Amid a bleak outlook for the global IT sector, Google CEO Sundar Pichai has issued a directive to his workforce with a simple but significant message: “I think we have to accomplish more.” This statement was made in an internal town hall meeting and reiterated through a company-wide memo directed at Google’s employees worldwide, emphasizing the need for increased productivity, innovation, and responsible corporate behavior.

Pichai’s communication emerges at a pivotal time for Google and its parent company, Alphabet, both of which are facing increasing competition in emerging fields such as artificial intelligence (AI) and cloud services. These challenges are compounded by broader economic pressures prompting major firms to reconsider and restructure their human capital.

In his message to employees, Pichai underscored the expectation that “The world is looking to Google for leadership and responsible innovation.” He urged employees to push their limits, work more smartly, and elevate the standards of success. Google aims to channel its resources strategically into areas considered key for future growth. These priorities include making substantial investments in AI, developing cutting-edge climate technology, and creating next-generation search experiences.

Pichai highlighted the importance of speeding up execution to rapidly convert ideas into tangible outcomes. He insisted on optimizing internal operations, eliminating redundancies, and enhancing collective team productivity by reviewing projects to ascertain their alignment with Google’s strategic targets.

Moreover, Brian Saluzzo, a leading figure at Google, stressed the importance of equipping software engineers with advanced tools to make “everybody at Google be more AI-savvy.” This involves integrating AI into coding processes to address leading needs and accelerate development timelines.

To support these initiatives, Saluzzo mentioned the creation of a robust suite of AI products designed for employees to facilitate faster progress. A focal point of this development is a platform called “AI Savvy Google,” which acts as a central resource hub. It offers diverse resources, including specialized courses, practical toolkits, and engaging learning sessions, to help employees better navigate the AI landscape.

According to Financial Express, these moves reflect Google’s proactive approach to maintaining its competitive edge while adapting to rapidly evolving technological and economic landscapes.

India Advancing With Digital Currency e₹ (e-rupee)

Cryptocurrencies, especially Bitcoin, have gained considerable global attention, but a significant development is also taking place in India with the launch of the “e-rupee,” or digital currency, by the Reserve Bank of India (RBI). This initiative represents a crucial advancement in the evolution of money.
INDIA ADVANCING WITH DIGITAL CURRENCY 1The e₹ (e-rupee) is set to function as legal tender in a digital format, with major banks in India gradually informing their customers about its applications. The objective is to integrate digital currency into everyday financial transactions, much like how ATMs and credit cards are used today.
The e-rupee introduces a new category of currency that is coded, sovereign, and programmable, which could redefine our understanding of currency value and financial interactions. This transition promises not only greater convenience but also empowers individuals to have increased control over their financial futures. Through this initiative, India is positioning itself as a leader in a transformative financial landscape.
The e-rupee functions similarly to paper money but offers programmable features that can dictate how, when, and where it is used. This capability introduces a new level of control in financial transactions.
An essential aspect of this system is the e-wallet, a digital wallet that allows users to manage and store digital rupees conveniently on their mobile devices. E-wallets are considered secure, often more so than traditional payment methods such as credit cards or cash, provided they are used correctly.
A notable example of the e-rupee’s application is the Subhadra Yojana, launched in Odisha in September 2024,INDIA ADVANCING WITH DIGITAL CURRENCY 2 where Rs 10,000 in digital rupees was directly transferred to 12,000 women quickly, securely, and without intermediaries. This transaction demonstrated the potential for digital accountability, illustrating how CBDCs can enable targeted financial support for specific purposes, thereby transforming governance and welfare distribution.
Currently, over 130 countries are exploring central bank digital currencies. In India, tests for offline payments, interbank settlements, and regulated cross-border operations are already in progress, particularly with the UAE and ASEAN nations.
The shift towards sovereign digital money will have significant implications for investors and market participants. This transition is expected to enhance transparency, requiring companies to adapt their payment processes. It will enable clearer visibility into the performance of various fintech enterprises and may streamline operations in banking, microfinance, and regulatory compliance.
Digital currency represents a strategic evolution of India’s monetary structure, impacting policies, investment opportunities, and the mechanics of financial transactions. Financial professionals who overlook this shift risk missing new emerging pathways, while those who embrace it may find new avenues for investment as the future of money unfolds.

NASA Plans to Access Largest Gold Reserve in Universe

NASA’s identification of the asteroid Psyche, potentially the largest reserve of precious metals in the universe, has sparked massive speculation about future space mining possibilities, as the asteroid holds an estimated value of 700 trillion euros.

NASA’s recent findings regarding the asteroid Psyche have captivated global attention, as the celestial body situated in the asteroid belt between Mars and Jupiter is believed to contain abundant reserves of precious metals such as gold, iron, and nickel. This revelation has led to heated discussions about the economic possibilities of space mining, stirred by the prospect of unlocking an estimated 700 trillion euros in resources. Despite the tantalizing possibilities, experts urge caution in anticipating rapid transformations in wealth distribution.

The Psyche asteroid was first discovered in 1852 by Italian astronomer Annibale de Gasparis. Since then, it has evolved from an ordinary space rock to a focal point of scientific interest and economic speculation. Psyche’s estimated surface area exceeds 165,000 square kilometers, and its metal-rich composition includes iron, nickel, and gold, which is believed to account for 30% to 60% of its total volume.

NASA’s heightened interest in Psyche culminated in the launch of the Psyche mission in 2023. This mission aims to reach the asteroid by 2029 employing solar-electric propulsion, with plans for an extensive study using advanced instruments such as spectrometers, magnetometers, and multispectral cameras. While there is curiosity surrounding potential economic gains from Psyche, the mission’s primary objective is to glean insights into the formation of rocky planets and evaluate whether Psyche represents one of the original building blocks of our solar system.

The lofty dream of harvesting the asteroid’s resources, however, remains beyond our reach at the moment. The reality of space mining is fraught with technological, financial, and regulatory challenges that must be addressed before any such ventures can materialize. The notion of retrieving substantial amounts of gold, for example, while tantalizing, is not factored into current plans, despite private companies and space agencies already exploring the feasibility of extraterrestrial mining.

The notion of a new ‘gold rush’ in space raises questions about the potential societal implications. Should a mission successfully transport more gold to Earth than the planet’s existing annual production, the ripple effects could drastically alter economic conditions and heighten debates over regulatory frameworks. Issues of legal ownership, ethical usage, and environmental impact remain unresolved, prompting the need for comprehensive discussions on the management of space-derived resources.

While the possibilities of abundant space resources ignite the imagination and hold the potential for transformative economic impact, many hurdles need to be overcome. Psyche’s allure remains tantalizing, but the road to capitalizing on its full potential is marked by obstacles that include not only technological advancements but also the establishment of cooperative international frameworks to manage access and distribution effectively.

As discussions around Space Psyche advance, the global community must brace for the profound shifts that could accompany an era of space mining, acknowledging both its potential benefits and far-reaching ramifications.

UK Air Traffic Control Disruption Affects International Flights

The UK experienced widespread disruption to international flights following a technical problem at the National Air Traffic Service’s Swanwick control center.

Thousands of passengers faced delays and disruptions as a result of a technical issue that affected the National Air Traffic Service (NATS)’s operations at its Swanwick control center in the United Kingdom. The problem led to a significant reduction in the number of aircraft allowed to fly in the London control area as a precaution to ensure safety.

In a statement, NATS confirmed, “As a result of a technical issue at NATS Swanwick air traffic control center, we are limiting the number of aircraft flying in the London control area in order to ensure safety, which is always our first priority.” The agency expressed regret for any inconvenience caused by this unexpected issue, emphasizing their commitment to resolving the problem promptly.

Engineers are actively working on a solution, although there remains uncertainty about when normal operations will resume. Travelers are advised to contact their airlines for the latest updates concerning their individual flights.

Gatwick Airport also issued a statement acknowledging the significant impact on outbound flights across the UK. According to the airport, “A technical issue impacting NATS is affecting all outbound flights across the UK. There are currently no departures from London Gatwick while the situation is being resolved. We are working with NATS to resume flights as quickly as possible. Inbound flights are still landing at the airport. Passengers should check the status of their flights with their airline.”

Newcastle International Airport provided a similar update via social media, reporting that, “An issue in London’s airspace is impacting national airport operations and all departures are currently suspended. We will provide an update in due course.”

The technical glitch temporarily grounded and diverted flights in Britain, though it was resolved with the assistance of NATS engineers. However, airport authorities cautioned that full service would take time to restore, as many aircraft and crews were out of their regular positions due to the delays.

Transport Secretary Heidi Alexander acknowledged the impact of the disruption and noted that while the system has been restored, travelers should remain vigilant and check with individual airports and airlines for further advice and updates.

The technical issue originated at NATS’ Swanwick center, located southwest of London, and necessitated a reduction in air traffic control capacity to maintain safety, as reported by PTI.

Google CEO Becomes Billionaire; Advises Gen Z on Success Secrets

Google CEO Sundar Pichai, now a billionaire, advocates for embracing discomfort as a means to personal and professional development, a lesson he shares with Generation Z to guide them toward success.

Sundar Pichai, the CEO of Google and newly inducted billionaire, emphasizes the importance of stepping outside comfort zones as a pathway to progress. This mindset, he suggests, has been instrumental in his journey from an unknown product manager to leading a $2.3 trillion global tech company. Speaking to Generation Z, Pichai advises that while traditional career advancements might seem logical, following one’s heart can often lead to discovering one’s true passion.

Pichai acknowledges that the road to success isn’t devoid of challenges, even for prominent leaders. He admits to moments of self-doubt, sensing others in his surroundings excelled beyond his capabilities. However, he reassures young individuals that such discomfort is an integral part of growth.

“At various points in my life, I’ve worked with people who I felt were better than me,” Pichai shared on Lex Fridman’s podcast. “You want that feeling a few times, trying to get yourself in a position where you’re working with people who you feel are kind of like stretching your abilities, is what helps you grow.

“Putting yourself in uncomfortable situations, and I think often you’ll surprise yourself,” he added.

Having started as a product manager in 2004, Pichai climbed the ranks at Google on the strength of this philosophy and caught the attention of cofounders Larry Page and Sergey Brin, eventually being named CEO in 2015. Although he concedes that an element of luck plays a role in success, he stresses the importance of pursuing what one loves—even if it initially seems irrational.

“You’re thinking about what you want to do, your brain is telling you something. But when you do things, I think it’s important to listen to your heart, and see whether you actually enjoy doing it,” Pichai said.

Success, according to Pichai, also involves surrounding oneself with the right people. He highlights the significance of working with driven individuals on collaborative journeys, which has been crucial in transforming Google into a multitrillion-dollar corporation.

“You find mission-oriented people who are in the shared journey, who have this inner drive to excellence, to do the best, and motivate people, and you can achieve a lot that way,” he said.

The culture of excellence at Google might also entail extended working hours beyond the conventional nine-to-five, as revealed in an internal memo by Sergey Brin. This memo, seen by the New York Times, urged AI-focused employees to be present in the office throughout the week, suggesting 60-hour workweeks as the optimal benchmark for productivity. Although Pichai has expressed support for more flexible work environments, the competitive landscape in AI demands tech giants strive for supremacy.

Despite high-pressure scenarios, Pichai maintains a calm manager demeanor. He believes self-motivated employees usually recognize their errors quickly, and a managerial overreaction could exacerbate the situation.

“At times, you’re working with people who are so committed to achieving, if they’ve done something wrong, they feel it more than you do, so you treat them differently,” Pichai explained. “Occasionally, there are people who you need to clearly let them know, like, ‘That wasn’t okay,’ or whatever it is, but I’ve often found that not to be the case.”

While Pichai has recently joined the billionaires’ circle, his wealth contrasts sharply with that of Google’s cofounders. Larry Page and Sergey Brin rank among the world’s top 10 richest individuals, holding net worths of approximately $174 billion and $163 billion, respectively, compared to Pichai’s $1.1 billion.

In 2009, Larry Page advised college graduates to focus on solving problems that would eventually enable greater efficiency.

“Technology, and especially the internet, can really help you be lazy,” Page told University of Michigan students. “Find the leverage in the world, so you can be more lazy.”

Contemporary challenges, including AI’s impact on the job market, present unique obstacles to today’s youth, much like what graduates faced during the Great Recession. Nevertheless, Page encourages perseverance.

“Overall, I know it seems like the world is crumbling out there, but it is actually a great time in your life to get a little crazy, follow your curiosity, and be ambitious about it,” he said. “Don’t give up on your dreams. The world needs you all.”

According to Fortune, Pichai’s insights offer valuable guidance for Gen Z’s burgeoning workforce.

Source: Original article

FBI Cautions Chrome Users Against Specific Updates Downloading

The FBI and CISA have issued a warning regarding a surge in Interlock ransomware attacks, emphasizing the danger posed by unofficial Chrome updates and advising users to avoid such traps for device security.

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have recently cautioned individuals and organizations about a rising threat from Interlock ransomware attacks. As part of the ongoing #StopRansomware initiative, this warning targets malicious tactics aimed at compromising user devices.

The prevalence of Google Chrome as a default browser on Windows PCs, despite competition from Microsoft’s Edge and emerging AI browsers, makes it a prime target for cyberattacks. Attackers exploit its widespread use, devising ways to gain unauthorized access to personal data and systems. As a result, Chrome users often encounter a series of zero-day vulnerabilities prompting urgent updates.

Unfortunately, one of the primary means by which cybercriminals enter systems is by tricking users into installing fake Chrome updates. The FBI’s latest advisory warns that these counterfeit updates are designed as remote access trojans (RATs), which execute malicious scripts that can access startup files. This method enables continuous remote access every time the device is restarted.

The advisory points out that these deceptive entry tactics are not exclusive to corporate networks. If individuals use personal computers or smartphones connected to corporate systems, they too become susceptible. By exploiting user behavior and common browsing habits, attackers can also access personal accounts and sensitive information.

Among the tactics outlined, one is ClickFix. This scheme involves fraudulent messages or popups prompting users to enter commands into Windows to fabricate issues requiring user action. These are unequivocally attacks, and any prompt to insert or execute foreign scripts should be dismissed.

However, the more prevalent threat flagged is that of fake Chrome updates. These malicious updates can also appear on Android devices, further broadening the threat landscape. When users are prompted to download updates via emails or messages, they should be wary. Official updates are automatically downloaded by Chrome itself, which then requires a browser restart—ensuring users do not need to manually search or respond to unsolicited links.

This wave of Interlock ransomware, having emerged last year, is notable for its exploitation of straightforward lures that have been increasingly observed in cyber threats. Unlike typical ransomware methods, which focus on infected files and databases, this approach underscores the importance of vigilance against seemingly innocent user interactions.

As a prudent measure, the advisory urges users to download applications and updates only from official websites or trusted app stores, circumventing the risk of malicious links. By maintaining safe downloading practices and ensuring systems are regularly updated using authorized sources, the threat posed by these deceptive tactics can be significantly mitigated.

Additionally, organizations are encouraged to educate users about these social engineering techniques to bolster their overall cybersecurity posture. Users should remain alert to signs of potential deception and verify any suspicious communications before taking action.

In light of current threats, updating Chrome through official means remains imperative. Google has recently released high-severity security updates, underscoring the need for timely installations to protect against exploits.

For those aiming to enhance their network defenses, it is crucial to remain knowledgeable about these evolving ransomware tactics. Ongoing education, combined with a consistent approach to cybersecurity best practices, will be pivotal in safeguarding digital infrastructures against such incursions.

According to Forbes, these advisories serve as a critical reminder of the rapidly changing threat landscape within the realm of cybersecurity.

GENIUS Act Enables Stablecoin Adoption via Mastercard

Mastercard stands poised to play a pivotal role in the burgeoning stablecoin ecosystem following the passage of the GENIUS Act, which ushers in a new era of regulatory clarity for digital assets with significant potential for global adoption.

On July 18, President Donald Trump signed the GENIUS Act into law, providing a regulatory framework for stablecoins. This development closely followed Mastercard’s announcement regarding its future role in the regulated cryptocurrency space. Mastercard views the legislation as the start of “a new era of regulatory clarity and confidence in digital assets,” according to a company article titled “Stablecoins are taking center stage,” authored by Jesse McWaters, Executive Vice President and Head of Global Policy at Mastercard.

McWaters emphasizes the importance of regulatory frameworks in other regions, such as Europe’s Markets in Crypto Assets (MiCA), and similar legislation in Hong Kong, Singapore, and the United Arab Emirates. These measures create a secure environment for digital assets, bolster trust, and stimulate innovation that yields real-world benefits. According to McWaters, stablecoins already enhance the financial experiences of content creators and gig workers by offering a quicker and cheaper remittance method compared to traditional payment tools. Still, he notes that stablecoins must be integrated within a trusted system, a role he believes Mastercard is well-suited to fulfill.

Highlighting Mastercard’s history of involvement in pioneering technologies, McWaters suggests the company has long been preparing for the time when stablecoins assume a central role. Mastercard aims to establish a compliance-first ecosystem that allows stablecoins to scale safely, seamlessly integrating them into the global financial system without losing the unique advantages of cryptocurrencies, such as flexibility and convenience. Key projects like the Mastercard Multi-Token Network and Mastercard Crypto Credential are instrumental in this vision, and the company’s global partnerships are poised to support a smooth user experience.

McWaters cites recent favorable crypto regulations in several countries as a gateway to an innovative future, a path that Mastercard is eager to pursue. To make cryptocurrencies as user-friendly as traditional currency, Mastercard is developing solutions such as the Mastercard Crypto Credential. This human-readable credential aims to simplify user experiences by replacing complex blockchain addresses with easily manageable credentials, specifically targeting crypto exchanges and everyday users to facilitate smoother interactions.

Another significant Mastercard initiative is the Multi-Token Network, a business-to-business platform designed to facilitate crypto transactions between financial institutions and companies, reflecting the ongoing trend of tokenizing assets. This platform is available 24/7 for both financial institutions and application providers, providing constant access to crypto transactions.

Mastercard’s collaboration with MoonPay, a platform specializing in crypto on- and off-ramps, aims to integrate Mastercard-branded cards with crypto wallets. This partnership, which was announced in May and involved a brainstorming session earlier in the month, will allow cardholders to use stablecoins at locations accepting Mastercard. The objective is to fundamentally transform payments and the very nature of money itself, a move referred to by MoonPay CEO Ivan Soto-Wright as “backwards compatibility,” as it extends the use of crypto beyond its initial applications.

Regarding regulations, Mastercard acknowledges the various legislative efforts around the world, including the American GENIUS Act, European MiCA, Singaporean Payment Services Act, UAE’s Law No. (4) of 2022, and Hong Kong’s drafted ASPIRe legislation. These regulations support the legal use of stablecoins, mitigating the constraints of restrictive securities laws while implementing protective measures to combat money laundering and other illicit activities. It appears that Mastercard was awaiting federal-level crypto adoption in the U.S. before expanding its crypto acceptance aggressively.

However, the GENIUS Act has not been universally well-received in the U.S. Some Democrats argue that while the legislation includes certain protections, it lacks mechanisms to prevent the misuse of cryptocurrencies by top officials for corrupt purposes. Nevertheless, Mastercard appears determined not to let such concerns impede their progress toward mass adoption of digital assets.

Study Finds Early Smartphone Use Tied to Suicidal Thoughts, Aggression

Children who receive their first smartphone before the age of 13 face significantly higher risks of mental health challenges in early adulthood, including suicidal thoughts, aggression, and emotional instability, according to a global study involving over 100,000 young people.

Children introduced to smartphones before turning 13 may face substantial mental health challenges as young adults, a global study involving over 100,000 participants reveals. The study, published in the Journal of Human Development and Capabilities, discovered that individuals aged 18 to 24 who received their first smartphone at 12 or younger are more likely to exhibit symptoms such as detachment from reality, poor emotional regulation, low self-worth, and increased aggression.

Researchers attributed these issues to early smartphone access, potentially leading to premature exposure to social media. This exposure can result in cyberbullying, disrupted sleep patterns, and strained family relationships, according to the study findings.

Dr. Tara Thiagarajan, the lead author of the study and a neuroscientist from the U.S.-based Sapien Labs, emphasized the profound impact early smartphone ownership can have on mental health and well-being by early adulthood. She cautioned that the symptoms associated with this issue often diverge from traditional forms of depression and anxiety, potentially eluding conventional screening methods.

The research team urged policymakers to adopt precautionary measures akin to those regulating alcohol and tobacco. Recommendations include restricting smartphone access for children under 13, mandating digital literacy education, and holding technology companies accountable for the psychological effects associated with their platforms.

Several countries, such as France, the Netherlands, Italy, and New Zealand, have already initiated measures by implementing restrictions or banning the use of cell phones in schools. In the United States, various states have enacted legislation requiring schools to establish clear policies on smartphone usage among students.

For the study, Sapien Labs utilized the Mind Health Quotient (MHQ), a self-assessment tool to evaluate social, emotional, cognitive, and physical well-being, generating an overall mental health score. Young adults who had smartphones by age 13 consistently scored lower on the MHQ, with scores declining the earlier they gained smartphone access.

Female participants who acquired smartphones early were more likely to experience diminished self-image, self-worth, confidence, and emotional resilience. Males in the same category reported lower levels of calmness, emotional stability, self-worth, and empathy. Dr. Thiagarajan noted that their evidence indicates childhood smartphone ownership serves as an early gateway into AI-powered digital environments, profoundly affecting mental health and well-being in adulthood with serious implications for individual agency and societal development.

According to IANS, the study highlights the urgent need for strategic interventions to address these growing concerns, as they hold significant bearings on future generations.

Coinbase CEO: Stablecoin Bill Marks Financial Shift in America

Coinbase CEO Brian Armstrong asserts that the enactment of a stablecoin bill heralds a new financial era in the United States.

On July 18, President Donald Trump signed the GENIUS Act into law, marking a pivotal moment aimed at bolstering the U.S. dollar’s status as a reserve currency and positioning the United States as a leader in the realm of digital assets. This new legislation establishes a regulatory framework for stablecoins—cryptocurrencies pegged to the U.S. dollar—requiring each token to be fully backed by liquid assets like cash or short-term U.S. Treasuries.

In a recent interview with CNBC, Brian Armstrong emphasized the transformative potential of the law, suggesting it enables the United States to efficiently facilitate global money transfers. “This stablecoin bill passing into law is really a financial revolution for America,” Armstrong stated. “It means crypto can finally start updating the financial system, especially for our payments, which are running on these creaky old systems that are decades old. Now, every payment in our economy can be fast, cheap and global – under one second, one cent, anywhere in the world.”

Armstrong anticipates that blue-chip companies will increasingly adopt stablecoin payments to minimize transaction costs now that the legal landscape is clearer.

“Now that we have clear legislation, we’re going to see the Fortune 500 really start to adopt stablecoins,” Armstrong remarked. “We’ve started to see this a little bit already even with the news that this was going to pass in the near future. Coinbase just launched an integration with Shopify, for instance, and we’ve seen announcements from Walmart and Amazon. Almost every Fortune 500 company is now coming in and starting to look at stablecoin payments.”

He highlighted this development as a significant growth opportunity, noting its potential to expand the total addressable market for Coinbase. “This is a big opportunity for us,” Armstrong said. “And we think that we can provide these wallets and payment APIs for the whole financial system and every company, eventually.”

According to Daily Hodl, the inception of the GENIUS Act could signify the dawn of a new era where digital assets play a central role in the U.S. financial ecosystem.

Many Teens Use AI for Chatting, Prefer Human Interaction

Nearly three-quarters of U.S. teenagers have interacted with AI tools, using them for activities such as advice seeking, flirting, and deep conversations, a new study reveals.

Teenagers have traditionally turned to each other for advice, flirting, and sharing profound conversations. However, a new study indicates that nearly 75% of U.S. teens have used artificial intelligence (AI) tools for these activities at least once.

Conversational AI systems like CHAI, Character.AI, Nomi, and Replika present compelling opportunities for teens to engage in role-playing, seek support for mental health issues, or simply chat. The nationwide study, released by Common Sense Media, a nonprofit organization focused on media reviews and research funding for young people, highlights these tools as “digital friends or characters you can text or talk with whenever you want.” These AI companions are distinguished from AI assistants, image generators, or academic help tools.

The findings reveal that over half—52%—of teenagers use AI companions regularly, engaging with them at least a few times each month. “They’re using them for entertainment purposes, out of curiosity,” said Michael Robb, head of research at Common Sense Media. “Despite this, teens still spend more time with real friends and find human conversations more satisfying. But if you scratch the surface, some alarming trends emerge.”

For instance, one-third of teens surveyed admitted to having serious discussions with AI companions instead of real people at least once. Approximately the same percentage have found AI interactions just as, if not more, satisfying than conversations with humans.

Adolescence is critical for developing social, critical thinking, and emotional regulation skills. With an average screen time of 8 hours and 39 minutes daily, according to Common Sense Media, the study’s authors express concern about the influence of AI companions in teens’ digital landscapes. About 25% of the teens surveyed shared personal information, such as their name and location, with AI companions—tools designed to collect user data. Some AI platforms are marketed to audiences as young as 13, though age restrictions are often easily bypassed by young people.

A third of teens reported feeling uncomfortable during interactions with AI companions, troubled by something said or done by the AI. Nonetheless, many teenagers approach AI companions pragmatically; about half of the respondents expressed distrust in the information or advice from AI companions, with younger teens being more trusting by a margin of seven percentage points.

The vast majority of teenagers, 80%, still prioritize human friendships over AI interactions. Common Sense Media recommends that individuals under 18 avoid using AI companions altogether due to the risks involved and the potential for addictive behavior. “I’m not necessarily confident that the companies behind these companions have teens’ well-being in mind,” Robb stated. “If these companions were designed to promote well-being, rather than to capture attention and collect personal information, we might be having a different conversation.”

According to NPR, these findings spotlight the complex dynamics at play as AI tools become an integral part of teenagers’ lives, warranting attention from parents, educators, and technology developers alike.

NASA Finds Largest Gold Reservoir in Universe, Valued at $700 Quintillion

NASA’s groundbreaking mission to study the metal-rich asteroid 16 Psyche could forever alter our understanding of resource economics and extraterrestrial geology.

For centuries, astronomers have marveled at the cosmos, dreaming of its untapped treasures. With advancements in spaceflight and robotics, this dream is inching toward reality as private companies and national agencies look to asteroids not just for scientific inquiry, but also for their raw materials. Leading this new age of space prospecting is the massive metal-rich asteroid 16 Psyche, located in the asteroid belt, and a prime candidate for exploration.

In 2019, astronomers caused a stir with rough estimates suggesting that Psyche’s metal reserves—comprising iron, nickel, and gold—could be worth as much as $700 quintillion. This staggering figure led to sensational headlines proposing that “everyone on Earth could become billionaires.” Beyond the excitement, this valuation sparked serious discussions about the future of resource mining and its economic impact, raising concerns about possible market disruptions, inflation, and geopolitical conflicts.

However, the prospect of extracting valuable metals from an asteroid involves more than just having the right equipment. It requires addressing significant logistical, economic, and timing challenges. Even if Psyche holds metals valued in the trillions, introducing such quantities to Earth’s markets could decimate asset values and cause widespread financial repercussions. Furthermore, the technical and legal challenges—such as ownership rights in space, transportation costs, and in-orbit refining—remain largely unresolved.

NASA is moving from speculation to action with its Psyche spacecraft, launched in October 2023. Although the mission is not intended for mining, it aims to map and analyze the asteroid’s structure and composition, providing essential data for potential future extractions. Set to reach Psyche in 2029, the mission could redefine understanding of planetary cores and determine whether the idea of cosmic gold is a mere legend or a viable ledger.

NASA has identified over 1.3 million asteroids within our solar system, many of which are rich in metals like platinum, cobalt, and gold. Asteroids such as 16 Psyche and 241 Germania are believed to be remnants of failed planets, serving as exposed planetary cores adrift in the void. Others, like Bennu and Ryugu, are carbon-rich and potentially hold insights into the origins of water and life on Earth.

One small near-Earth asteroid, designated 2011 UW158, is estimated to contain around $5.4 trillion worth of platinum. Models indicate that a single successful mining expedition could surpass Earth’s total annual metal production, a development that could upend global markets in a moment.

Asteroids have played pivotal roles in Earth’s history, not just as existential threats but possibly as sources of life’s building blocks. Some scientists believe asteroid impacts delivered critical ingredients for life on Earth, including water, carbon, and amino acids. While the potential for future impacts is a legitimate concern, NASA’s DART mission, which successfully altered a small asteroid’s course in 2022, represents a significant stride in planetary defense initiatives.

As researchers prepare to delve deeper into Psyche, the mission’s findings hold the promise of advancing more than just future mining techniques. They could illuminate our understanding of planet formation, the distribution of wealth across the solar system, and the precariousness—or fortune—of life on Earth.

These asteroids represent more than mere reserves of metal; they embody history, risk, and promise. Earth’s past has been reshaped by asteroids, and they retain the potential to do so again. NASA’s current efforts aim to explore these possibilities and prevent adverse scenarios, echoing the storyline of the film “Armageddon,” where a team of miners is dispatched to stop an asteroid from striking Earth.

According to EcoPortal, NASA’s venture into Psyche is a testament to humanity’s quest to unlock the universe’s mysteries, with implications that extend far beyond monetary gain.

AI Engineer Shares Tips for Entering Big Tech Industry

Despite the changing landscape of tech education, both traditional higher education and strategic career moves remain vital for securing a role in AI engineering, according to Kriti Goyal, a successful machine learning engineer based in the United States.

Kriti Goyal’s journey into the realm of artificial intelligence and machine learning began in the unlikely setting of Bikaner, a small town in Rajasthan, India. Initially inclined towards medicine, her trajectory changed after watching a pivotal video presented by tech leaders like Mark Zuckerberg and Bill Gates. This video illuminated the power of coding as a tool to transform ideas into tangible products, setting Goyal on a path that would lead her to a prominent role in a major U.S. tech firm.

Currently a member of the Foundation Model framework team, Goyal plays a critical role in constructing the foundations of machine learning models. Her work involves developing code that enables software to identify and generate patterns from unrecognized data, a task integral to the advancement of machine learning applications.

Goyal’s professional journey began with an internship in India at the same company where she is now employed in the U.S. Although she enjoyed her time working in India, she realized that core strategic decisions were predominantly made at the company headquarters in the United States. This realization fueled her decision to move to the U.S. in pursuit of professional growth.

The pivotal decision to pursue a master’s degree was instrumental in facilitating her transition to the United States. Goyal valued the advanced knowledge acquired through her master’s program at the University of Wisconsin-Madison, but she also emphasized the importance of networking. The connections made during her studies proved advantageous when she reached out to former colleagues and managers, ultimately easing her path to securing a machine learning internship.

Her proactive approach during her internship included pitching internal projects to various teams, a strategy that played a significant role in her securing a full-time role in AI engineering. Her current role as a machine learning engineer involves a daily routine of research, team collaborations, and coding—a balance she finds rewarding.

Goyal acknowledges the evolving nature of tech education, noting that while higher education remains beneficial, it’s not the only pathway to success. She highlights a noticeable bias in hiring practices that favor candidates with advanced degrees, but also recognizes the potential to bypass traditional pathways through networking and proving one’s skills. Goyal suggests that environments like San Francisco and New York offer opportunities to replicate the networking and structured systems traditionally provided by universities.

This multifaceted approach reflects Goyal’s perspective that while academia can offer advantages, particularly in teaching, tech professionals can also succeed by demonstrating their abilities and adapting to the dynamic demands of the industry.

Source: Original article

Japan-India Collaboration Unveils New High-Speed Bullet Train

India’s Mumbai-Ahmedabad high-speed rail corridor will serve as the debut platform for Japan’s cutting-edge E10 Shinkansen bullet trains, reflecting deepening ties between the two nations.

The Indian Ministry of Railways announced on Monday that both India and Japan will simultaneously launch the next-generation E10 Shinkansen bullet trains. As the successors to the E5 model currently operating in Japan, the E10 trains represent a significant technological advancement in high-speed rail.

This collaboration underscores the strengthening technological and economic partnership between India and Japan. The decision to introduce the E10 trains in India highlights Japan’s trust and willingness to share its celebrated high-speed rail technology with a key international partner.

The Mumbai-Ahmedabad corridor, India’s first high-speed rail line, will utilize E10 trains following successful trials with the E5 model. The E10 series is slated for its commercial debut in Japan by 2030, aligning with the timeline for full connectivity of the Indian rail project to Mumbai.

A statement from the Indian Ministry of Railways emphasized the strategic partnership underpinning this venture: “The Japanese Shinkansen [system] is currently running E5 trains. Next generation trains are E10. In the spirit of strategic partnership between Japan and India, the Japanese government has agreed to introduce E10 Shinkansen trains in the Mumbai-Ahmedabad Bullet train project.”

This rollout marks the first instance where Japan has simultaneously launched its most advanced rail technology both domestically and internationally.

Trials for the E10 high-speed trains are scheduled between 2026 and 2027, with full-scale commercial service anticipated by 2027. The trains will cover a route connecting 12 stations, with limited-stop services reducing end-to-end travel time to just over two hours. Achievements in speed are notable, reaching almost 200 miles per hour, with the route spanning across Gujarat, Dadra and Nagar Haveli, and Maharashtra.

The project began construction in September 2017 and has seen significant progress, with five of the 12 planned stations completed and others nearing completion. Additionally, 15 river bridges have been constructed, with four more set to be completed soon.

Recent reports suggested that India might opt for domestically produced trains for the project, rather than partnering with Japan. However, the Ministry of Railways refuted these claims, maintaining that the collaboration with Japan remains in place. The Press Information Bureau of India reiterated: “Some articles and social media posts claim that the Ministry of Railways has decided to not run the Japanese bullet train on the Mumbai-Ahmedabad route. This claim is misleading. The Railway Ministry has made no such decision. Work on the Mumbai-Ahmedabad bullet train corridor is progressing as per the planned schedule.”

With commercial operations targeted for a 2027 rollout and the concurrent debut of the E10 in Japan set for 2030, the Mumbai-Ahmedabad corridor is poised to become a symbol of international collaboration in rail technology, melding Indian ambition with Japanese innovation.

Stablecoin bill clears House in key crypto victory

The House passed a bill setting up a regulatory framework for payment stablecoins, sending it to President Trump’s desk and marking a major win for the industry.Lawmakers voted 308-122 on Thusday to pass the GENIUS Act following a tumultuous “crypto week” in the chamber that saw competing GOP factions bring the House floor to a standstill for two days.

dozen Republicans voted against the measure, while 102 Democrats supported it.

The bill regulating dollar-backed digital tokens now heads to Trump’s desk, where he has indicated he is eager to sign it.

“For far too long, America’s digital assets industry has been stifled by ambiguous rules, confusing enforcement and the Biden administration’s anti-crypto crusade,” Majority Whip Tom Emmer (R-Minn.) said at a press conference Thursday.

“But President Trump and this Congress are correcting course and unleashing America’s digital asset potential with historic, transformative legislation,” he continued.

“President Trump promised to make America the crypto capital of the world, and today, we delivered,” Emmer added.

The legislation’s future appeared in jeopardy less than 24 hours earlier.

A group of hardline Republicans tanked a procedural vote on a trio of crypto bills Tuesday, freezing the floor.

Trump struck a deal to secure their support the next day, but several holdouts remained Wednesday, as the House attempted once again to adopt a rule governing debate on the bills.

The agreement Trump reached with the hardliners also prompted new backlash from members of the House Financial Services Committee.

The deal sought to add provisions from the Anti-CBDC Surveillance State Act, which aims to bar the Federal Reserve from issuing a central bank digital currency (CBDC), to a broader crypto framework called the Digital Asset Market Clarity Act. Both measures passed the House as well Thursday.

After hours of deliberation Wednesday — during which the rule vote remained open and the number of “no” votes from hardliners continued to grow — GOP leadership reached a deal to add the anti-CBDC provisions to the National Defense Authorization Act.

Including the provisions in the must-pass legislation would put them on track to reach Trump’s desk, assuming they don’t get stripped out of the bill as it weaves its way through Congress later this year.

The agreement convinced most of the remaining holdouts to switch their “no” votes on the rule to “yes,” allowing it to pass after more than nine hours.

It easily surpassed the previous record for longest vote in the chamber, which the House set just two weeks earlier during consideration of the GOP’s “big, beautiful bill.”

Larry Ellison Becomes Second Richest After Oracle AI Investments

Oracle founder Larry Ellison, at 80, has surpassed Mark Zuckerberg to become the world’s second-richest person, with a net worth climbing to $251 billion following Oracle’s strong earnings and strategic investments in AI infrastructure.

At the age of 80, Larry Ellison has surpassed Mark Zuckerberg, becoming the world’s second-richest person. Ellison’s net worth now sits at $251 billion, bolstered by a dramatic increase of nearly $60 billion in 2025 alone, as reported by the Bloomberg Billionaires Index.

Ellison’s financial ascent is largely attributed to his substantial 40% stake in Oracle, the database company he founded in 1977. Oracle’s value has surged by 41% so far this year, with substantial gains seen in recent weeks.

The soaring stock value comes amid a favorable market landscape for artificial intelligence investments, a sector in which Ellison has been heavily involved. The tech industry has benefited from policies under Trump’s second presidency that favor AI stocks. For instance, Nvidia’s CEO Jensen Huang, similar to Ellison, has seen significant growth in wealth, partially due to the government’s approval for his company to ship advanced microchips to China.

Ellison prominently aligned himself with President Trump during the unveiling of Stargate, a major initiative aimed at strengthening the U.S. position in AI development. This ambitious project plans to invest $500 billion into AI infrastructure over the coming four years, with Oracle, SoftBank, OpenAI, and MGX serving as initial equity founders. Oracle and OpenAI are also pivotal technology collaborators alongside companies like Arm, Microsoft, and Nvidia.

Recent increases in Oracle’s value are linked to the company’s robust performance and heightened commitment to AI investments. Oracle recently announced impressive year-end results, reporting Q4 revenues of $15.9 billion, marking an 11% increase, while remaining performance obligations rose by 41% to $138 billion.

Continuing its AI focus, Oracle has committed an additional $3 billion to expand cloud services and AI infrastructure in Germany and the Netherlands. Despite the positive investor response to Oracle’s moves, some analysts urge caution regarding future projections for the company.

A report from Goldman Sachs following Oracle’s fiscal results adopted a ‘neutral’ stance, with analysts noting Oracle’s strong Oracle Cloud Infrastructure demand momentum. Nonetheless, they warned of potential risks, suggesting that the company might overcommit to low-margin, capital-intensive training cycles that could impact its future free cash flow generation.

BITCOIN RECORD-BREAKING SURGE

The cryptocurrency world is buzzing with excitement as a record-breaking rally kicks off, ignited by Donald Trump’s groundbreaking “Liberation Day” announcement on April 2nd. This bold move has disrupted traditional markets, prompting investors and institutions to flock to alternative assets like bitcoin as a safeguard against the mounting macroeconomic chaos.
Bitcoin, the heavyweight champion of cryptocurrencies, continues its meteoric rise, reaching an astonishing price of $1,22,490 (around Rs 1,05,32,778) just on Monday! Since December, this digital dynamo has skyrocketed by an eye-popping 30%, sending waves of exhilaration through the market.
But what’s fueling this explosive growth? It’s the highly anticipated ‘crypto week’ in the US! Congress is gearing up to debate the legalization of cryptocurrencies, with President Trump already laying the groundwork to make cryptocurrencies official. The atmosphere is electric!
As Bitcoin skyrockets, it has propelled its mysterious creator, Satoshi Nakamoto, into the ranks of the world’s wealthiest, now standing as the twelfth richest person on the planet! With a staggering net worth of $134 billion, Nakamoto is just behind Dell Technologies CEO Michael Dell’s $137 billion and ahead of the legendary Bill Gates at $124 billion. Believe it or not, Nakamoto is sitting on a treasure trove of 1.1 million Bitcoins!
While Bitcoin is not recognized as legal tender in India (meaning it cannot be used for direct payments), individuals are legally permitted to buy, sell, and hold cryptocurrencies like Bitcoiin, indeed.
The excitement doesn’t stop there! Industry leaders are feeling bullish about what lies ahead. A recent survey of crypto analysts suggests an average price prediction of $145,167 for bitcoin by the end of 2025. Buckle up— the future of cryptocurrency is looking brighter than ever!
Let’s ride this wave of excitement!

GOPIO Hosts Webinar Series to Inform Indian-American Diaspora

The Global Organization of People of Indian Origin (GOPIO) is launching a series of webinars designed to engage and inform the Indian diaspora on crucial topics ranging from immigration to technology.

The Global Organization of People of Indian Origin (GOPIO) is set to organize a monthly webinar series starting in July. These virtual events aim to educate and galvanize the Indian diaspora by addressing a diverse array of pressing issues relevant to the community.

Commencing on July 12, the webinars will take place on the second Saturday of each month, according to the USA’s time zone. The kickoff event is scheduled for July 12 at 9 a.m. ET, which corresponds to 6 a.m. PT, 2 p.m. in the UK, 3-5 p.m. across Europe, Africa, and the Middle East, 6:30 p.m. in India, and 11 p.m. in Australia, extending to July 13 at 1 a.m. in New Zealand.

The inaugural webinar will focus on “Immigration Issues: Migration Issues Worldwide with Focus on North America and Europe,” a topic that has gained increased significance given the current geopolitical climate. Lord Bhikhu Parekh, a member of the House of Lords and a former professor at the University of Hull and the University of Westminster, will serve as the chief guest.

In the following month, on August 9, technology experts will converge to simplify the concept of Artificial Intelligence for a wider audience with a session titled, “What can AI do for me (Smart Living: Everyday Uses of AI Made Simple)?”

September’s session will be themed “What can Ancient Wisdom do to help me: Diabetes, Heart Disease and Today’s Health Issues?” Subsequent topics for the year include “Involvement in India’s Growth Story – Role of the Diaspora” on October 11, “Diaspora’s Role in the Technology of the Future” on November 8, and “Coping with Technological Challenges and Changes” on December 13.

Thomas Abraham, the Founder President and Chairman of GOPIO, articulated the reasoning behind these webinars, emphasizing the need for a platform that can connect and energize the widely dispersed Indian diaspora. “These events will certainly energize and harness the power of the Indians who have now become powerhouses of influence everywhere,” he said.

Prakash Shah, President of GOPIO, underscored the need to unify the diaspora community in the face of rapid technological changes. “We believe now that the age of robotics will usher in cataclysmic changes that need to be addressed in an unprecedented manner,” Shah expressed.

Shah further commented on the technological prowess of Indians, stating, “With technology mastery and leadership, Indians are better poised to offer compelling solutions to the issues that are unfolding around the world. Solving problems at scale in collaboration with our homeland communities is only possible when we unleash the cumulative intellectual capital that the Non-Resident Indians possess.”

According to New India Abroad, GOPIO aims to make these webinars an essential resource for the global Indian community.

Proposed High-Speed Train to Connect NYC and Los Angeles

A high-speed rail line proposed by Ameristar Rail aims to connect Los Angeles to New York City by May 2026, just in time for the FIFA World Cup.

A proposed high-speed rail project, named “The Transcontinental Chief,” seeks to link Los Angeles to New York City within 72 hours, potentially transforming cross-country travel in the United States. The ambitious plan, proposed to both Amtrak and President Trump, is spearheaded by Delaware-based Ameristar Rail. It aims to utilize existing rail infrastructure rather than undertaking an expensive new public project.

The project intends to leverage tracks owned by Amtrak and other regional rail lines, including routes through major urban centers such as Kansas City, Chicago, and Philadelphia. This innovative approach is designed to sidestep the significant costs associated with constructing new tracks, allowing for a more efficient implementation timeline.

Ameristar Rail plans to fund the venture through private investors, effectively eliminating the need for taxpayer money. The rail service would accommodate both passengers and vehicles, drawing inspiration from Europe’s truck transport trains model. Ameristar Rail’s chief operating officer, Scott Spencer, emphasized the project’s potential in a letter to Amtrak.

According to Spencer, this partnership with the private sector could rejuvenate Amtrak’s long-distance offerings, which have historically been unprofitable, and help enter a new era of rail travel benefitting business ventures and the public. The timing aligns with America’s 250th birthday celebrations in 2026, adding a patriotic dimension to the endeavor.

Projected to commence on May 10, 2026, which coincides with National Train Day, the service is intended to efficiently transport tourists visiting North America for the FIFA World Cup. The tournament will be hosted across the continent, with the finals set at MetLife Stadium in New Jersey.

A significant feature of the proposal is its reliance on private funding, circumventing the need for new congressional legislation or increased federal expenditure. The operation is contingent on securing agreements with host rail operators such as BNSF, Norfolk Southern, and New Jersey Transit, which would facilitate the rail line’s use of existing tracks.

Despite its promising attributes, The Transcontinental Chief proposal has yet to receive an official response from Amtrak, indicating ongoing deliberations or negotiations may be necessary to advance the project from proposal to reality. As discussions continue, the potential for such a transformative infrastructure project remains an intriguing prospect for the future of American rail travel.

The original report of this proposal was highlighted by Newsweek, indicating its significance among proposals presented to the federal administration and transportation authorities.

Source: Original article

AI’s Impact on Job Market: Which Roles Are Threatened First?

As artificial intelligence rapidly automates repetitive tasks across various sectors, workers face a crossroads: embrace higher-value, human-driven roles or risk obsolescence.

Artificial intelligence (AI) continues to accelerate its reach into various fields, automating repetitive tasks and challenging the status quo of numerous professions. This technological evolution leaves workers at a critical juncture—adapting to higher-value roles that leverage human creativity and judgment or risking the potential obsolescence of their occupations.

A common reaction among professionals is skepticism regarding AI’s impact. Many have dabbled with AI tools once, found them lacking, and subsequently dismissed them as inconsequential. However, this underestimation belies the reality: AI is quietly reshaping industries through enhanced efficiency and cost-effectiveness, a progression often met with surprise by industry insiders who initially believed they had ample time to adapt.

Psychologists refer to this phenomenon as the “anchoring effect,” where individuals cling to familiar routines and downplay the visible changes around them. This mindset is illustrated by the case of Guy, a recruitment manager at a Herzliya-based tech firm. In a recent notification from his CEO, he learned that the efficiency of OpenAI’s Recruiter-GPT had outpaced human efforts—compressing a week’s work into hours, thus leading to a reduction of his team from five members to two.

The recruitment sector is not alone in facing such transformations. Legal professionals also notice AI’s prowess: A major firm drastically reduced the time needed to review complex real estate contracts, from 12 hours to a mere nine minutes, freeing lawyers to focus more on strategy and client consultation rather than mundane clause checks.

Such advancements are not merely theoretical; they are the operational realities of today. As AI systems such as GPT-4o and recruitment platforms like HeroHunt.ai’s Uwi efficiently handle candidate screenings, similar automation is poised to affect roles in administration, customer service, and more. Hence, the repetitive and rule-based tasks commonly found in many occupations are at considerable risk of being automated first.

Despite fears of job displacement, the landscape isn’t solely grim. New roles are emerging alongside technological advances. Professions that emphasize AI oversight—like AI ethics consulting, data verification, and professional prompt engineering—are gaining relevance. These roles underscore the continued necessity of human creativity and decision-making in an AI-enhanced economy.

Reflecting on historical precedents, it is essential to recognize how past innovations once faced skepticism. The candle maker, dismissive of the light bulb, and the horse trader, who underestimated the automobile, are reminders of the folly in clinging too tightly to the old ways.

In one notable example, a 2023 study by Harvard Business School and Boston Consulting Group studied GPT-4’s impact on strategic consulting. While initial concerns centered on AI undermining expertise, top consultants who embraced the technology found it augmented their work quality by 40%. They employed AI as a creative aid but ensured their professional judgment informed final decisions, turning a potential threat into an asset.

Ultimately, AI challenges society to hone its inherently human skills—creativity, empathy, and critical thinking. Optimists predict that AI’s ultimate benefit will be its role in compelling humanity to focus on these irreplaceable qualities, nurturing interpersonal connections and fostering deeper cultural and spiritual growth.

The road ahead may appear daunting, marked by both opportunities and challenges. Still, as AI’s footprint expands, it’s crucial to recognize that it doesn’t merely present a technological shift but a transformative moment, redefining the very essence of work and human potential.

For those maintaining that technology’s clang remains distant, it’s time to reassess and prepare for this inevitable change—not as a disruption but as an opportunity for reinvention and progress.

Source: Original article

Jobs Likely Replaced by AI First

Artificial intelligence is transforming industries by automating repetitive tasks, which can either free workers for more valuable roles or render them obsolete.

The pace of automation in various industries is accelerating as artificial intelligence (AI) continues to advance. This evolution impacts fields ranging from recruitment and legal work to administration and customer service. AI is taking over repetitive tasks, allowing workers to focus on more valuable, human-centric activities, or, in some cases, eliminating their roles altogether.

Despite the clear trajectory of AI integration in the workplace, many remain skeptical. Successful professionals often dismiss AI’s potential impact, having tested certain technologies once without being impressed. However, ignoring AI’s growing presence could mean turning a blind eye to emerging opportunities and new realities.

This tendency to deny visible changes is sometimes attributed to psychological phenomena like the anchoring effect, where individuals steadfastly anchor themselves to familiar routines without considering the shift around them. The “it’ll be fine” mentality offers comfort but can also serve as a barrier to adaptation.

Consider the example of Guy, a recruitment manager at a high-tech company in Herzliya. Recently, he was informed by his CEO that their recruitment team would be cut drastically, owing to the rapid efficiency brought by AI systems like OpenAI’s Recruiter-GPT. While it once took a team of managers a week to sift through resumes, AI now completes this task in mere minutes. This efficiency enables recruitment teams to focus on higher-level tasks such as interviews and candidate assessment.

AI-driven advancements are not limited to recruitment. In legal circles, AI has dramatically reduced time-intensive processes. Tasks that once required painstaking hours, like reviewing complex real estate contracts, are now accomplished in minutes with AI, leaving lawyers more time for strategic and advisory roles.

The transition AI is bringing to workplaces is not a sudden upheaval akin to a disruptive crash. Instead, it silently builds a more efficient, cost-effective system alongside existing structures. Many jobs predicted to disappear share a key characteristic: they are repetitive and governed by rules. This includes administrative roles, basic accounting, routine insurance processing, and front-line customer support.

However, as certain job categories become outdated, new roles are emerging. The demand for AI ethics consultants, data verification specialists, and human-machine interaction trainers is on the rise, reflecting a shift towards integrating AI with creative and strategic tasks.

Historical precedents remind us that while initial resistance to innovation is common, adaptation often follows. Energy once spent dismissing AI’s potential could be redirected toward harnessing its strengths. A recent study by Harvard Business School and Boston Consulting Group found that consultants who judiciously applied AI saw marked improvements in their work’s quality.

AI’s ultimate achievement may be its ability to enhance our uniquely human capacities by taking over mechanical chores. It offers a chance to deepen human experiences, improve partnerships, and advance intellectually and spiritually. While some misuse of AI could occur, the widespread potential for positive applications is expected to outweigh the negatives.

Moreover, starting small, such as using AI tools to edit mundane documents or identify contract discrepancies, can be an effective way to appreciate AI’s capabilities. Contemplating the repetitive tasks that occupy our daily routines can reveal potential efficiencies AI might offer, thus challenging our commitment to traditional roles.

As the relentless advance of AI continues, the choice becomes clear: either embrace and adapt to the new landscape, reaping the benefits, or risk obsolescence by clinging to outdated ways. The message is undeniable; facing these changes is not a mere preference but a necessary approach for survival in the modern workforce.

Source: Original article

Experts Predict AI to Generate New Jobs Despite Forecasts

The swift rise of artificial intelligence is reshaping labor markets, triggering both job displacement and the potential for new employment opportunities, analysts told ABC News.

The rapid integration of artificial intelligence (AI) in various industries has led to fears about the future of jobs, with some predicting a significant workforce upheaval. However, experts suggest that while AI may displace certain positions, it could also create new job opportunities, enabling workers to oversee and integrate AI tools or focus on creative and complex tasks that computers cannot manage alone.

Harry Holzer, a professor of public policy at Georgetown University and a former chief economist at the U.S. Department of Labor, argued that AI is not entirely beyond human control. “There are places where we do have control,” Holzer said regarding the potential changes incoming in the workforce due to AI.

Forecasts on the extent of job disruption caused by AI vary widely. Dario Amodei, CEO of Anthropic, warned in May that AI could potentially reduce U.S. entry-level jobs by half over the next five years. Conversely, the World Economic Forum conducted a survey of 1,000 large global companies, identifying AI as the primary driver of job creation by 2030. The survey estimated that AI could create 170 million jobs worldwide over five years, a number that significantly surpasses the 92 million jobs projected to be lost.

Historically, advances in technology have typically resulted in net job gains, a point observed by Ethan Mollick, a business professor at the University of Pennsylvania. Nonetheless, he noted that AI stands out as a unique technological challenge. “Every time that happens, we worry, ‘It will be different this time around.’ It may be different this time around – AI is a very different technology,” Mollick said, emphasizing the uncertainty surrounding AI’s impact on job markets.

In anticipation of AI’s growing influence, new AI-centered roles are already emerging across various sectors. According to Chris Martin, lead researcher at Glassdoor, the share of job listings focused on AI roles more than doubled between 2023 and 2024, with a subsequent 56% increase in 2025 compared to the previous year. These AI roles are divided into two broad categories: existing positions that have evolved to include AI tools and entirely new roles specifically created for AI-related tasks.

A large number of current AI roles involve adapting existing positions, like software engineers or attorneys, to focus on AI specialization. However, AI-centered jobs, such as those involved in AI training, are growing rapidly and predominantly operate on a freelance basis. Glassdoor data shows that AI training roles quadrupled in 2024 and continue to expand this year.

Some AI-specific positions have seen a decline. For example, the demand for “prompt engineers”—individuals who craft queries to produce effective AI responses—has diminished, as noted by Martin.

Looking ahead, there is little clarity about what new roles AI might bring about in the coming years. Some analysts suggest that AI could generate jobs focused on assessing AI outputs’ quality and authenticity. Others believe that AI could render such roles obsolete if it reaches a level of proficiency that eliminates the need for human oversight.

Experts like Mollick caution that the ultimate impact of AI on the labor market depends significantly on the technological evolution of AI systems. “The question in some ways is: What happens next with these systems,” Mollick noted.

Dave Autor, a professor at the Massachusetts Institute of Technology specializing in technological change and the labor force, highlighted the challenges in predicting newly created jobs in an AI-transformed economy. “We’re not good at predicting what the new work will be; we’re good at predicting how current work will change,” Autor stated.

The ongoing evolution of AI calls for caution among workers as they consider adapting to the future labor landscape, Mollick advised, warning against making significant career decisions based solely on current AI developments. “The worst thing you could do right now is make a complex career decision based on what AI is doing today, because we just don’t know,” he said.

The prospects of AI-driven career opportunities remain filled with uncertainty, leaving analysts and workers alike contemplating how best to position themselves for what lies ahead in the AI-revolutionized labor market.

Nvidia CEO Urges US to Onshore Technology Manufacturing

Jensen Huang, CEO of Nvidia, advocates for re-industrializing technology manufacturing in the U.S., emphasizing its economic and societal benefits.

During a recent interview with CNN’s Fareed Zakaria, Jensen Huang, the CEO of Nvidia, expressed strong support for re-industrializing the United States’ technology manufacturing sector. Based out of Santa Clara, California, Nvidia is a dominant player in the artificial intelligence (AI) chip market. According to Huang, the country should focus on revitalizing its manufacturing sector, which he believes is currently underdeveloped.

Huang highlighted the value of manufacturing skills in contributing to both economic growth and societal stability. “That passion, the skill, the craft of making things; the ability to make things is valuable for economic growth — it’s value for a stable society with people who can create a wonderful life and a wonderful career without having to get a PhD in physics,” Huang explained.

In recent years, the U.S. government has implemented various measures to rejuvenate domestic manufacturing. These have included significant tariffs aimed at invigorating the nation’s declining manufacturing industries, particularly in the automotive and energy sectors, and enhancing technology investments. In April, White House press secretary Karoline Leavitt stated, “President Trump has made it clear America cannot rely on China to manufacture critical technologies such as semiconductors, chips, smartphones, and laptops” following a temporary tariff pause on certain electronics.

Huang emphasized the strategic significance of onshoring manufacturing, suggesting that it would alleviate pressure on Taiwan, home to the world’s largest semiconductor manufacturer, Taiwan Semiconductor Manufacturing Company (TSMC). In March, former President Trump announced that TSMC would invest a minimum of $100 billion in U.S.-based manufacturing.

Huang remarked, “Having a rich ecosystem of industries and manufacturing so that we could, on the one hand, make the United States better but also reduce our dependency — sole dependency — on other countries, is a smart move.”

The growing investment in AI, which has spurred a notable technology boom, has raised discussions about its impact on the labor market. A report from the World Economic Forum in January indicated that 41% of employers plan to downsize their workforce by 2030 due to AI-driven automation.

Nvidia, which briefly achieved a market value of $4 trillion, has developed technologies that support data centers essential for the AI models and cloud services of companies like Microsoft, Amazon, and Google. “Everybody’s jobs will be affected. Some jobs will be lost. Many jobs will be created and what I hope is that the productivity gains that we see in all the industries will lift society,” Huang noted.

Huang also discussed the company’s internal use of AI, emphasizing its importance: “Every software engineer and chip designer at Nvidia uses AI, and I encourage it to the point of mandating it.”

The discussion extended to the ethical concerns surrounding AI, particularly with generative response platforms such as Elon Musk’s Grok and OpenAI’s ChatGPT, which have encountered various controversies. Grok faced criticism after Musk’s xAI altered the chatbot, allowing it to produce more “politically incorrect” responses, including content deemed antisemitic.

xAI released a statement on Saturday attributing Grok’s behavior to outdated code susceptible to user input on X, including extremist content. The code has since been rectified. Huang commented on the incident, describing Grok as “younger” but praised Musk’s advancements within 18 months. “Of course there’s the fine tuning, there’s the guardrailing, and that just takes time to polish,” he stated.

Concerns also arise around AI’s potential for “hallucinations,” where the technology generates incorrect information. Despite these risks, Huang maintains that these fears stem from a lack of understanding of AI’s interconnected systems designed for safety. He asserted that global standards and practices are crucial for maintaining security.

“It will be overwhelmingly positive. Some harm will be done. The world has to jump on top of it when it happens, but it will be overwhelmingly, incredibly powerful,” he remarked.

Huang further explored the role of AI in healthcare, suggesting that AI models could revolutionize drug discovery by learning about proteins and chemicals. This process, more complex than language modeling due to the extensive data involved, could lead to breakthroughs in disease understanding and treatment.

“Not only will we accelerate the discovery of drugs, we’ll improve our understanding of disease. But over time, we’re going to have virtual assistant researchers and scientists to help us essentially cure all disease,” Huang predicted. “I think that day is coming.”

Moreover, real-world applications of AI are expanding. Current generative models, like Google’s Veo 3, can create videos and Huang anticipates the development of robots capable of physical tasks, a process involving vision-language-action models distinct from large-language models.

“The technology exists today. It works today,” Huang asserted, anticipating widespread technological adoption in “three to five years.”

This profound transition underscores Huang’s perspective on enhancing U.S. manufacturing and the transformative potential of AI across various industries, both of which are poised to redefine economic and societal frameworks.

Jay Chaudhry Among Top Richest Indian-Origin US Immigrants

Indian-American tech entrepreneur Jay Chaudhry, CEO of the cybersecurity firm Zscaler, ranks eighth on Forbes’ 2025 list of richest immigrant billionaires in the United States.

Jay Chaudhry, the 65-year-old CEO of Zscaler, has secured a notable position among the wealthiest immigrant billionaires in the United States, as revealed by Forbes’ 2025 rankings. With a strong foothold in the tech industry, Chaudhry is the only Indian to appear in the prestigious top 10 list, ranking eighth overall.

Born in 1960 in a small Himalayan village in India, Chaudhry’s early life was characterized by significant challenges, with his hometown lacking basic amenities like electricity and running water during his school years. Despite these hardships, he excelled academically and pursued an education in engineering at Banaras Hindu University, currently known as IIT (BHU) Varanasi.

In 1980, Chaudhry moved to the United States to further his studies, marking his first experience flying in a plane. He went on to earn Master of Science degrees in electronic and computer engineering and industrial engineering and management from the University of Cincinnati, and he also studied at Harvard Business School.

Chaudhry’s journey in the tech world took a significant turn when he founded Zscaler in 2008. The company has since evolved into one of the prominent cloud-based cybersecurity firms globally, going public on Nasdaq a decade later. Today, Chaudhry and his family own approximately 40% of the company.

Before establishing Zscaler, Chaudhry, alongside his wife Jyoti, had already ventured into the tech industry by founding several other tech companies. These included SecureIT, CoreHarbor, CipherTrust, and AirDefense, all of which were subsequently acquired, paving the way for his later success.

As of 2025, Chaudhry’s net worth is estimated at $17.9 billion, which is about ₹1.49 lakh crore. He resides in Reno, Nevada, where he continues to be influential in the cybersecurity sector.

The Forbes 2025 list of richest immigrant billionaires is led by Tesla CEO Elon Musk, followed by Google co-founder Sergey Brin, Nvidia’s Jensen Huang, and entrepreneur Thomas Peterffy. Jay Chaudhry sits in eighth place, surpassing notable names such as WhatsApp co-founder Jan Koum and Kingston Technology CEO John Tu.

For the information presented in this article, the original details are drawn from the Financial Express.

Balaji Srinivasan Establishes Network State on Singapore Island

Indian American entrepreneur Balaji Srinivasan has embarked on an ambitious project to establish a “Network State” by purchasing a private island near Singapore, aimed at catering to startup founders, technologists, and fitness enthusiasts.

Balaji Srinivasan, known for co-founding the genetic testing firm Counsyl and serving as the former CTO of Coinbase, is venturing into the creation of a decentralized, digital-first community, which he refers to as a “Network State.” This ambitious new venture seeks to revitalize democratic ideals for the internet age, specifically targeting startup founders, technologists, and fitness enthusiasts.

Srinivasan, who was raised in Long Island, New York, to Tamil-origin physician parents Dr. Bhavani Srinivasan and Dr. Subramaniam Srinivasan, has garnered significant recognition within the Indian American community. He is an accomplished academic, having earned a Bachelor of Science, Master of Science, and Doctorate in Electrical Engineering, along with a Master of Science in Chemical Engineering from Stanford University.

The concept of this emerging society first gained public attention through an Instagram user named Nick Peterson. Peterson is participating in the Network School, a three-month in-person residency program hosted on Srinivasan’s private island. Describing the community as “an oasis for gym rats and startup founders,” a video tour shared by Peterson reveals a daily regimen focused on rigorous physical workouts, AI and blockchain classes, and startup incubation sessions.

In his 2022 book, The Network State: How to Start a New Country, Srinivasan laid the groundwork for his vision. He imagined digital communities formed around shared values—like technology, decentralization, and cryptocurrency—that would eventually obtain real-world territory and seek global recognition.

The acquisition of an island near Singapore signifies a tangible advancement towards this goal, serving as a real-world testing ground where Srinivasan’s theories can be operationalized. Initiated in Malaysia in 2024, the Network School hosts groups of technologists, crypto enthusiasts, digital content creators, personal trainers, and remote workers, providing them with an environment to work and learn together.

Future plans are reportedly in motion for additional Network School campuses in other global cities, including Dubai, Tokyo, and Miami, as Srinivasan continues to expand his revolutionary vision of a decentralized community that transcends traditional geographical boundaries.

This innovative experiment in societal structuring offers a new lens through which to view democracy and global connectivity, set against the backdrop of rapidly evolving digital landscapes. As Srinivasan moves forward with his plans, the potential implications for nation-building and community engagement in the digital age are tremendous.

Nvidia Hits $4 Trillion Market Cap, Surpassing Apple and Microsoft

Nvidia has made history as the first company to achieve a $4 trillion market capitalization, highlighting its substantial influence in the global financial arena.

Nvidia has reached a historic milestone, becoming the first company to reach a market valuation of $4 trillion. This achievement underscores its dominant role in the global financial sector.

The chipmaker’s shares experienced a 2.8 percent rise to $164.42 on Wednesday, driven by the unwavering demand for artificial intelligence technologies and Nvidia’s strategic leadership in the AI hardware market. This surge has solidified Nvidia’s position on Wall Street as the most valuable company, surpassing long-standing industry giants Apple and Microsoft. Currently, Apple and Microsoft are the only other U.S. companies with valuations exceeding $3 trillion.

Nvidia first attained a $1 trillion market valuation in June 2023, and since then, the company’s growth trajectory has surpassed that of every other mega-cap stock. In a little over a year, its market value has more than tripled, achieving this milestone at a faster pace than Apple and Microsoft, which are currently valued at $3.01 trillion and $3.75 trillion respectively.

The company’s rebound has been remarkable, with its shares increasing by approximately 74 percent from their lowest point in April. This recovery follows a period of market instability triggered by U.S. President Donald Trump’s renewed tariff conflicts. During this time, investors were concerned about a potential slowdown in AI investments, particularly due to emerging competition from China’s DeepSeek. However, recent optimism surrounding new trade agreements has improved market sentiment, driving the S&P 500 to an unprecedented high.

Currently, Nvidia holds a 7.3 percent weighting on the S&P 500, the highest of any company, surpassing both Apple and Microsoft, which account for around 7 percent and 6 percent, respectively, according to Indian Express.

Source: Original article

Indian-Origin Executives Lead Major Global Tech Companies

Indians are increasingly taking the helm at some of the world’s most influential technology companies, marking their presence on the global stage from Google to Apple.

From Sundar Pichai to the newly appointed Apple COO, Sabih Khan, an impressive array of Indian-origin executives are leading major global tech firms and serving as sources of inspiration for millions worldwide.

Sundar Pichai stands at the forefront, guiding both Google and its parent company, Alphabet. He manages numerous innovations in artificial intelligence and the consolidation of global information. Pichai, born in Madurai, Tamil Nadu, is renowned for his leadership capabilities, often said to embody a style that is exemplified by ethics and excellence among other attributes.

Succeeding Pichai, Satya Nadella serves as chairman and CEO of Microsoft, a role he assumed in 2014. Prior to his leadership at Microsoft, he was a board member at Starbucks and spearheaded research and development at Microsoft’s Online Services and Business Divisions. Nadella was born in Hyderabad, Telangana.

Arvind Krishna, the chairman, president, and CEO of IBM, has devoted over 30 years to the company. He gained notable recognition in 2016 when he was listed among “25 geniuses who are creating the future of business” due to his pioneering work in blockchain technology. His journey began in the West Godavari district of Andhra Pradesh.

Over at Adobe, Shantanu Narayen has significantly transformed the company into a creative software powerhouse, particularly with iconic products like Photoshop and Acrobat. Throughout his tenure, he has also secured five patents. Narayen hails from Hyderabad, Telangana.

Thomas Kurian, in charge of Google Cloud since 2019, was honored as ‘Cloud Wars CEO of the Year for 2024’ in recognition of his industry expertise and contribution. His roots trace back to Pampady, a town in Kerala.

Meanwhile, at Micron Technology, Sanjay Mehrotra serves as the CEO, leveraging his background as a co-founder of SanDisk. His efforts in computing architecture and artificial intelligence innovations have yielded over 70 patents. Mehrotra originates from Kanpur, Uttar Pradesh.

As the current CEO of YouTube, Neal Mohan is focusing on enhancing creator tools and ensuring platform safety since his appointment in 2023. Though born to an Indian family, Mohan was raised in the United States.

Finally, Sabih Khan recently ascended to the position of Chief Operating Officer at Apple. Having served in the company for 30 years, he was elevated from his role as Senior Vice President of Operations. Khan traces his origins to Moradabad, Uttar Pradesh.

This cadre of Indian-origin executives not only exemplifies leadership within their respective companies but also represents the growing influence of Indian talent in the global tech arena.

Source: Original article

-+=