Agregátor RSS

GPXSee 15.6

AbcLinuxu [zprávičky] - 11 Prosinec, 2025 - 18:28
U příležitosti oslav osmi let prací na debianím balíčku vyšlo GPXSee 15.6. Nová verze přináší především podporu pro geotagované MP4 soubory, včetně GoPro videí. Kdo nechce čekat, až nová verze dorazí do jeho distribuce, nalezne zdrojové kódy na GitHubu.
Kategorie: GNU/Linux & BSD

Google fixes super-secret 8th Chrome 0-day

The Register - Anti-Virus - 11 Prosinec, 2025 - 18:09
No details, no CVE, update your browser now

Google issued an emergency fix for a Chrome vulnerability already under exploitation, which marks the world's most popular browser's eighth zero-day bug of 2025.…

Kategorie: Viry a Červi

UK fines LastPass over 2022 data breach impacting 1.6 million users

Bleeping Computer - 11 Prosinec, 2025 - 18:09
The UK Information Commissioner's Office (ICO) fined the LastPass password management firm £1.2 million for failing to implement security measures that allowed an attacker to steal personal information and encrypted password vaults belonging to up to 1.6 million UK users in a 2022 breach. [...]
Kategorie: Hacking & Security

LastPass hammered with £1.2M fine for 2022 breach fiasco

The Register - Anti-Virus - 11 Prosinec, 2025 - 17:45
UK data regulator says failures were unacceptable for a company managing the world's passwords

The UK's Information Commissioner's Office (ICO) says LastPass must cough up £1.2 million ($1.6 million) after its two-part 2022 data breach compromised information from up to 1.6 million UK users.…

Kategorie: Viry a Červi

Monitory s rozlišením 5K už budou i na hraní. Tenhle Asus má výjimečné parametry

Živě.cz - 11 Prosinec, 2025 - 17:45
5K monitory byly doteď jen pro práci, Asus chce oslovit i hráče. • Jeho novinka slibuje nízkou odezvu, vysokou frekvenci a duální režim. • Rozlišení 5120 × 2880 px už adaptovali i jiní výrobci.
Kategorie: IT News

Microsoft bounty program now includes any flaw impacting its services

Bleeping Computer - 11 Prosinec, 2025 - 17:00
Microsoft now pays security researchers for finding critical vulnerabilities in any of its online services, regardless of whether the code was written by Microsoft or a third party. [...]
Kategorie: Hacking & Security

OpenAI slaví 10 let od založení. Dnes je to jiná firma než dřív

Živě.cz - 11 Prosinec, 2025 - 16:45
Před deseti lety vzniklo OpenAI, to se ještě angažoval Elon Musk. • Dnes mají tvůrci ChatuGPT jiné cíle, změnila se i struktura firmy. • Z původních zakladatelů už v OpenAI zůstal jen zlomek lidí.
Kategorie: IT News

New ConsentFix attack hijacks Microsoft accounts via Azure CLI

Bleeping Computer - 11 Prosinec, 2025 - 16:10
A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications. [...]
Kategorie: Hacking & Security

AI is accelerating cyberattacks. Is your network prepared?

Bleeping Computer - 11 Prosinec, 2025 - 16:05
AI-driven attacks now automate reconnaissance, generate malware variants, and evade detection at a speed that overwhelms traditional defenses. Corelight explains how network detection and response (NDR) provides the visibility and behavioral insights SOC teams need to spot and stop these fast-moving threats. [...]
Kategorie: Hacking & Security

How Scientists Are Growing Computers From Human Brain Cells—and Why They Want to Keep Doing It

Singularity HUB - 11 Prosinec, 2025 - 16:00

The technology is still in its infancy. But its trajectory suggests that ethical conversations may become pressing far sooner than expected.

As prominent artificial intelligence researchers eye limits to the current phase of the technology, a different approach is gaining attention: using living human brain cells as computational hardware.

These “biocomputers” are still in their early days. They can play simple games such as Pong, and perform basic speech recognition.

But the excitement is fueled by three converging trends.

First, venture capital is flowing into anything adjacent to AI, making speculative ideas suddenly fundable. Second, techniques for growing brain tissue outside the body have matured with the pharmaceutical industry jumping on board. Third, rapid advances in brain–computer interfaces have seen growing acceptance of technologies that blur the line between biology and machines.

But plenty of questions remain. Are we witnessing genuine breakthroughs, or another round of tech-driven hype? And what ethical questions arise when human brain tissue becomes a computational component?

What the Technology Actually Is

For almost 50 years, neuroscientists have grown neurons on arrays of tiny electrodes to study how they fire under controlled conditions.

A newly fabricated microelectrode array. Bram Servais

By the early 2000s, researchers attempted rudimentary two-way communication between neurons and electrodes, planting the first seeds of a bio-hybrid computer. But progress stalled until another strand of research took off: brain organoids.

In 2013, scientists demonstrated that stem cells could self-organize into three-dimensional brain-like structures. These organoids spread rapidly through biomedical research, increasingly aided by “organ-on-a-chip” devices designed to mimic aspects of human physiology outside the body.

Today, using stem cell-derived neural tissue is commonplace—from drug testing to developmental research. Yet the neural activity in these models remains primitive, far from the organized firing patterns that underpin cognition or consciousness in a real brain.

While complex network behavior is beginning to emerge even without much external stimulation, experts generally agree that current organoids are not conscious, nor close to it.

‘Organoid Intelligence’

The field entered a new phase in 2022, when Melbourne-based Cortical Labs published a high-profile study showing cultured neurons learning to play Pong in a closed-loop system.

The paper drew intense media attention—less for the experiment itself than for its use of the phrase “embodied sentience.” Many neuroscientists said the language overstated the system’s capabilities, arguing it was misleading or ethically careless.

A year later, a consortium of researchers introduced the broader term “organoid intelligence.” This is catchy and media-friendly, but it risks implying parity with artificial intelligence systems, despite the vast gap between them.

Ethical debates have also lagged behind the technology. Most bioethics frameworks focus on brain organoids as biomedical tools—not as components of biohybrid computing systems.

Leading organoid researchers have called for urgent updates to ethics guidelines, noting that rapid research development, and even commercialization, is outpacing governance.

Meanwhile, despite front-page news in Nature, many people remain unclear about what a “living computer” actually is.

A Fast-Moving Research and Commercial Landscape

Companies and academic groups in the United States, Switzerland, China, and Australia are racing to build biohybrid computing platforms.

Swiss company FinalSpark already offers remote access to its neural organoids. Cortical Labs is preparing to ship a desktop biocomputer called CL1. Both expect customers well beyond the pharmaceutical industry—including AI researchers looking for new kinds of computing systems.

Academic aspirations are rising too. A team at UC San Diego has ambitiously proposed using organoid-based systems to predict oil spill trajectories in the Amazon by 2028.

The coming years will determine whether organoid intelligence transforms computing or becomes a short-lived curiosity. At present, claims of intelligence or consciousness are unsupported. Today’s systems display only simple capacity to respond and adapt, not anything resembling higher cognition.

More immediate work focuses on consistently reproducing prototype systems, scaling them up, and finding practical uses for the technology.

Several teams are exploring organoids as an alternative to animal models in neuroscience and toxicology.

One group has proposed a framework for testing how chemicals affect early brain development. Other studies show improved prediction of epilepsy-related brain activity using neurons and electronic systems. These applications are incremental, but plausible.

Small Systems, Big Questions

Much of what makes the field compelling—and unsettling—is the broader context.

As billionaires such as Elon Musk pursue neural implants and transhumanist visions, organoid intelligence prompts deep questions.

What counts as intelligence? When, if ever, might a network of human cells deserve moral consideration? And how should society regulate biological systems that behave, in limited ways, like tiny computers?

The technology is still in its infancy. But its trajectory suggests that conversations about consciousness, personhood, and the ethics of mixing living tissue with machines may become pressing far sooner than expected.

Disclosure statement: Bram Servais formerly worked for Cortical Labs but holds no shared patents or stock and has severed all financial ties.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

The post How Scientists Are Growing Computers From Human Brain Cells—and Why They Want to Keep Doing It appeared first on SingularityHub.

Kategorie: Transhumanismus

Ford a Renault spojují síly v boji o život. Chtějí vyrábět levnější elektromobily s cílem čelit čínské konkurenci

Živě.cz - 11 Prosinec, 2025 - 15:45
Automobilky plánují vyrábět levné elektromobily pro boj s čínskou konkurencí • Nové vozy využijí platformu Renaultu a dorazí na trh roku 2028 • Ford se snaží zastavit propad tržního podílu v Evropě novou spoluprací
Kategorie: IT News

At Apple, identity resilience supports future security

Computerworld.com [Hacking News] - 11 Prosinec, 2025 - 15:11

At Apple, maintaining the highest possible security and privacy across its platforms starts with the standards it supports. 

The company, known for its tight integration between hardware and software, deliberately takes choices that help it promote those priorities — even at the cost of integration with third-party software and services.

It is also true to say that Apple continues to improve and iterate its enterprise offerings. “It’s so great to see the momentum [around Macs in the enterprise],” Jeremy Butcher, who handles business product marketing at Apple, told me last month. “As you know, it’s very intentional.”

Understand the future, look to the past

Apple’s decision to remove kernel extension (kext) support back in 2020 is a perfect illustration. Way back then, the company decided kexts were a potential security problem and gave warning of its intention to remove support from macOS. Some developers complained at the removal — and then we later had the huge CrowdStrike disaster on Windows, which effectively justified Apple’s decision.

While the complaints at Apple’s decision certainly generated volume, and while it is true that the removal of kext support gave some developers problems, the result was improved security across Apple’s ecosystem.

Apple thinks the same way when it comes to identity management across its platforms. That’s because it knows identity is critical to evolving endpoint security architecture, and to build that, you must secure your platforms on the strongest available foundations — particularly for products that support its enterprise presence.

Identity, it’s the answer, don’t you see?

At WWDC 2025, Apple improved Platform Single Sign On, bringing authentication with PSSO into Setup Assistant during Automated Device Enrollment. This hit the market with macOS 26 only a few weeks ago. However, to enjoy this implementation, identity providers must adopt a narrow number of modern frameworks, such as OAuth or OIDC. The idea behind this is that for Identity Providers (IdPs, much used in enterprise security) to deliver optimized platform support across Macs, they must support the latest frameworks. 

That means they can’t rely on custom stacks, as Apple can’t necessarily ensure their security, which means they must support Apple’s Extensible SSO frameworks to deliver seamless sign-on. 

The principle is that if you want to deploy the best possible Apple user experiences, you must align with the company’s decisions around supported frameworks.

Transition is an opportunity

This may all sound a little unfair, but Apple’s focus isn’t on being fair to IdPs, it’s about delivering consistently secure experiences for its users, and, as CrowdStrike showed, strong security cannot exist without strong foundations.

This can be tough news for some businesses, particularly those still enduring the slow but inevitable migration away from their legacy platforms. During that transition it is inevitable some companies will seek a middle ground between Apple’s expression of SSO and the needs of their legacy platforms, even if Apple offers better experiences. Given the company’s track record for making solid security decisions, it seems to me likely to only be a matter of time until IdPs that don’t currently support Apple’s chosen APIs will end up doing so.

Where we are today on that journey is an opportunity, of course. Many in the Apple enterprise focused MDM space will reach out to companies at this point in their transition with compromise solutions that give some of what they need in terms of Apple SSO while also handling noncompliant tech. 

That’s just good business. It’s a profit center for them and can also be seen as a positive reflection of the vibrancy of Apple’s wider enterprise ecosystem and its ability to shape itself to meet ever-emerging enterprise needs. 

Apple’s flexible ecosystem

There’s always going to be money to be made bridging the gap between the central Apple experience and third-party platforms, software, and services. That’s OK, of course, as it means the core Apple experience is maintained, and users like you and I can continue to rely on the platform delivering the best possible security experience. 

Apple’s decision to limit identity provider support to a narrow number of modern frameworks is causing consternation. But, eventually, most of those IdPs will dig a little deeper in their development investment and build solutions Apple can accept — it is important to note that the current macOS that supports recent changes in Apple’s implantation has only been available for a matter of weeks. While we wait for them to catch up, there are plenty of Apple partners ready to help bridge the gap

Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe. Also now on Mastodon.

Kategorie: Hacking & Security

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

The Hacker News - 11 Prosinec, 2025 - 14:40
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes while arguing over privacy and control. And researchers keep uncovering just how much of our digital life is still wide open. The new Threatsday Bulletin Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hackers exploit unpatched Gogs zero-day to breach 700 servers

Bleeping Computer - 11 Prosinec, 2025 - 14:19
An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing instances and compromise hundreds of servers. [...]
Kategorie: Hacking & Security

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

The Hacker News - 11 Prosinec, 2025 - 14:16
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Nejlepší novinky na konec roku. Co nachystaly Netflix, HBO, Disney+ a další streamingy na vánoční sezónu

Živě.cz - 11 Prosinec, 2025 - 13:45
Podívejte se, co streamingové služby chystají pro své předplatitele na konec roku. Vybrali jsme nejzajímavější filmy a seriály.
Kategorie: IT News

Researcher claims Salt Typhoon spies attended Cisco training scheme

The Register - Anti-Virus - 11 Prosinec, 2025 - 13:42
Skills gained later fed Beijing's cyber operations, according to SentinelLabs expert

A security researcher specializing in tracking China threats claims two of Salt Typhoon's members were former attendees of a training scheme run by Cisco.…

Kategorie: Viry a Červi
Syndikovat obsah