Agregátor RSS

Over 20,000 crypto fraud victims identified in international crackdown

Bleeping Computer - 11 Duben, 2026 - 16:20
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. [...]
Kategorie: Hacking & Security

How to Build Better Digital Twins of the Human Brain

Singularity HUB - 11 Duben, 2026 - 16:00

Brain twins where regions are allowed to compete for resources behave more like the real thing.

The potential to create personalized digital twins of your brain and body is a hot topic in neuroscience and medicine today. These computer models are designed to simulate how parts of your brain interact and how the brain may respond to stimulation, disease, or medication.

The extraordinary complexity of the brain’s billions of neurons makes this a very difficult task, of course, even in the era of AI and big data. Until now, whole-brain models have struggled to capture what makes each brain unique.

People’s brains are all wired slightly differently, so everyone has a unique network of neural connections that represents a kind of “brain fingerprint.”

However, most so-called brain twins are currently more like distant cousins. Their performance is barely any closer to the real thing than if the model were using the wiring diagram of a random stranger.

This matters because digital twins are increasingly proposed as tools for testing treatments by computer simulation, before applying them to real people. If these models fail to capture fundamental principles of each patient’s unique brain organization, their predictions won’t be personalized—and in worst cases could be misleading.

In our latest study, published in Nature Neuroscience, we show that realistic digital brain twins require something that many existing models overlook: competition between the brain’s different systems.

Our findings suggest that without competition, digital twins risk being overly generic, missing out on what makes you “you.”

Excess of Cooperation

The human brain is never static. The ebb and flow of its activity can be mapped non-invasively using neuroimaging methods such as functional MRI. A computer model can be built from this, specific to that person and simulating how the regions of their brain interact. This is the idea of the digital twin.

The brain is often described as a highly cooperative system. Yet everyday experiences such as focusing attention or switching between tasks tells us intuitively that brain systems compete for limited resources. Our brains cannot do everything at once, and not all regions can be active together all the time.

Despite this, the vast majority of brain simulations over the past 20 years have not taken these competitive interactions between regions into account. Rather, they have “forced” neighboring regions to cooperate. This can push the simulated brain into overly synchronized states that are rarely seen in real brains.

In a large comparative study of humans, macaque monkeys, and mice, our international team of researchers used non-invasive brain activity recordings to show that the most realistic whole-brain models not only require cooperative interactions within specialized brain circuits, but long-range competitive interactions between different circuits.

To achieve this, we compared two types of brain model: one in which all interactions between brain regions were cooperative, and another in which regions could either excite or suppress each other’s activity. In humans, monkeys, and mice, the models that included competitive interactions consistently outperformed cooperative-only models.

Using a large-scale analysis of over 14,000 neuroimaging studies, we found that spontaneous activity in the competitive models more faithfully reflected known cognitive circuits, such as those involved in attention or memory. This suggests competition is crucial for enabling the brain to flexibly activate appropriate combinations of regions—a hallmark of intelligent behavior.

Visual summary of our study:

When whole-brain models of humans, macaques, and mice are allowed to treat interactions between some brain regions as competitive, they consistently do so—generating activity patterns that closely resemble those associated with real cognitive processes. Luppi et al/Nature Neuroscience, CC BY

We concluded that competitive interactions act as a stabilizing force, allowing different brain systems to take turns in shaping the direction of the brain’s ebbs and flows without interference or distraction. This ability to avoid runaway activity may also contribute to the remarkable energy-efficiency of the mammalian brain, which is many orders of magnitude more efficient than modern AI systems.

Crucially, models with competitive interactions were not only more accurate but also more individual-specific. This means they were better at capturing the unique brain fingerprint that distinguishes one person’s brain from another’s.

No Longer Lost in Translation?

The fact that our findings hold across humans and other mammals suggests they reflect fundamental principles of how intelligent systems work. In each case, we found models with competitive interactions generated brain activity patterns that closely resembled those associated with real cognitive processes.

This could have major implications for translational neuroscience. Animal models are routinely used to test treatments before human trials, yet differences between species often limit how well these results translate. Around 90 percent of treatments for neuropsychiatric disorders are “lost in translation,” failing in human clinical trials after showing promise in animal trials.

Combining brain imaging data from human patients with whole-brain modeling could radically change this. A framework that works across species would provide a powerful bridge between basic research and clinical application.

If someone needs intervention in the brain, for example due to epilepsy or a tumor, their digital twin could be used to explore how the patient’s brain activity would change when stimulated with different levels of drugs or electrical impulses. This might significantly improve on existing trial-and-error approaches with real patients, and thus provide better treatments.

The general principles of brain organization across species also offer a path for understanding how to shape the next generation of artificial intelligence. In the not-too-distant future, we may be able to construct digital twins that are more faithful in reproducing the salient features of the human brain—and potentially, AI models that are more faithful to the human mind.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

The post How to Build Better Digital Twins of the Human Brain appeared first on SingularityHub.

Kategorie: Transhumanismus

Observatoř Very C. Rubinové odhalila přes jedenáct tisíc asteroidů a mezi nimi i 33 blízkozemních těles

Živě.cz - 11 Duben, 2026 - 15:45
Observatoř objevila během zkušebního provozu přes jedenáct tisíc planetek • Mezi novými nálezy figuruje 33 blízkozemních objektů nepředstavujících hrozbu • Mimořádný úspěch umožnila špičková technika dalekohledu a unikátní software
Kategorie: IT News

Nizozemský vývojář oživil Doom pomocí CSS a ukázal, že i webový prohlížeč zvládne plnohodnotný 3D engine

Živě.cz - 11 Duben, 2026 - 13:45
Nizozemský vývojář vytvořil pro kultovní střílečku plně funkční engine v CSS • Zatímco JavaScript zajišťuje logiku, vykreslování 3D světa obstarávají styly • Projekt místy naráží na limity prohlížečů, ale představuje ohromující ukázku
Kategorie: IT News

Spoření v dubnu: Kam bezpečně s penězi? Přehled všech nabídek na trhu

Lupa.cz - články - 11 Duben, 2026 - 13:15
Zatím máme pořád dobré zprávy, úrokové sazby až na výjimky spíše mírně stoupají, a to u spořicích účtů i termínovaných vkladů.
Kategorie: IT News

Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise

The Register - Anti-Virus - 11 Duben, 2026 - 13:11
Time to start dropping SBOMs

FEATURE  Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from tens of thousands – if not more – organizations. We won't know the full blast radius for months.…

Kategorie: Viry a Červi

Jeden z mála vítězů krátké války v Zálivu: Britská robotická věž Rapid Sentry proti íránským dronům

Živě.cz - 11 Duben, 2026 - 11:45
Britské ministerstvo obrany nedávno oznámilo, že vojáci speciálního pluku Královského letectva RAF Regiment se stali prvními „esy“ dronových bojů, když sestřelili pět a více íránských dronů. Kromě důvodu k oslavám je to potvrzení trendu s narůstajícím významem pozemní obrany proti bezpilotním ...
Kategorie: IT News

Masakr cen u Applu. MacBook Air M4 pod 20 tisíc, Mac mini M2 za 8 tisíc a AirTag za 300 Kč

Živě.cz - 11 Duben, 2026 - 11:20
Začaly se vyprodávat starší produkty Applu. • MacBook Air M4 koupíte za 20 tisíc, Mac mini M2 jen za 8 tisíc. • Sada čtyř AirTagů stojí jen 1195 Kč, jeden vyjde na tři stovky.
Kategorie: IT News

Hungarian government creds left in the safe hands of 'FrankLampard'

The Register - Anti-Virus - 11 Duben, 2026 - 10:30
Nearly 800 state logins surfaced in breach data, including defense and NATO-linked accounts

Hungary's government has discovered the hard way that the biggest threat to national security might just be its own password choices.…

Kategorie: Viry a Červi

Výrobce čipů Onsemi rozšíří aktivity v Česku, kupuje brněnskou firmu navrhující procesory

Živě.cz - 11 Duben, 2026 - 09:45
Americký výrobce čipů Onsemi posílí své aktivity v České republice • . • Firma podle informací e15 kupuje část brněnské společnosti Codasip zaměřenou na návrh procesorů. • Onsemi díky tomu na Moravě rozšíří své centrum výzkumu a vývoje a návrhu čipů, které doplňuje výrobu v Rožnově pod Radhoštěm.
Kategorie: IT News

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

The Hacker News - 11 Duben, 2026 - 08:02
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Robotický vodicí pes díky GPT-4 rozumí příkazům a umí mluvit. Pomáhá nevidomým lépe chápat okolí

Živě.cz - 11 Duben, 2026 - 07:45
Vědci vyvinuli nového robotického vodicího psa vybaveného jazykovým modelem • Inteligentní společník zrakově postiženým lidem předem srozumitelně vysvětlí cestu • Během chůze robot neustále analyzuje a hlasitě komentuje okolí
Kategorie: IT News

ChatGPT rolls out new $100 Pro subscription to challenge Claude

Bleeping Computer - 11 Duben, 2026 - 04:08
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. [...]
Kategorie: Hacking & Security

Splashdown! Astronauti přistáli poblíž Kalifornie. Pak nastala vtipná situace. Nefungoval telefon a záchrana se protáhla

Živě.cz - 11 Duben, 2026 - 03:37
Oživeno 14:45 | Na úplný závěr stručná statistika: Posádka se dostala do rekordní vzdálenosti 406 771 km od Země Loď Orion při cestě k Měsíci a zpět urazila 1 117 659 km Astronauti se k Měsíci přiblížili na vzdálenost 6545 km Během obletu Měsíce pořídila posádka více než 7000 ...
Kategorie: IT News

Kompilátor C89 v bashi

AbcLinuxu [zprávičky] - 11 Duben, 2026 - 03:13
Vývojář Alexandre Gomes Gaigalas na GitHubu zveřejnil c89cc.sh, parser a kompilátor jazyka C89 napsaný v pouhém jediném skriptu o přibližně 8000 řádcích čistého bashe (bez dalších externích závislostí), který generuje ELF64 binárky pro x86-64. Jedná se o velmi jednoduchý kompilátor, který nepodporuje direktivy #include a dokonce ani funkci printf (lze použít puts), všechny dostupné deklarace lze nalézt v proměnné _BUILTIN_LIBC na konci skriptu. Skript je volně dostupný pod ISC licencí.
Kategorie: GNU/Linux & BSD

10 tipů na slevy týdne: výprodej na Alze, 3 za cenu 2 v Dr. Maxu a dovolená se slevou 2 000 Kč

Lupa.cz - články - 11 Duben, 2026 - 01:01
Tento týden se vyplatí nakupovat hned na několika frontách. Dr. Max rozdává třetí produkt zdarma, Alza spustila Alza Dny s kódy na elektroniku i spotřebiče a Fischer láká na dovolenou u moře s okamžitou slevou dva tisíce. Přidaly se i šperky, obuv, drogerie nebo repasovaná elektronika – tipy jsou níže.
Kategorie: IT News

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises

Computerworld.com [Hacking News] - 11 Duben, 2026 - 00:14

Google has made a big step forward by extending end-to-end encryption to Android and iOS devices for Gmail client-side encryption (CSE) users, says an expert.

“All in all, this is a welcome update, especially in light of recent concerns surrounding WhatsApp’s encryption methods,” said Gartner analyst Avivah Litan. “Google’s approach offers verifiable customer-managed keys and ensures the provider does not have access to encrypted content.”

This, she said, addresses allegations raised in the January 2026 lawsuit against Meta regarding their internal access to customer encrypted message data.

Meta has reportedly said the claims are false, and that WhatsApp messages remain protected by default. The suit’s allegations have not been proven in court.

Litan noted that Google’s encryption update is only for organizations subscribing to its Enterprise Plus with Assured Controls edition. Messages and attachments are encrypted directly on-device, with encryption keys managed externally by the customer.

“For CSOs in regulated industries, this development is significant, as it supports secure mobile communication, compliance with regulations such as HIPAA [the U.S. Health Insurance Portability and Accountability Act] and GDPR [the European General Data Protection Regulation], and reduces the risk of plaintext data exposure on mobile devices,” she said. “External recipients retain the ability to reply via a web portal.”

However, Litan added, the capability remains opt-in, requires premium licensing and administrative configuration, and disables several Gmail functions, including AI features and comprehensive search, on encrypted content. But, she pointed out, the limitations are consistent with those in Gmail web and desktop implementations.

It’s also a capability that Microsoft doesn’t provide. A Microsoft spokesperson said in an email that the company doesn’t currently offer end-to-end Outlook encryption on mobile, although messages can be digitally signed and encrypted. 

In its April 9 announcement, Google said Workspace users can compose and read end-to-end encrypted messages natively within the Gmail app on Android and iOS without the need to download extra apps or use mail portals. Users with a Gmail E2EE license can send an encrypted message to any recipient, regardless of their email address. If the recipient uses the Gmail app, the encrypted message will be delivered as a normal message thread to their inbox, but if not, they can seamlessly and securely read and reply in their own native browser. This, Google said, ensures that all users have a simple and secure interface, regardless of their email service or device.

Google Workspace admins will need to enable the Android and iOS clients in the CSE admin interface to give users access to the new capability. This can be done in the Admin Console.

End users also need to be taught the new process: To add client-side encryption to any message, they must click the lock icon and select ‘additional encryption’. Then they can compose a message and add attachments as they normally do.

Forrester Research Senior Analyst Andrew Cornwall noted the biggest benefit for enterprises is that Workspace admins or Google can disable the ability to take screenshots and screen recordings when users read an encrypted message in the Gmail app. That will prevent Android and iOS recipients from forwarding a message as an image, he said, noting that Google can also disable screenshots in Android Chrome for business users and presumably will do this when Android users with email programs other than Gmail open a message in a browser.

From a user’s perspective, he added, this encryption gives Gmail an advantage over third-party email programs like Outlook and Thunderbird, which won’t automatically decrypt messages that have been encrypted using Google’s encryption mechanism. Unlike some encryption methods, Gmail doesn’t require the exchange of a key in advance, so users will be more likely to use it.

However, he pointed out, Google’s client-side encryption doesn’t encrypt headers or message senders, so an attacker with access to the device can still get some potentially sensitive information even with encryption enabled.

“If you’re planning to use Gmail to commit financial crimes or plan a revolution,” he added, “you should know that Google controls the display and often the keyboard on devices they build. Even if emails are encrypted on device, your messages may still be available while being read or composed.”

And while end-to-end encryption (E2EE) is considered by experts to be an excellent protection against the hijacking of data in transit, it won’t protect data on compromised devices, stolen and hacked devices, or in unencrypted backups.

David Shipley, CEO of security awareness provider Beauceron Security, noted the extension of Gmail end to end encryption to mobile platforms will help organizations ensure compliance with privacy concerns. “On the downside,” he added, “this is going to be a powerful tool for criminals. If they spin up a Google Workspace tenant and send encrypted messages to end users who aren’t on Gmail, in those cases, users will get a link to a new portal to read the sent message which will not be intercepted by a lot of security tools like email filters.”

Kategorie: Hacking & Security

Událo se v týdnu 15/2026

AbcLinuxu [články] - 11 Duben, 2026 - 00:01
Ucelený přehled článků, zpráviček a diskusí za minulých 7 dní.
Kategorie: GNU/Linux & BSD
Syndikovat obsah