Machine learning & AI

AI ethics are ignoring children, say researchers

Researchers from the Oxford Martin Programme on Ethical Web and Data Architectures (EWADA), University of Oxford, have called for a more considered approach when embedding ethical principles in the development and governance ...

Software

Boosting faith in the authenticity of open source software

Open source software—software that is freely distributed, along with its source code, so that copies, additions, or modifications can be readily made —is "everywhere," to quote the 2023 Open Source Security and Risk Analysis ...

Software

Researchers break Apple's new MacBook pro weeks after release

A Georgia Tech researcher has successfully evaded security measures on Apple's latest MacBook Pro with the M3 processor chip to capture his fictional target's Facebook password and second-factor authentication text.

Security

New CPU vulnerability extends to virtual machine environments

In the area of cloud computing—on-demand access to IT resources via the internet—so-called trusted execution environments (TEEs) play a major role. They are designed to ensure that the data on the virtual work environments ...

page 2 from 16