Agregátor RSS
GPXSee 15.6
Google fixes super-secret 8th Chrome 0-day
Google issued an emergency fix for a Chrome vulnerability already under exploitation, which marks the world's most popular browser's eighth zero-day bug of 2025.…
UK fines LastPass over 2022 data breach impacting 1.6 million users
LastPass hammered with £1.2M fine for 2022 breach fiasco
The UK's Information Commissioner's Office (ICO) says LastPass must cough up £1.2 million ($1.6 million) after its two-part 2022 data breach compromised information from up to 1.6 million UK users.…
Monitory s rozlišením 5K už budou i na hraní. Tenhle Asus má výjimečné parametry
První ohebný iPhone nakopne trh se skládacími telefony. Navzdory tomu, že bude pekelně drahý
Microsoft bounty program now includes any flaw impacting its services
OpenAI slaví 10 let od založení. Dnes je to jiná firma než dřív
Aplikace Záchranka umí nově volat i na linku 112, přibyl SMS chat pro nouzovou komunikaci
New ConsentFix attack hijacks Microsoft accounts via Azure CLI
AI is accelerating cyberattacks. Is your network prepared?
How Scientists Are Growing Computers From Human Brain Cells—and Why They Want to Keep Doing It
The technology is still in its infancy. But its trajectory suggests that ethical conversations may become pressing far sooner than expected.
As prominent artificial intelligence researchers eye limits to the current phase of the technology, a different approach is gaining attention: using living human brain cells as computational hardware.
These “biocomputers” are still in their early days. They can play simple games such as Pong, and perform basic speech recognition.
But the excitement is fueled by three converging trends.
First, venture capital is flowing into anything adjacent to AI, making speculative ideas suddenly fundable. Second, techniques for growing brain tissue outside the body have matured with the pharmaceutical industry jumping on board. Third, rapid advances in brain–computer interfaces have seen growing acceptance of technologies that blur the line between biology and machines.
But plenty of questions remain. Are we witnessing genuine breakthroughs, or another round of tech-driven hype? And what ethical questions arise when human brain tissue becomes a computational component?
What the Technology Actually IsFor almost 50 years, neuroscientists have grown neurons on arrays of tiny electrodes to study how they fire under controlled conditions.
A newly fabricated microelectrode array. Bram ServaisBy the early 2000s, researchers attempted rudimentary two-way communication between neurons and electrodes, planting the first seeds of a bio-hybrid computer. But progress stalled until another strand of research took off: brain organoids.
In 2013, scientists demonstrated that stem cells could self-organize into three-dimensional brain-like structures. These organoids spread rapidly through biomedical research, increasingly aided by “organ-on-a-chip” devices designed to mimic aspects of human physiology outside the body.
Today, using stem cell-derived neural tissue is commonplace—from drug testing to developmental research. Yet the neural activity in these models remains primitive, far from the organized firing patterns that underpin cognition or consciousness in a real brain.
While complex network behavior is beginning to emerge even without much external stimulation, experts generally agree that current organoids are not conscious, nor close to it.
‘Organoid Intelligence’The field entered a new phase in 2022, when Melbourne-based Cortical Labs published a high-profile study showing cultured neurons learning to play Pong in a closed-loop system.
The paper drew intense media attention—less for the experiment itself than for its use of the phrase “embodied sentience.” Many neuroscientists said the language overstated the system’s capabilities, arguing it was misleading or ethically careless.
A year later, a consortium of researchers introduced the broader term “organoid intelligence.” This is catchy and media-friendly, but it risks implying parity with artificial intelligence systems, despite the vast gap between them.
Ethical debates have also lagged behind the technology. Most bioethics frameworks focus on brain organoids as biomedical tools—not as components of biohybrid computing systems.
Leading organoid researchers have called for urgent updates to ethics guidelines, noting that rapid research development, and even commercialization, is outpacing governance.
Meanwhile, despite front-page news in Nature, many people remain unclear about what a “living computer” actually is.
A Fast-Moving Research and Commercial LandscapeCompanies and academic groups in the United States, Switzerland, China, and Australia are racing to build biohybrid computing platforms.
Swiss company FinalSpark already offers remote access to its neural organoids. Cortical Labs is preparing to ship a desktop biocomputer called CL1. Both expect customers well beyond the pharmaceutical industry—including AI researchers looking for new kinds of computing systems.
Academic aspirations are rising too. A team at UC San Diego has ambitiously proposed using organoid-based systems to predict oil spill trajectories in the Amazon by 2028.
The coming years will determine whether organoid intelligence transforms computing or becomes a short-lived curiosity. At present, claims of intelligence or consciousness are unsupported. Today’s systems display only simple capacity to respond and adapt, not anything resembling higher cognition.
More immediate work focuses on consistently reproducing prototype systems, scaling them up, and finding practical uses for the technology.
Several teams are exploring organoids as an alternative to animal models in neuroscience and toxicology.
One group has proposed a framework for testing how chemicals affect early brain development. Other studies show improved prediction of epilepsy-related brain activity using neurons and electronic systems. These applications are incremental, but plausible.
Small Systems, Big QuestionsMuch of what makes the field compelling—and unsettling—is the broader context.
As billionaires such as Elon Musk pursue neural implants and transhumanist visions, organoid intelligence prompts deep questions.
What counts as intelligence? When, if ever, might a network of human cells deserve moral consideration? And how should society regulate biological systems that behave, in limited ways, like tiny computers?
The technology is still in its infancy. But its trajectory suggests that conversations about consciousness, personhood, and the ethics of mixing living tissue with machines may become pressing far sooner than expected.
Disclosure statement: Bram Servais formerly worked for Cortical Labs but holds no shared patents or stock and has severed all financial ties.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
The post How Scientists Are Growing Computers From Human Brain Cells—and Why They Want to Keep Doing It appeared first on SingularityHub.
Ford a Renault spojují síly v boji o život. Chtějí vyrábět levnější elektromobily s cílem čelit čínské konkurenci
At Apple, identity resilience supports future security
At Apple, maintaining the highest possible security and privacy across its platforms starts with the standards it supports.
The company, known for its tight integration between hardware and software, deliberately takes choices that help it promote those priorities — even at the cost of integration with third-party software and services.
It is also true to say that Apple continues to improve and iterate its enterprise offerings. “It’s so great to see the momentum [around Macs in the enterprise],” Jeremy Butcher, who handles business product marketing at Apple, told me last month. “As you know, it’s very intentional.”
Understand the future, look to the pastApple’s decision to remove kernel extension (kext) support back in 2020 is a perfect illustration. Way back then, the company decided kexts were a potential security problem and gave warning of its intention to remove support from macOS. Some developers complained at the removal — and then we later had the huge CrowdStrike disaster on Windows, which effectively justified Apple’s decision.
While the complaints at Apple’s decision certainly generated volume, and while it is true that the removal of kext support gave some developers problems, the result was improved security across Apple’s ecosystem.
Apple thinks the same way when it comes to identity management across its platforms. That’s because it knows identity is critical to evolving endpoint security architecture, and to build that, you must secure your platforms on the strongest available foundations — particularly for products that support its enterprise presence.
Identity, it’s the answer, don’t you see?At WWDC 2025, Apple improved Platform Single Sign On, bringing authentication with PSSO into Setup Assistant during Automated Device Enrollment. This hit the market with macOS 26 only a few weeks ago. However, to enjoy this implementation, identity providers must adopt a narrow number of modern frameworks, such as OAuth or OIDC. The idea behind this is that for Identity Providers (IdPs, much used in enterprise security) to deliver optimized platform support across Macs, they must support the latest frameworks.
That means they can’t rely on custom stacks, as Apple can’t necessarily ensure their security, which means they must support Apple’s Extensible SSO frameworks to deliver seamless sign-on.
The principle is that if you want to deploy the best possible Apple user experiences, you must align with the company’s decisions around supported frameworks.
Transition is an opportunityThis may all sound a little unfair, but Apple’s focus isn’t on being fair to IdPs, it’s about delivering consistently secure experiences for its users, and, as CrowdStrike showed, strong security cannot exist without strong foundations.
This can be tough news for some businesses, particularly those still enduring the slow but inevitable migration away from their legacy platforms. During that transition it is inevitable some companies will seek a middle ground between Apple’s expression of SSO and the needs of their legacy platforms, even if Apple offers better experiences. Given the company’s track record for making solid security decisions, it seems to me likely to only be a matter of time until IdPs that don’t currently support Apple’s chosen APIs will end up doing so.
Where we are today on that journey is an opportunity, of course. Many in the Apple enterprise focused MDM space will reach out to companies at this point in their transition with compromise solutions that give some of what they need in terms of Apple SSO while also handling noncompliant tech.
That’s just good business. It’s a profit center for them and can also be seen as a positive reflection of the vibrancy of Apple’s wider enterprise ecosystem and its ability to shape itself to meet ever-emerging enterprise needs.
Apple’s flexible ecosystemThere’s always going to be money to be made bridging the gap between the central Apple experience and third-party platforms, software, and services. That’s OK, of course, as it means the core Apple experience is maintained, and users like you and I can continue to rely on the platform delivering the best possible security experience.
Apple’s decision to limit identity provider support to a narrow number of modern frameworks is causing consternation. But, eventually, most of those IdPs will dig a little deeper in their development investment and build solutions Apple can accept — it is important to note that the current macOS that supports recent changes in Apple’s implantation has only been available for a matter of weeks. While we wait for them to catch up, there are plenty of Apple partners ready to help bridge the gap.
Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe. Also now on Mastodon.
Vyzkoušejte si simulátor, na kterém trénují ukrajinští piloti dronů. UFDS pracuje s daty ze skutečného bojiště
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
Hackers exploit unpatched Gogs zero-day to breach 700 servers
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
Nejlepší novinky na konec roku. Co nachystaly Netflix, HBO, Disney+ a další streamingy na vánoční sezónu
Researcher claims Salt Typhoon spies attended Cisco training scheme
A security researcher specializing in tracking China threats claims two of Salt Typhoon's members were former attendees of a training scheme run by Cisco.…
- « první
- ‹ předchozí
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- následující ›
- poslední »



