×
Apple

Apple Users Report Weather App Outage in Some Locations (bloomberg.com) 30

Apple said that some users are experiencing disruptions of its weather app on Tuesday, citing a data provider issue. From a report: The Cupertino, California-based company said on its website that issues for the app were reported at 11 p.m. New York time Monday and continued Tuesday. Apple said that precipitation forecasts for the next hour may be unavailable in Alaska "due to a data provider outage," but disruptions appear to be across various cities. All other services, such as the App Store, Apple TV and FaceTime, appear to be available and working without issue.
Security

Capita, Company Providing UK's Nuclear Submarine Training, Says It's Successfully Contained 'Cyber Incident' (therecord.media) 12

Capita, the United Kingdom's largest outsourcing company, confirmed Monday that an IT outage which left staff locked out of their accounts on Friday was caused by "a cyber incident." The Record reports: Staff attempting to login were erroneously told their usual passwords were "incorrect" according to reports, fueling speculation that a cyberattack was to blame, although not all of Capita's 61,000 employees were affected. At the time, a Capita spokesperson said the company was investigating "a technical issue."

In an update on Monday about the incident sent to the Regulatory News Service, the company confirmed it "experienced a cyber incident primarily impacting access to internal Microsoft Office 365 applications." The nature of the incident has not been disclosed. While financially motivated ransomware attacks remain a prevalent threat for organizations in Britain, Capita also provides services to the British government that may be of interest to state-sponsored espionage groups.

Capita's numerous contracts include several with the Ministry of Defence. Last year, a consortium it leads took control over engineering and maintenance support of training simulators for the Royal Navy's nuclear-powered ballistic missile submarines used as part of the U.K.'s nuclear deterrent. In its statement, Capita said: "Immediate steps were taken to successfully isolate and contain the issue," which was "limited to parts of the Capita network."

Security

Novel Social Engineering Attacks Soar 135% Amid Uptake of Generative AI (itpro.com) 15

Researchers from Darktrace have seen a 135% increase in novel social engineering attack emails in the first two months of 2023. IT Pro reports: The cyber security firm said the email attacks targeted thousands of its customers in January and February 2023, an increase which it said matches the adoption rate of ChatGPT. The novel social engineering attacks make use of "sophisticated linguistic techniques," which Darktrace said include increasing text volume, sentence length, and punctuation in emails. Darktrace also found there's been a decrease in the number of malicious emails that are sent with an attachment or link.

The firm said that this behavior could mean that generative AI, including ChatGPT, is being used by malicious actors to construct targeted attacks rapidly. Survey results indicated that 82% of employees are worried about hackers using generative AI to create scam emails which are indistinguishable from genuine communication. It also found that 30% of employees have fallen for a scam email or text in the past. Darktrace asked survey respondents what the top-three characteristics are that suggest an email is a phish and found:

- 68% said it was being invited to click a link or open an attachment
- 61% said it was due to an unknown sender or unexpected content
- Poor use of spelling and grammar was chosen by 61% too

In the last six months, 70% of employees reported an increase in the frequency of scam emails. Additionally, 79% said that their organization's spam filters prevent legitimate emails from entering their inbox. 87% of employees said they were worried about the amount of their personal information online which could be used in phishing or email scams.

Google

Google Brings 'Nearby Share' To Windows, Making It Easy To Transfer Files (arstechnica.com) 25

Google is bringing Android's "Nearby Share" feature to the desktop with a new Windows app. Google says the new program will make sharing between Windows and Android easier, letting you send files over in just a few clicks and taps. From a report: Google's Nearby Share has been built into Android for a few years now and allows you to locally transfer files over Wi-Fi, with the initial device-pairing happening over Bluetooth. Nearby share has been kind of tough to use in real life, since most people share files over the Internet. And for personal use, most people only have one Android device, their phone, so there has been nothing to share files with. A ton of Android users have Windows PCs, though, so for many this will be the first time Nearby Share has an actual use. Using the app is easy. Just download it from the Android website and click a few "next" buttons in the installer. You need a 64-bit Windows PC (not ARM, ironically) with Bluetooth and Wi-Fi. From there you can easily share by dragging and dropping on Windows or by using the Android "share" button and hitting "Nearby Share." You have the option of signing in to the Windows app or not. If you don't you'll need to manually approve every transaction on both the phone and PC. If you sign in, you can set up auto-accept from yourself, anyone in your contacts, or the probably not advisable "everyone" option.
Google

Google To Cut Down on Employee Laptops, Services and Staplers for 'Multi-Year' Savings (cnbc.com) 134

Google's finance chief Ruth Porat recently said in a rare companywide email that the company is making cuts to employee services. From a report: "These are big, multi-year efforts," Porat said in a Friday email titled: "Our company-wide OKR on durable savings." Elements of the email were previously reported by the Wall Street Journal. In separate documents viewed by CNBC, Google said it's cutting back on fitness classes, staplers, tape, and the frequency of laptop replacements for employees. One of the company's important objectives for 2023 is to "deliver durable savings through improved velocity and efficiency." Porat said in the email. "All PAs and Functions are working toward this," she said, referring to product areas.
Security

Western Digital Says Hackers Stole Data in Network Security Breach (techcrunch.com) 7

Data storage giant Western Digital has confirmed that hackers exfiltrated data from its systems during a "network security incident" last week. From a report: The California-based company said in a statement on Monday that an unauthorized third party gained access to "a number" of its internal systems on March 26. Western Digital hasn't confirmed the nature of the incident or revealed how it was compromised, but its statement suggests the incident may be linked to ransomware. [...] Western Digital notes that the incident "has caused and may continue to cause disruption" to the company's business operations.
United States

Americans Begin Returning to Cities After Remote-Work Exodus, Data Shows (msn.com) 194

An anonymous reader shares this report from the Washington Post: The exodus of people fleeing large urban areas during the height of the pandemic appears to be reversing, according to data from the Census Bureau released Thursday. Many workers who could telecommute abandoned crowded cities and counties for suburban or rural areas when covid struck, causing demographers and businesses to wonder whether the movement signified a permanent shift. But the overall patterns of population change are moving toward pre-pandemic rates, the bureau's Vintage 2022 estimates of population and components of change show.

Eleven of the 15 largest metro areas gained residents or lost fewer people compared with the previous year, including the D.C. metro area, New York City, the San Francisco Bay Area, and Seattle, according to an analysis by Brookings Institution senior demographer William Frey.... Among the most striking recorded shifts were in Manhattan and San Francisco, both of which lost population at a significant rate between 2020 and 2021. Manhattan, which shrank by 5.87 percent in 2021, grew by 1.11 percent last year. San Francisco lost 6.79 percent of its population in 2021 but shrank by only a third of a percentage point last year. Both are home to a large number of people who were able to work remotely during the pandemic. Covid rates in New York City were especially high early in the pandemic, and many Manhattan residents moved to outlying counties....

"Many counties with large universities saw their populations fully rebound this year as students returned," said Christine Hartley, assistant division chief for estimates and projections in the Census Bureau's population division.

The article also makes the point that immigration into America was temporarily restricted during the pandemic, so outflows never had a chance to be counterbalanced by inflows. And the exodus to the suburbs may have already peaked. Last year Manhattan gained 17,472 people, the article points out, while counties outside the city lost residents. The Census Bureau notes that was a pattern for 2022: "the smallest counties nationally, those with populations below 10,000, experienced more population loss (60.8%) than gains (38.3%); while the largest counties, having populations at or greater than 100,000, largely experienced population increases (68%)."

Beyond that, the executive director of the DC Fiscal Policy Institute argues that it's just too soon to know whether the pandemic-era outflow from cities was permanent. "We've just been through a major health and economic shock. There's been what I call a doomsday narrative about what's going to happen, with predictions of empty downtowns and city centers that wither and die." They believe the new census data "should give us pause in terms of declaring that we've arrived at a new normal. It's highly likely that some of the folks who left will come back, and we really don't know if it's going to be a lot of them or just a small portion."
Government

San Francisco Faces 'Doom Loop' from Office Workers Staying Home, Gutting Tax Base (sfchronicle.com) 218

Today a warning was published from the editorial board of the San Francisco Chronicle. "Experts say post-pandemic woes stemming from office workers staying home instead of commuting into the city could send San Francisco into a 'doom loop' that would gut its tax base, decimate fare-reliant regional transit systems like BART and trap it in an economic death spiral...." Despite our housing crisis, it was years into the COVID pandemic before our leaders meaningfully questioned the logic of reserving some of the most prized real estate on Earth for fickle suburbanites and their cars. Downtown, after all, was San Francisco's golden goose. Companies in downtown offices accounted for 70% of San Francisco's pre-pandemic jobs and generated nearly 80% of its economic output, according to city economist Ted Egan. And so we wasted generous federal COVID emergency funds trying to bludgeon, cajole and pray for office workers to return downtown instead of planning for change. We're now staring down the consequences for that lack of vision.

The San Francisco metropolitan area's economic recovery from the pandemic ranked 24th out of the 25 largest regions in the U.S., besting only Baltimore, according to a report from the Bay Area Council Economic Institute. In the first quarter of 2023, San Francisco's office vacancy rate shot up to a record-high 29.4% — the biggest three-year increase of any U.S. city. The trend isn't likely to end anytime soon: In January, nearly 30% of San Francisco job openings were for hybrid or fully remote work, the highest share of the nation's 50 largest cities. Amid lower property, business and real estate transfer taxes, the city is projecting a $728 million deficit over the next two fiscal years. Transit ridership remains far below pre-pandemic levels. In January, downtown San Francisco BART stations had just 30% of the rider exits they did in 2019, according to a report from Egan's office. Many Bay Area transit agencies, including Muni, are rapidly approaching a fiscal cliff.

San Francisco isn't dead; as of March, it was home to an estimated 173 of the country's 655 companies valued at more than $1 billion. Tourism is beginning to rebound. And new census data shows that San Francisco's population loss is slowing, a sign its pandemic exodus may be coming to an end. But the city can't afford to wait idly for things to reach equilibrium again. It needs to evolve — quickly. Especially downtown. That means rebuilding the neighborhood's fabric, which won't be cheap or easy. Office-to-housing conversions are notoriously tricky and expensive. Demolishing non-historic commercial buildings that no longer serve a purpose in the post-pandemic world is all but banned. And, unlike New York after 9/11, San Francisco is a city that can't seem to stop getting in its own way.

So what's the solution? The CEO of the Bay Area Council suggests public-private partnerships that "could help shift downtown San Francisco's focus from tech — with employees now accustomed to working from home — to research and development, biotech, medical research and manufacturing, which all require in-person workers."

And last week San Francisco's mayor proposed more than 100 changes to streamline the permitting process for small businesses, and on Monday helped introduce legislation making it easier to convert office buildings to housing, expand pop-up business opportunities, and fill some empty storefronts. This follows a February executive order to speed housing construction. The editorial points out that "About 40% of office buildings in downtown San Francisco evaluated in a study would be good candidates for housing due to their physical characteristics and location and could be converted into approximately 11,200 units, according to research from SPUR and the Urban Land Institute San Francisco."

But without some action, the editorial's headline argues that "Downtown San Francisco is at risk of collapsing — and taking much of the Bay Area with it."
Crime

German Police Raid DDoS-Friendly Host 'FlyHosting' (krebsonsecurity.com) 5

An anonymous reader quotes a report from KrebsOnSecurity: Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure. A statement released today by the German Federal Criminal Police Office says they served eight search warrants on March 30, and identified five individuals aged 16-24 suspected of operating "an internet service" since mid-2021. The German authorities did not name the suspects or the Internet service in question.

"Previously unknown perpetrators used the Internet service provided by the suspects in particular for so-called 'DDoS attacks', i.e. the simultaneous sending of a large number of data packets via the Internet for the purpose of disrupting other data processing systems," the statement reads. The German authorities said that as a result of the DDoS attacks facilitated by the defendants, the websites of various companies as well as those of the Hesse police have been overloaded in several cases since mid-2021, "so that they could only be operated to a limited extent or no longer at times." The statement says police seized mobile phones, laptops, tablets, storage media and handwritten notes from the unnamed defendants, and confiscated servers operated by the suspects in Germany, Finland and the Netherlands.

Upgrades

Glitch In System Upgrade Identified As Cause of Delays At Singapore Immigration (zdnet.com) 5

Technical glitch during a scheduled upgrade affected all automated immigration clearance systems and led to rare delays at Singapore's Changi Airport, which recently was again named the world's best airport. ZDNet reports: Long lines were spotted Thursday morning at the country's airport where travelers usually would not need more than mere minutes to clear immigration. In a series of posts on Facebook and Twitter, Singapore's Immigration & Checkpoints Authority (ICA) said it was experiencing "system slowness" at several passenger clearance checkpoints, including all automated departure lanes at all terminals at Changi Airport. Selected automated systems at the Woodlands and Tuas border checkpoints, through which travelers would enter neighboring country Malaysia, also were affected. Immigration systems at coastal checkpoints were the only ones that were not disrupted.

Passengers were advised to postpone non-essential travel and expect delays, as they would be redirected to manual lanes for immigration clearance. By 4pm the same day, automated immigration clearance at all checkpoints were back up and running. ICA said in a statement late-Thursday that preliminary investigations revealed a "technical glitch" had occurred during a pre-scheduled system upgrade, causing an "unanticipated system overload". This brought down the automated immigration clearance systems, which affected all departure terminals at Changi Airport and arrival terminals at Terminals 2 and 4. ICA did not provide details on the system upgrade or whether the procedure was tested before the scheduled live rollout.

Businesses

Dumb Phones Are on the Rise in the US (cnbc.com) 103

Dumb phones may be falling out of fashion on a global scale, but it's a different story in the U.S. From a report: Companies like HMD Global, the maker of Nokia phones, continue to sell millions of mobile devices similar to those used in the early 2000s. This includes what's known as "feature phones" -- traditional flip or slide phones that have additional features like GPS or a hotspot. "I think you can see it with certain Gen Z populations -- they're tired of the screens," said Jose Briones, dumb phone influencer and moderator of the subreddit, "r/dumbphones." "They don't know what is going on with mental health and they're trying to make cutbacks."

In the U.S., feature flip phone sales were up in 2022 for HMD Global, with tens of thousands sold each month. At the same time, HMD's global feature phone sales were down, according to the company. In 2022, almost 80% of feature phone sales in 2022 came from the Middle East, Africa and India, according to Counterpoint Research. But some see that number shifting, as a contingency of young people in the U.S. revert back to dumb or minimalist phones. "In North America, the market for dumb phones is pretty much flatlined," said Moorhead. "But I could see it getting up to 5% increase in the next five years if nothing else, based on the public health concerns that are out there."

Security

'Vulkan Files' Leak Reveals Putin's Global and Domestic Cyberwarfare Tactics (theguardian.com) 42

"The Gaurdian reports on a document leak from Russian cyber 'security' company Vulkan," writes Slashdot reader Falconhell. From the report: Inside the six-storey building, a new generation is helping Russian military operations. Its weapons are more advanced than those of Peter the Great's era: not pikes and halberds, but hacking and disinformation tools. The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin's cyberwarfare capabilities.

Thousands of pages of secret documents reveal how Vulkan's engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company's work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia's foreign intelligence organization.

One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks. Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia's command, and also enables disinformation via fake social media profiles. A third Vulkan-built system -- Crystal-2V -- is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: "The level of secrecy of processed and stored information in the product is 'Top Secret'."

Security

US, Partner Countries Call For Controls To Counter Misuse of Spyware (reuters.com) 18

The United States and some of its partner countries on Thursday called for strict domestic and international controls to counter the proliferation and misuse of commercial spyware. From a report: The joint statement was issued by the governments of Australia, Canada, Costa Rica, Denmark, France, New Zealand, Norway, Sweden, Switzerland, the United Kingdom, and the United States. The countries said they were committed to preventing the export of technology and equipment to end-users who are likely to use them for "malicious cyber activity." The joint statement also said the countries would share information with each other on spyware proliferation and misuse, including to better identify these tools. On Monday, U.S. President Joseph Biden signed an executive order intended to curb the malicious use of digital spy tools around the globe targeting U.S. personnel and civil society. The new executive order was designed to apply pressure on the secretive industry by placing new restrictions on U.S. government defense, law enforcement and intelligence agencies' purchasing decisions.
Microsoft

Microsoft Patched Bing Vulnerability That Allowed Snooping on Email and Other Data (wsj.com) 10

Microsoft patched a dangerous security issue in Bing last month just days before it launched a new artificial intelligence-powered version of the search engine. From a report: The problem was discovered by outside researchers at the security firm Wiz. It was created by a mistake in the way that Microsoft configured applications on Azure, its cloud-computing platform, and could be used to gain access to emails and other documents of people who used Bing, the researchers said. Microsoft fixed the problem on Feb. 2, according to Ami Luttwak, Wiz's chief technology officer. Five days later Satya Nadella introduced the new generative AI capabilities to Bing, bringing a renewed interest in Microsoft's 14-year-old search engine. Usage of Bing has jumped, rising to more than 100 million daily active users in the month since the upgrade.
AI

Free AI Programs Prone To Security Risks, Researchers Say (bloomberg.com) 17

Companies rushing to adopt hot new types of artificial intelligence should exercise caution when using open-source versions of the technology, some of which may not work as advertised or include flaws that hackers can exploit, security researchers say. From a report: There are few ways to know in advance if a particular AI model -- a program made up of algorithms that can do such things as generate text, images and predictions -- is safe, said Hyrum Anderson, distinguished engineer at Robust Intelligence, a machine learning security company that lists the US Defense Department as a client. Anderson said he found that half the publicly available models for classifying images failed 40% of his tests. The goal was to determine whether a malicious actor could alter the outputs of AI programs in a manner that could constitute a security risk or provide incorrect information. Often, models use file types that are particularly prone to security flaws, Anderson said. It's an issue because so many companies are grabbing models from publicly available sources without fully understanding the underlying technology, rather than creating their own. Ninety percent of the companies Robust Intelligence works with download models from Hugging Face, a repository of AI models, he said.
Businesses

Exxon's Climate Opponents Were Infiltrated by Massive Hacking-for-Hire Operation (wsj.com) 37

An anonymous reader shares a report: In the midst of perpetrating what federal prosecutors say was a massive corporate hacking campaign, Israeli private detective Aviram Azari in 2017 received welcome news. A group of hackers in India wrote him to say they had successfully infiltrated the email and social-media accounts of a group of environmental activists campaigning against Exxon. "On a happy note I would like to report some success below: Project Name Rainbow," the hackers wrote in electronic messages that were viewed by The Wall Street Journal. The messages included evidence of the successful intrusions, including screenshots of compromised email inboxes.

The messages along with court records reveal new details about the hacking campaign, including that thousands of individuals and companies were targeted and at least some of the attacks resulted in the hackers successfully gaining access to the private accounts of the victims and obtaining their passwords. Among the targets was the Rockefeller Family Fund, a charity created by some of the heirs of John D. Rockefeller, who founded Exxon's forebear Standard Oil. The fund has for years been involved in campaigns arguing that Exxon hid from the public the full extent of what it knew internally about climate change and the role fossil fuels played in causing it.

Youtube

AV1 Live Streaming Is Finally Coming To YouTube (tomshardware.com) 30

An anonymous reader shares a report: In a recent video, YouTuber EposVox reports that YouTube is finally rolling out AV1 live-streaming support to the platform, with the tech currently in a beta. AV1 will provide YouTube live streams with a substantial increase in video quality, and allow users to stream at up to 4K 60FPS with Twitch-limited bitrates. EposVox was able to get early access to a development build of OBS 29.1 to check out YouTube's live streaming AV1 capabilities. The newest addition to the AV1 rollout is YouTube live streaming support with AV1. YouTube just rolled out beta support for a new video live-streaming standard known as Enhanced RTMP, which will allow streamers to utilize several of the latest video codecs, including AV1, VP9, and HEVC (H.265) to live stream videos to YouTube.

EposVox was able to test drive Enhanced RTMP, with a development build of OBS 21.9 to stream AV1 gaming content to YouTube directly. According to EposVox, the quality difference is night and day compared to H.264. The quality jump with AV1, allowed him to drive higher quality video to his live stream, and remove pixelation altogether. Just for perspective on how powerful AV1 is, EposVox was able to run an AV1 1440P 60FPS live stream of Halo Infinite at 500kbps - a bitrate 15x lower than the Twitch limit, and the stream was still perfectly watchable. For normal use cases, EposVox found that 8mbps was the sweet spot for 1440P 60FPS, and around 15mbps for 1440P 60FPS. For a perfectly good-looking live stream with none or close to no pixelization. For users that still want to stream 1080P video, all you'll need is a 4MBps bitrate to achieve the same result. This is a night and day difference to H.264 where 8Mbps was about the minimum you want for a high-quality 1080P 60FPS video stream, and even in this situation, pixelation is still very likely to occur with a lot of streams.

Security

Ransomware Crooks Are Exploiting IBM File-Exchange Bug With a 9.8 Severity (arstechnica.com) 18

Threat actors are exploiting a critical vulnerability in an IBM file-exchange application in hacks that install ransomware on servers, security researchers have warned. From a report: The IBM Aspera Faspex is a centralized file-exchange application that large organizations use to transfer large files or large volumes of files at very high speeds. Rather than relying on TCP-based technologies such as FTP to move files, Aspera uses IBM's proprietary FASP -- short for Fast, Adaptive, and Secure Protocol -- to better utilize available network bandwidth. The product also provides fine-grained management that makes it easy for users to send files to a list of recipients in distribution lists or shared inboxes or workgroups, giving transfers a workflow that's similar to email.

In late January, IBM warned of a critical vulnerability in Aspera versions 4.4.2 Patch Level 1 and earlier and urged users to install an update to patch the flaw. Tracked as CVE-2022-47986, the vulnerability makes it possible for unauthenticated threat actors to remotely execute malicious code by sending specially crafted calls to an outdated programming interface. The ease of exploiting the vulnerability and the damage that could result earned CVE-2022-47986 a severity rating of 9.8 out of a possible 10. On Tuesday, researchers from security firm Rapid7 said they recently responded to an incident in which a customer was breached using the vulnerability.

Security

UK Sets Up Fake Booter Sites To Muddy DDoS Market (krebsonsecurity.com) 47

An anonymous reader quotes a report from KrebsOnSecurity: The United Kingdom's National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The NCA says all of its fake so-called "booter" or "stresser" sites -- which have so far been accessed by several thousand people -- have been created to look like they offer the tools and services that enable cyber criminals to execute these attacks.

"However, after users register, rather than being given access to cyber crime tools, their data is collated by investigators," reads an NCA advisory on the program. "Users based in the UK will be contacted by the National Crime Agency or police and warned about engaging in cyber crime. Information relating to those based overseas is being passed to international law enforcement." The NCA declined to say how many phony booter sites it had set up, or for how long they have been running. The NCA says hiring or launching attacks designed to knock websites or users offline is punishable in the UK under the Computer Misuse Act 1990. "Going forward, people who wish to use these services can't be sure who is actually behind them, so why take the risk?" the NCA announcement continues.

Microsoft

Microsoft Unveils OpenAI-Based Chat Tools for Fighting Cyberattacks (bloomberg.com) 14

Microsoft, extending a frenzy of artificial intelligence software releases, is introducing new chat tools that can help cybersecurity teams ward off hacks and clean up after an attack. From a report: The latest of Microsoft's AI assistant tools -- the software giant likes to call them Copilots -- uses OpenAI's new GPT-4 language system and data specific to the security field, the company said Tuesday. The idea is to help security workers more quickly see connections between various parts of a hack, such as a suspicious email, malicious software file or the parts of the system that were compromised. Microsoft and other security software companies have been using machine-learning techniques to root out suspicious behavior and spot vulnerabilities for several years. But the newest AI technologies allow for faster analysis and add the ability to use plain English questions, making it easier for employees who may not be experts in security or AI. That's important because there's a shortage of workers with these skills, said Vasu Jakkal, Microsoft's vice president for security, compliance, identity and privacy. Hackers, meanwhile, have only gotten faster.

Slashdot Top Deals