Feed aggregator

British and Exotic Mineralogy

Hacker News - Thu, 11/07/2024 - 12:08pm

Article URL: https://c82.net/mineralogy/#

Comments URL: https://news.ycombinator.com/item?id=42078555

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: How would you launch a Social media payments platform

Hacker News - Thu, 11/07/2024 - 12:06pm

Hey HN

I'm building a social commerce payments platform called KuwaPay that will allow users you shop directly from social media platforms like Instagram, Facebook, Snapchat, etc. So I made an MVP, it's a link to a checkout page where customers can buy products in a few clicks and brands can use that in their ads or stories and highlights.

First, how do social media platforms like Instagram and others allow me to integrate my payments app on their platform? And what other feature you as a buyer or seller would like to use in it? Shopping through social media (social commerce) is a big opportunity in the next few years as I have tried to make an Instagram store. I am building on the problems I faced as a seller and buyer.

Share your thoughts on this. Your advice would help me a lot thank you.

Comments URL: https://news.ycombinator.com/item?id=42078540

Points: 1

# Comments: 0

Categories: Hacker News

Europa League Soccer: Livestream Man United vs. PAOK From Anywhere

CNET Feed - Thu, 11/07/2024 - 12:00pm
Ruud van Nistelrooy's Red Devils take on Thessaloniki's finest at Old Trafford.
Categories: CNET

More value, less risk: How to implement generative AI across the organization securely and responsibly

Microsoft Malware Protection Center - Thu, 11/07/2024 - 12:00pm

The technology landscape is undergoing a massive transformation, and AI is at the center of this change—posing both new opportunities as well as new threats.  While AI can be used by adversaries to execute malicious activities, it also has the potential to be a game changer for organizations to help defeat cyberattacks at machine speed. Already today generative AI stands out as a transformative technology that can help boost innovation and efficiency. To maximize the advantages of generative AI, we need to strike a balance between addressing the potential risks and embracing innovation. In our recent strategy paper, “Minimize Risk and Reap the Benefits of AI,” we provide a comprehensive guide to navigating the challenges and opportunities of using generative AI.

According to a recent survey conducted by ISMG, the top concerns for both business executives and security leaders on using generative AI in their organization range, from data security and governance, transparency and accountability to regulatory compliance.1 In this paper, the first in a series on AI compliance, governance, and safety from the Microsoft Security team, we provide business and technical leaders with an overview of potential security risks when deploying generative AI, along with insights into recommended safeguards and approaches to adopt the technology responsibly and effectively.

Learn how to deploy generative AI securely and responsibly

In the paper, we explore five critical areas to help ensure the responsible and effective deployment of generative AI: data security, managing hallucinations and overreliance, addressing biases, legal and regulatory compliance, and defending against threat actors. Each section provides essential insights and practical strategies for navigating these challenges. 

Data security

Data security is a top concern for business and cybersecurity leaders. Specific worries include data leakage, over-permissioned data, and improper internal sharing. Traditional methods like applying data permissions and lifecycle management can enhance security. 

Managing hallucinations and overreliance

Generative AI hallucinations can lead to inaccurate data and flawed decisions. We explore techniques to help ensure AI output accuracy and minimize overreliance risks, including grounding data on trusted sources and using AI red teaming. 

Defending against threat actors

Threat actors use AI for cyberattacks, making safeguards essential. We cover protecting against malicious model instructions, AI system jailbreaks, and AI-driven attacks, emphasizing authentication measures and insider risk programs. 

Addressing biases

Reducing bias is crucial to help ensure fair AI use. We discuss methods to identify and mitigate biases from training data and generative systems, emphasizing the role of ethics committees and diversity practices.

Legal and regulatory compliance

Navigating AI regulations is challenging due to unclear guidelines and global disparities. We offer best practices for aligning AI initiatives with legal and ethical standards, including establishing ethics committees and leveraging frameworks like the NIST AI Risk Management Framework.

Explore concrete actions for the future

As your organization adopts generative AI, it’s critical to implement responsible AI principles—including fairness, reliability, safety, privacy, inclusiveness, transparency, and accountability. In this paper, we provide an effective approach that uses the “map, measure, and manage” framework as a guide; as well as explore the importance of experimentation, efficiency, and continuous improvement in your AI deployment.

I’m excited to launch this series on AI compliance, governance, and safety with a strategy paper on minimizing risk and enabling your organization to reap the benefits of generative AI. We hope this series serves as a guide to unlock the full potential of generative AI while ensuring security, compliance, and ethical use—and trust the guidance will empower your organization with the knowledge and tools needed to thrive in this new era for business.

Additional resources

Minimize Risk and Reap the Benefits of AI

Get more insights from Bret Arsenault on emerging security challenges from his Microsoft Security blogs covering topics like next generation built-in security, insider risk management, managing hybrid work, and more.

1, 2 ISMG’s First annual generative AI study – Business rewards vs. security risks: Research report, ISMG.

The post More value, less risk: How to implement generative AI across the organization securely and responsibly appeared first on Microsoft Security Blog.

Categories: Microsoft

This Board Game Makes You Smarter and It's Under $20 on Amazon Right Now

CNET Feed - Thu, 11/07/2024 - 11:51am
There are board games and then there's Trivial Pursuit. You can save as much as 34% on several editions, dropping them under $20.
Categories: CNET

Air fryers are the latest surveillance threat you didn’t consider

Malware Bytes Security - Thu, 11/07/2024 - 11:45am

Consumer group Which? has warned shoppers to be selective when it comes to buying smart air fryers from Xiaomi, Cosori, and Aigostar.

We’ve learned to expect that “smart” appliances come with privacy risks—toothbrushes aside—but I really hadn’t given my air fryer any thought. Now things are about to change.

You don’t need to worry about the air fryers sending reports about your eating habits to your healthcare provider just yet. But according to Which?, the air fryers’ associated phone apps wanted to know customers’ precise locations, as well as permission to record audio on the user’s phone.

The researchers also found evidence that the Aigostar and Xiaomi fryers both sent people’s personal data to servers in China. This was specified in the privacy notice, but we know not everyone reads a privacy notice.

When buying any kind of smart device, it’s worth doing these things:

  • Question the permissions an app asks for on your phone. Does it serve a purpose for you, the user, or is it just some vendor being nosy?
  • Read the privacy policy. The vendors are counting on it that you won’t but there are times that privacy policies are very revealing.
  • Ask yourself if the appliance needs to be smart. What’s in it for you, and what’s the price you’re going to pay?

An easy solution is not to install the app, and don’t provide manufacturers with personal data they do not need to know. They may need your name for the warranty, but your gender, age, and—most of the time—your address isn’t needed.

You shouldn’t be surprised to find out that appliances that are activated by voice commands are listening to you. How else do you expect them to know you are giving them an order?

It’s what they do with the information and how well they are secured against abuse by third parties that we should be concerned with.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Categories: Malware Bytes

Malwarebytes Acquires AzireVPN

SlashDot - Thu, 11/07/2024 - 11:27am
Categories: SlashDot

Show HN: VRTs – Visual tests for safe WordPress updates

Hacker News - Thu, 11/07/2024 - 11:23am

Article URL: https://vrts.app/

Comments URL: https://news.ycombinator.com/item?id=42078042

Points: 1

# Comments: 0

Categories: Hacker News

Introducing the UHK 80

Hacker News - Thu, 11/07/2024 - 11:18am
Categories: Hacker News

Apple Reportedly Pushes OLED MacBook Air Release by Another Year

CNET Feed - Thu, 11/07/2024 - 11:18am
The model isn't expected now until 2028.
Categories: CNET

Pages