Categories
Business Industry

Google Messages could bring improved security measures for RCS

[ad_1]

Last updated: April 10th, 2024 at 05:29 UTC+02:00

RCS is the successor to SMS and will soon see much broader adoption, as Apple is expected to bring RCS support to iPhones later this year. Ahead of its wider adoption, Google is adding some security measures to make RCS even more secure for users, and it involves warning users about possible risks.

Google Messages will warn users about visiting links sent by unknown users via RCS

It has been revealed that Google Messages will soon warn users about the risk of visiting links sent via RCS by users who aren’t on their contacts list. This feature isn’t live on the stable version of Google Messages yet and is under testing. It was spotted by Android enthusiast @AssembleDebug (via PiunikaWeb) in the latest beta version (20240402_01_RCO0) of Google Messages. An X user pointed out that this feature even works with links received via SMS. In recent Galaxy phones, the Google Messages app is the default SMS and RCS app instead of Samsung Messages.

Google Messages RCS External Link Warning

With this feature, Google is ensuring that users understand the risk they are taking by visiting URLs (links) that they receive from people they don’t know or aren’t in their contacts list. Users must click the ‘Continue With Possible Risk checkmark and click Continue to visit the link.

RCS is a huge upgrade over SMS. It allows you to send long text messages, high-resolution images and videos, stickers, locations, voice messages, and more. It supports typing indicators and managing messages from the web. It supports group chats, individual message replies, and other advanced features.



[ad_2]

Source Article Link

Categories
News

OpenAI safety measures for advanced AI systems

OpenAI AI safety measures for advanced artificial intelligence systems

The creation of advanced artificial intelligence (AI) systems brings with it a host of opportunities, but also significant risks. In response to this, OpenAI has embarked on the development of AI safety measures and risk preparedness for advanced artificial intelligence systems. The aim is to ensure that as AI capabilities increase, the potential for catastrophic risks is mitigated, and the benefits of AI are maximized.

OpenAI’s approach to managing these risks is multi-faceted. The company is developing a comprehensive strategy to address the full spectrum of safety risks related to AI, from the concerns posed by current systems to the potential challenges of superintelligence. This strategy includes the creation of a Preparedness team and the initiation of a challenge to foster innovative solutions to AI safety issues.

OpenAI’s approach to catastrophic risk preparedness

“As part of our mission of building safe AGI, we take seriously the full spectrum of safety risks related to AI, from the systems we have today to the furthest reaches of superintelligence. In July, we joined other leading AI labs in making a set of voluntary commitments to promote safety, security and trust in AI. These commitments encompassed a range of risk areas, centrally including the frontier risks that are the focus of the UK AI Safety Summit. As part of our contributions to the Summit, we have detailed our progress on frontier AI safety, including work within the scope of our voluntary commitments.”

In July, OpenAI joined other leading AI labs in making voluntary commitments to promote safety, security, and trust in AI. This commitment focuses on frontier risks, which are the potential dangers posed by frontier AI models. These models, which exceed the capabilities of current AI systems, have tremendous potential to benefit humanity. However, they also pose significant risks, including the possibility of misuse by malicious actors.

To address these concerns, OpenAI is working diligently to answer key questions about the dangers of frontier AI systems. The company is developing a robust framework for monitoring and protection, and is exploring how stolen AI model weights might be misused. This work is crucial for ensuring that the benefits of frontier AI models can be realized, while the risks are effectively managed.

Other articles we have written that you may find of interest on the subject of OpenAI :

Protecting against catastrophic risks

The Preparedness team, led by Aleksander Madry, is at the forefront of these efforts. This team is tasked with connecting capability assessment, evaluations, and internal red teaming for frontier models. Their work involves tracking, evaluating, forecasting, and protecting against catastrophic risks in multiple categories. This includes individual persuasion, cybersecurity, Chemical, Biological, Radiological, and Nuclear (CBRN) threats, and Adversarial Robustness and Assurance (ARA).

The Preparedness team is also responsible for developing and maintaining a Risk-Informed Development Policy (RDP). This policy details OpenAI’s approach to developing rigorous frontier model capability evaluations and monitoring. It outlines the steps for creating protective actions and establishing a governance structure for accountability and oversight. The RDP is designed to complement and extend existing risk mitigation work, contributing to the safety and alignment of new, highly capable systems, both before and after deployment.

The development of AI safety measures and risk preparedness for advanced artificial intelligence systems is a complex and ongoing process. It requires a deep understanding of the potential risks and a robust approach to mitigating them. OpenAI’s commitment to this work, as evidenced by the formation of the Preparedness team and the development of the RDP, demonstrates the company’s dedication to ensuring that AI is developed and used in a way that is safe, secure, and beneficial for all of humanity. It is a clear testament to the company’s commitment to promoting AI safety, security, and trust.

Filed Under: Technology News, Top News





Latest timeswonderful Deals

Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, timeswonderful may earn an affiliate commission. Learn about our Disclosure Policy.

Categories
News

Kensington Lock and Other Security Measures for Your Computer

Kensington Lock

In the first quarter of 2023, global cyber-attacks surged by 7%, marking a significant uptick compared to the previous year’s figures. In this age of interconnected devices and data highways, the vulnerabilities of our computers go beyond the digital realm.

So, let’s delve into the tangible world of locks and keys. Our focal point? The star of physical computer security – the Kensington Lock. That’s because, in the ever-evolving cyber frontier, defense isn’t merely an option – it’s an absolute necessity.

What is a Kensington Lock?

The Kensington Lock serves as a dependable sidekick for your computer, acting like a trusty leash that tethers your laptop to a fixed object. This ensures it stays firmly in place, be it on a desk or against a wall. With this lock, you can relish the freedom of mobility without the constant concern of your device wandering off.

The technology behind it is refreshingly straightforward. A sturdy cable, often crafted from galvanized steel, threads through the Kensington slot, forming a robust connection. This physical deterrent poses a challenge for opportunistic thieves, serving as a visible obstacle in their path.

So, why is it a game-changer? It’s user-friendly, requiring no technical know-how. Moreover, its conspicuous presence speaks volumes. However, in high-risk scenarios or against determined thieves, it might offer a delay rather than complete prevention. Consider it a valuable addition to your overall security strategy rather than a standalone solution.

It’s crucial to note that the Kensington Lock isn’t the sole contender in the realm of physical security. Alternatives like adhesive plates with a lock slot or security enclosures present unique approaches. Adhesive plates provide an additional layer of security without necessitating a Kensington slot, while security enclosures envelop your device, shielding it from physical tampering.

The Kensington Lock might be reliable in securing your gadget, but it’s worth exploring alternatives to find the best fit for your specific needs.

Kensington Lock

Software and Firmware Security

Computer security is not only about fortifying the physical aspects; you also need to strengthen the digital and unseen fronts. Now, let’s explore the field of software and firmware security and their vital role in safeguarding the security of your digital life.

Password Managers

Attempting to remember a multitude of complex passwords for all your accounts is akin to juggling flaming torches – it’s a recipe for disaster. Here’s where password managers come to the rescue. These handy tools generate and recall robust, unique passwords for all your accounts, giving hackers a formidable challenge. A password manager seamlessly operates across all your devices, making security a breeze and allowing you to focus on the important stuff without compromising safety.

Virtual Private Networks (VPNs)

Consider VPNs as the ultimate armor elevating the security of your internet connection, granting you the liberty to navigate the web under the guise of invisibility. More than just safeguarding your data from prying eyes, VPNs provide an additional level of defense by concealing your IP address. When selecting a VPN that is best suitable for your needs, inspect some VPN comparison tables and consider factors like their logging policies, server locations, and speed to ensure smooth and secure online activities.

Two-Factor Authentication (2FA)

Enhancing the resilience of your login credentials goes beyond having a password tougher to crack than a walnut. 2FA adds an extra layer of security by demanding a second form of verification. Whether it’s a text message code or a fingerprint scan, this additional step makes it significantly more challenging for unwelcome guests to infiltrate. Embrace 2FA wherever possible to construct a digital fortress that poses a real challenge for potential intruders.

Firmware Security

Firmware orchestrates the seamless performance of your device’s hardware. Yet, despite its pivotal role in ensuring everything runs like a well-oiled machine, there’s a twist – firmware isn’t impervious to vulnerabilities. Imagine a sneak attack on this software. If the bad guys get in, they might take over your device from afar, snatch up your private info, or even turn your gadget into a launching pad for more mischief.

Firmware updates aren’t merely about adding flashy features; they patch up vulnerabilities and ensure your system remains robust and secure. Regular updates serve as a force field against cyber threats, keeping your silent protector sharp and prepared for whatever challenges the digital world throws its way.

In the grand scheme of security, relying solely on one side of the fence is insufficient. Tools like Kensington Locks teaming up with digital heavyweights create a defense dream team. This combination ensures that your computer is not only physically guarded when you’re out and about but also equipped to tackle the nuanced challenges of the ever-evolving digital landscape.

Conclusion

Achieving robust security entails seamlessly integrating both physical and digital defenses. While Kensington Locks offer a tangible layer of protection, the virtual world requires a parallel focus. Antivirus solutions, password managers, firewalls, VPNs and routine firmware updates safeguard your digital properties.

It’s paramount to adopt a comprehensive strategy for computer security. The tangible security provided by the Kensington Lock should seamlessly blend with the intricate choreography of software and firmware safeguards. By intricately interconnecting these components, you forge a security tapestry resilient against the challenges posed by both the physical and ethereal threats in the digital landscape.

Filed Under: Guides, Technology News





Latest timeswonderful Deals

Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, timeswonderful may earn an affiliate commission. Learn about our Disclosure Policy.