{"id":43789,"date":"2024-01-25T05:00:09","date_gmt":"2024-01-25T10:00:09","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=557321"},"modified":"2024-01-25T05:00:09","modified_gmt":"2024-01-25T10:00:09","slug":"hashtag-trending-jan-25-new-tool-against-vulnerabilities-in-open-source-ai-models-ai-behind-doomsday-40th-birthday-of-macintosh","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/hashtag-trending-jan-25-new-tool-against-vulnerabilities-in-open-source-ai-models-ai-behind-doomsday-40th-birthday-of-macintosh\/","title":{"rendered":"Hashtag Trending Jan.25- New tool against vulnerabilities in open source AI models; AI behind doomsday?; 40th birthday of Macintosh"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Researchers find huge vulnerabilities in open source AI models, a travel company sees a surge in popularity of the filter than allows you to choose which aircraft to avoid, scientists set the doomsday clock at 90 seconds to midnight naming AI as one of the causes, a professor demonstrates how easy it might be to hack a voting machine and we celebrate the 40<\/span><span style=\"font-weight: 400;\">th<\/span><span style=\"font-weight: 400;\"> birthday of the Macintosh.<\/span><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Hashtag-Trending\/dp\/B074ZQTRMP\/ref=cm_cr_srp_d_product_top?ie=UTF8\"  rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Hashtag Trending on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2hhc2h0YWd0cmVuZGluZy5saWJzeW4uY29tL2dwbQ%3D%3D\"  rel=\"noopener\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Google Podcasts badge - 200 px wide\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/hashtag-trending\/id1264759930?mt=2\"  rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">All this and more on this nostalgia edition of Hashtag Trending. I\u2019m your host Jim Love, CIO of IT World Canada and TechNewsDay in the US.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A recent study by Protect AI researchers uncovered a startling reality. Since August, they found 3,354 models that contained malicious code on Hugging Face, a popular AI model repository.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even more concerning, it\u2019s reported that Hugging Face&#8217;s security scans failed to flag about a third of these as unsafe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In response to this type of threat, the company Protect AI has launched a scanning tool designed to safeguard companies against the rising threat of malware in open source AI models.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Open source AI models are growing in popularity if only for the simple reason that few companies can afford the resources to develop and train an AI model from scratch.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Platforms like Hugging Face are also growing in popularity as a way to share these models. But these repositories may lack comprehensive security measures, leaving the shared models vulnerable to hacker manipulation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Founded in 2022, Protect AI\u2019s new tool scans AI models for hidden malware before these models find their way into a company\u2019s IT systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protect AI plans to use Huntr, an AI-focused bug bounty program it acquired, to help identify potential vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ian Swanson, CEO and co-founder of Protect AI, puts it plainly: &#8220;Companies are freely and blindly downloading these models, but they can contain things that can execute some pretty bad functions to steal data or take over systems.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.axios.com\/2024\/01\/24\/protect-ai-malware-scanning-tool\"><span style=\"font-weight: 400;\">Axios<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Kayak, the online travel agent, has seen a huge increase in the use of a filter that allows travellers to filter by type of aircraft.\u00a0 After an alarming incident involving an Alaska Airlines flight, where a piece of the fuselage fell off,<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially launched in 2019, Kayak&#8217;s aircraft filter was rarely used. However, following the recent Alaska Airlines incident, usage of the filter spiked, leading to a 15-fold increase. This prompted Kayak to make the filter more prominent and user-friendly on their platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The revamped filter now allows users to distinguish between the 737 Max 8 and Max 9 models, particularly significant as the Max 9 has been grounded by the Federal Aviation Administration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A Kayak spokesperson emphasized the goal of their filters: to empower travelers with information for smart decisions and confident travel.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With this information being readily available, travelers are now actively avoiding certain aircraft models, a trend typically reserved only for seasoned travelers with specific preferences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How much impact is this having on carriers? United Airlines, heavily invested in the affected Boeing models, issued a profit warning, indicating the significant financial and operational impacts of these safety concerns on airlines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And as we are going to air, the Guardian has posted another story, which they attribute to the FAA, <\/span><span style=\"font-weight: 400;\">that says \u201ca nose wheel fell off a Delta Air Lines Boeing 757 passenger jet and rolled away as the plane lined up for takeoff over the weekend from Atlanta\u2019s international airport.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Something tells me that filter usage will spike again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.theguardian.com\/business\/2024\/jan\/23\/online-travel-agent-allows-customers-to-filter-out-boeing-737-max-planes\"><span style=\"font-weight: 400;\">The Guardian<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">In a recent federal trial, a computer science professor from the University of Michigan, demonstrated the potential vulnerabilities of Georgia&#8217;s voting system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are all familiar with the conspiracy theories that have been floating around that claim that there was massive fraud in the U.S. election.\u00a0 None of these claims have ever been proven, in fact, in audits and court cases, they have been disproven.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But it doesn\u2019t mean that the machines are not vulnerable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So in the courtroom, the professor, Alex Halderman, showed how easily a voting machine could be tampered with using simple tools like a pen, a fake voter card, or a USB device. His demonstration included altering the results of a hypothetical referendum and flipping the winner in a theoretical election.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This trial, presided over by U.S. District Judge Amy Totenberg, is trying to assess whether Georgia\u2019s voting system is susceptible to manipulation or programming errors. Halderman&#8217;s testimony highlighted the ease of tampering with the machines, raising concerns about the security of the system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Election officials, however, maintain that Georgia&#8217;s elections have never been hacked and that security measures in place effectively prevent interference. They argue that the vulnerabilities demonstrated are speculative and not indicative of real-world risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The trial also delves into the January 2021 breach in Coffee County, where election software was copied and distributed, raising questions about the overall security of the voting system. The plaintiffs, including Georgia voters and activists, are urging Judge Totenberg to prohibit the use of these touchscreens in the upcoming 2024 elections, advocating for hand-filled paper ballots instead.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The case, which includes testimonies from both sides, will be decided by Judge Totenberg, with the outcome potentially impacting the future of voting systems in Georgia and perhaps throughout the U.S.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.ajc.com\/news\/expert-shows-how-to-tamper-with-georgia-voting-machine-in-security-trial\/3J5L3Z2FNBE6XO4WYVZ4Y5UM5U\"><span style=\"font-weight: 400;\">AJC<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Doomsday Clock, a symbol representing the likelihood of a man-made global catastrophe, remains set at 90 seconds to midnight, indicating a continued high risk of global peril.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This year, artificial intelligence (AI) has been highlighted as one of the major threats contributing to this dire prediction.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Doomsday Clock was created by the scientists involved in the Manhattan Project, the U.S. group that developed the first atomic bomb as we saw in the movie Oppenheimer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was first unveiled on the cover of a 1947 magazine called the Bulletin of Atomic Scientists and was initially set at seven minutes to midnight. It has moved 25 times in the past 77 years, mostly due to the potential of nuclear war. In recent years it has been set to 90 seconds to midnight but this time, not only because of global conflicts the potential for atomic war.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Bulletin of Atomic Scientists, responsible for the Clock emphasized the risks posed by AI, including misinformation, military use, and its potential to exacerbate other threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The scientists were careful to point out AI&#8217;s dual nature. It poses significant risks, but it also offers great potential benefits if well managed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rachel Bronson, President of the Bulletin, stressed the urgent need for global action as illustrated by the 90 seconds to midnight setting.\u00a0 Bill Nye, who most of us remember as the \u201cscience guy\u201d also participated in the announcement, maybe with the hope that the guy who taught our kids about science can teach us another lesson \u2013 for the good of humanity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources include: <\/span><a href=\"https:\/\/www.tomsguide.com\/news\/ai-a-threat-to-the-end-of-the-world-doomsday-clock-stays-at-90-seconds-to-midnight\"><span style=\"font-weight: 400;\">Tom&#8217;s Guide<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">And yesterday was, I am told, the 40<\/span><span style=\"font-weight: 400;\">th<\/span><span style=\"font-weight: 400;\"> birthday of Apple\u2019s Macintosh computer. Amazingly, some of us were around when these amazing devices first made their way into our lives.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Where we were all typing into a command line, the Macintosh had a graphical user interface and a mouse. All we could say was \u2013 wow!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a quote from Steve Jobs in Apple&#8217;s press release:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Macintosh easily fits on a desk, both in terms of its style of operation and its physical design. It takes up about the same amount of desk space as a piece of paper. With Macintosh, the computer is an aid to spontaneity and originality, not an obstacle. It allows ideas and relationships to be viewed in new ways. Macintosh enhances not just productivity, but also creativity.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Even back then, Jobs was selling an idea \u2013 never a product.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They were beautiful devices, but they never really took off in business. One reason? The pricing for the original Macintosh was far too high &#8211; about $2,500 USD, about $7,000 in today\u2019s dollars. But it had to cost a lot. It had a whopping 8 MHZ processor, 128 kilobytes, yes, that\u2019s kilobytes, not megabytes of RAM and 400 KB floppy drive for storage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But the Macintosh wouldn\u2019t go away. It found a niche with graphic artists and those who needed its capabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It wasn\u2019t til Jobs came back for a second run at running Apple that he really got to see his vision of \u201cThink Different\u201d working in the marketplace.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Happy birthday old friend.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hashtag Trending goes to air five days a week with a daily news show and every Saturday, we have an interview show called the Weekend Edition.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We love your comments. Please let us know what you think. You can reach me at <\/span><a href=\"mailto:jlove@itwc.ca\"><span style=\"font-weight: 400;\">jlove@itwc.ca<\/span><\/a><span style=\"font-weight: 400;\">\u00a0 or leave a comment under the show notes at <\/span><a href=\"http:\/\/www.itworldcanada.com\/podcasts\"><span style=\"font-weight: 400;\">www.itworldcanada.com\/podcasts<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m your host Jim Love, thanks for listening and have a Thrilling Thursday.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/hashtag-trending-jan-25-new-tool-against-vulnerabilities-in-open-source-ai-models-ai-behind-doomsday-40th-birthday-of-macintosh\/557321\">Hashtag Trending Jan.25- New tool against vulnerabilities in open source AI models; AI behind doomsday?; 40th birthday of Macintosh<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers find huge vulnerabilities in open source AI models, a travel company sees a surge in popularity of the filter than allows you to choose which aircraft to avoid, scientists set the doomsday clock at 90 seconds to midnight naming AI as one of the causes, a professor demonstrates how easy it might be to<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1083,360],"tags":[525,202,1251,1253],"class_list":["post-43789","post","type-post","status-publish","format-standard","hentry","category-hashtag-trending","category-podcasts","tag-ai","tag-apple","tag-kayak","tag-protect-ai"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=43789"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43789\/revisions"}],"predecessor-version":[{"id":43825,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43789\/revisions\/43825"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=43789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=43789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=43789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}