EU

WhatsApp Faces Tougher EU Rules As Users Top 45 Million (msn.com) 38

Meta's WhatsApp messaging service has surpassed 45 million users, earning the designation of a "Very Large Online Platform" under the EU's Digital Services Act. Bloomberg reports: WhatsApp's open channels, which are feeds affiliated with news outlets or public figures that under the DSA are comparable to a social network, averaged about 46.8 million monthly average users in the second half of 2024, Meta said in a filing on Feb. 14 that hasn't previously been reported. [...] The DSA content moderation rulebook imposes stricter requirements on very large online platforms, defined as those whose EU-based monthly active users exceed 45 million. Users of WhatsApp's core messaging feature do not count toward the designation under the DSA.

The commission would still need to rule that WhatsApp should be included in the more regulated tier. Under the DSA, very large online platforms must carry out risk assessments on the spread of illegal or harmful content, and put in place a mitigation strategy. Fines under the DSA can reach as much as 6% of a company's annual global sales. The DSA requires platforms to disclose user numbers every six months. Messaging service Telegram also published an update this week, saying that monthly EU users of its public channels are "significantly fewer than 45 million."

Moon

Nokia is Putting the First Cellular Network On the Moon (technologyreview.com) 33

An anonymous reader shares a report: Later this month, Intuitive Machines, the private company behind the first commercial lander that touched down on the moon, will launch a second lunar mission from NASA's Kennedy Space Center. The plan is to deploy a lander, a rover, and hopper to explore a site near the lunar south pole that could harbor water ice, and to put a communications satellite on lunar orbit. But the mission will also bring something that's never been installed on the moon or anywhere else in space before -- a fully functional 4G cellular network.

Point-to-point radio communications, which need a clear line of sight between transmitting and receiving antennas, have always been a backbone of both surface communications and the link back to Earth, starting with the Apollo program. Using point-to-point radio in space wasn't much of an issue in the past because there never have been that many points to connect. Usually, it was just a single spacecraft, a lander, or a rover talking to Earth. And they didn't need to send much data either. "They were based on [ultra high frequency] or [very high frequency] technologies connecting a small number of devices with relatively low data throughput," says Thierry Klein, president of Nokia Bell Labs Solutions Research, which was contracted by NASA to design a cellular network for the moon back in 2020.

Technology

Chase Will Soon Block Zelle Payments To Sellers on Social Media (bleepingcomputer.com) 58

An anonymous reader shares a report: JPMorgan Chase Bank (Chase) will soon start blocking Zelle payments to social media contacts to combat a significant rise in online scams utilizing the service for fraud.

Zelle is a highly popular digital payments network that allows users to transfer money quickly and securely between bank accounts. It is also integrated into the mobile apps of many banks in the United States, allowing for almost instant transfers without requiring cash or checks but lacking one crucial feature: purchase protection.

AI

Lawsuit Accuses Meta Of Training AI On Torrented 82TB Dataset Of Pirated Books (hothardware.com) 47

"Meta is involved in a class action lawsuit alleging copyright infringement, a claim the company disputes..." writes the tech news site Hot Hardware.

But the site adds that newly unsealed court documents "reveal that Meta allegedly used a minimum of 81.7TB of illegally torrented data sourced from shadow libraries to train its AI models." Internal emails further show that Meta employees expressed concerns about this practice. Some employees voiced strong ethical objections, with one noting that using content from sites like LibGen, known for distributing copyrighted material, would be unethical. A research engineer with Meta, Nikolay Bashlykov, also noted that "torrenting from a corporate laptop doesn't feel right," highlighting his discomfort surrounding the practice.

Additionally, the documents suggest that these concerns, including discussions about using data from LibGen, reached CEO Mark Zuckerberg, who may have ultimately approved the activity. Furthermore, the documents showed that despite these misgivings, employees discussed using VPNs to mask Meta's IP address to create anonymity, enabling them to download and share torrented data without it being easily traced back to the company's network.

Biotech

AI Used To Design a Multi-Step Enzyme That Can Digest Some Plastics 33

Leveraging AI tools like RFDiffusion and PLACER, researchers were able to design a novel enzyme capable of breaking down plastic by targeting ester bonds, a key component in polyester. Ars Technica reports: The researchers started out by using the standard tools they developed to handle protein design, including an AI tool named RFDiffusion, which uses a random seed to generate a variety of protein backgrounds. In this case, the researchers asked RFDiffusion to match the average positions of the amino acids in a family of ester-breaking enzymes. The results were fed to another neural network, which chose the amino acids such that they'd form a pocket that would hold an ester that breaks down into a fluorescent molecule so they could follow the enzyme's activity using its glow.

Of the 129 proteins designed by this software, only two of them resulted in any fluorescence. So the team decided they needed yet another AI. Called PLACER, the software was trained by taking all the known structures of proteins latched on to small molecules and randomizing some of their structure, forcing the AI to learn how to shift things back into a functional state (making it a generative AI). The hope was that PLACER would be trained to capture some of the structural details that allow enzymes to adopt more than one specific configuration over the course of the reaction they were catalyzing. And it worked. Repeating the same process with an added PLACER screening step boosted the number of enzymes with catalytic activity by over three-fold.

Unfortunately, all of these enzymes stalled after a single reaction. It turns out they were much better at cleaving the ester, but they left one part of it chemically bonded to the enzyme. In other words, the enzymes acted like part of the reaction, not a catalyst. So the researchers started using PLACER to screen for structures that could adopt a key intermediate state of the reaction. This produced a much higher rate of reactive enzymes (18 percent of them cleaved the ester bond), and two -- named "super" and "win" -- could actually cycle through multiple rounds of reactions. The team had finally made an enzyme.

By adding additional rounds alternating between structure suggestions using RFDiffusion and screening using PLACER, the team saw the frequency of functional enzymes increase and eventually designed one that had an activity similar to some produced by actual living things. They also showed they could use the same process to design an esterase capable of digesting the bonds in PET, a common plastic.
The research has been published in the journal Science.
Facebook

Meta To Build World's Longest Undersea Cable 33

Meta unveiled on Friday Project Waterworth, a 50,000-kilometer subsea cable network that will be the world's longest such system. The multi-billion dollar project will connect the U.S., Brazil, India, South Africa, and other key regions. The system utilizes 24 fiber pairs and introduces what Meta describes as "first-of-its-kind routing" that maximizes cable placement in deep water at depths up to 7,000 meters.

The company developed new burial techniques for high-risk areas near coasts to protect against ship anchors and other hazards. A joint statement from President Trump and Prime Minister Modi confirmed India's role in maintaining and financing portions of the undersea cables in the Indian Ocean using "trusted vendors." According to telecom analysts Telegeography, Meta currently has ownership stakes in 16 subsea networks, including the 2Africa cable system that encircles the African continent. This new project would be Meta's first wholly owned global cable system.
AI

Tech Leaders Hold Back on AI Agents Despite Vendor Push, Survey Shows 24

Most corporate tech leaders are hesitant to deploy AI agents despite vendors' push for rapid adoption, according to a Wall Street Journal CIO Network Summit poll on Tuesday. While 61% of attendees at the Menlo Park summit said they are experimenting with AI agents, which perform automated tasks, 21% reported no usage at all.

Reliability concerns and cybersecurity risks remain key barriers, with 29% citing data privacy as their primary concern. OpenAI, Microsoft and Sierra are urging businesses not to wait for the technology to be perfected. "Accept that it is imperfect," said Bret Taylor, Sierra CEO and OpenAI chairman. "Rather than say, 'Will AI do something wrong', say, 'When it does something wrong, what are the operational mitigations that we've put in place?'" Three-quarters of the polled executives said AI currently delivers minimal value for their investments. Some companies are "having hammers looking for nails," said Jim Siders, Palantir's chief information officer, describing firms that purchase AI solutions before identifying clear use cases.
Security

AUKUS Blasts Holes In LockBit's Bulletproof Hosting Provider (theregister.com) 11

The US, UK, and Australia (AUKUS) have sanctioned Russian bulletproof hosting provider Zservers, accusing it of supporting LockBit ransomware operations by providing secure infrastructure for cybercriminals. The sanctions target Zservers, its UK front company XHOST Internet Solutions, and six individuals linked to its operations. The Register reports: Headquartered in Barnaul, Russia, Zservers provided BPH services to a number of LockBit affiliates, the three nations said today. On numerous occasions, affiliates purchased servers from the company to support ransomware attacks. The trio said the link between Zservers and LockBit was established as early as 2022, when Canadian law enforcement searched a known LockBit affiliate and found evidence they had purchased infrastructure tooling almost certainly used to host chatrooms with ransomware victims.

"Ransomware actors and other cybercriminals rely on third-party network service providers like Zservers to enable their attacks on US and international critical infrastructure," said Bradley T Smith, acting under secretary of the Treasury for terrorism and financial intelligence. "Today's trilateral action with Australia and the United Kingdom underscores our collective resolve to disrupt all aspects of this criminal ecosystem, wherever located, to protect our national security." The UK's Foreign, Commonwealth & Development Office (FCDO) said additionally that the UK front company for Zservers, XHOST Internet Solutions, was also included in its sanctions list. According to Companies House, the UK arm was incorporated on January 31, 2022, although the original service was established in 2011 and operated in both Russia and the Netherlands. Anyone found to have business dealings with either entity can face criminal and civil charges under the Sanctions and Anti-Money Laundering Act 2018.

The UK led the way with sanctions, placing six individuals and the two entities on its list, while the US only placed two of the individuals -- both alleged Zservers admins -- on its equivalent. Alexander Igorevich Mishin and Aleksandr Sergeyevich Bolshakov, both 30 years old, were named by the US as the operation's heads. Mishin was said to have marketed Zservers to LockBit and other ransomware groups, managing the associated cryptocurrency transactions. Both he and Bolshakov responded to a complaint from a Lebanese company in 2023 and shut down an IP address used in a LockBit attack. The US said, however, it was possible that the pair set up a replacement IP address that LockBit could carry on using, while telling the Lebanese company that they complied with its request. The UK further sanctioned Ilya Vladimirovich Sidorov, Dmitry Konstantinovich Bolshakov (no mention of whether he is any relation to Aleksandr), Igor Vladimirovich Odintsov, and Vladimir Vladimirovich Ananev. Other than that they were Zservers employees and thus were directly or indirectly involved in attempting to inflict economic loss to the country, not much was said about either of their roles.

Social Networks

US-Funded 'Social Network' Attacking Pesticide Critics Shuts Down (theguardian.com) 64

The US company v-Fluence secretly compiled profiles on over 500 food and environmental health advocates, scientists, and politicians in a private web portal to discredit critics of pesticides and GM crops. Following public backlash and corporate cancellations after its actions were revealed by the Guardian, the company announced it was shutting down the profiling service. The Guardian reports: The profiles -- part of an effort that was financed, in part, by US taxpayer dollars -- often provided derogatory information about the industry opponents and included home addresses and phone numbers and details about family members, including children. They were provided to members of an invite-only web portal where v-Fluence also offered a range of other information to its roster of more than 1,000 members. The membership included staffers of US regulatory and policy agencies, executives from the world's largest agrochemical companies and their lobbyists, academics and others.

The profiling was one element of a push to downplay pesticide dangers, discredit opponents and undermine international policymaking, according to court records, emails and other documents obtained by the non-profit newsroom Lighthouse Reports. Lighthouse collaborated with the Guardian, the New Lede, Le Monde, Africa Uncensored, the Australian Broadcasting Corporation and other international media partners on the September 2024 publication of the investigation. News of the profiling and the private web portal sparked outrage and threats of litigation by some of the people and organizations profiled. [...]

v-Fluence says it not only has eliminated the profiling, but also has made "significant staff cuts" after the public exposure, according to Jay Byrne, the former Monsanto public relations executive who founded and heads the company. Byrne blamed the company's struggles on "rising costs from continued litigator and activist harassment of our staff, partners, and clients with threats and misrepresentations." He said the articles published about the company's profiling and private web portal were part of a "smear campaign" which was based on "false and misleading misrepresentations" that were "not supported by any facts or evidence." Adding to the company's troubles, several corporate backers and industry organizations have cancelled contracts with v-Fluence, according a post in a publication for agriculture professionals.

Cellphones

Free 'T-Mobile Starlink' for Six Months Announced During Super Bowl. Also Available to Verizon and AT&T Customers 211

Today T-Mobile announced what they're calling "the next big thing in wireless" — T-Mobile Starlink. But the real surprise is "The beta is now open for absolutely everyone — yes, even Verizon and AT&T customers — to register for free access until July."

And, as they explained to Americans watching the Super Bowl, "If you can see the sky you're connected." Now in public beta, this breakthrough service, developed in partnership with Starlink, uses straight-out-of-a-sci-fi-movie satellite and mobile communications technology to help keep people connected — even you, Verizon and AT&T customers — in the more than 500,000 square miles of the country unreached by any carrier's earth-bound cell towers. That's nearly the size of two Texases...! The beauty of the service is its simplicity: users don't need to do anything out of the ordinary. When a user's cell phone gets out of range of a cell tower, the phone automatically connects to the T-Mobile Starlink network. No need to manually connect. Messages are sent and received just as they are today on a traditional network, even group texts and reactions. And it works on most smartphones from the last four years. It's not limited to a few smartphones or operating systems...

The beta is free until July at which point T-Mobile Starlink will be included at no extra cost on Go5G Next (including variations like Go5G Next 55+), T-Mobile's best plan. Business customers will also get T-Mobile Starlink at no extra cost on Go5G Business Next, first responder agencies on T-Priority plans and other select premium rate plans. T-Mobile customers on any other plan can add the service for $15/month per line. Through February, T-Mobile customers who have registered for the beta can secure a $10/month per line Early Adopter Discount, 33% off the full price.

AT&T and Verizon customers hate dead zones, too

When your service is amazing and different, you want as many people to try it as possible. T-Mobile is giving AT&T and Verizon customers the opportunity to try out T-Mobile Starlink satellite service on their existing phones... During the beta period, Verizon and AT&T customers can experience T-Mobile Starlink text messaging for free, and once the service launches in July, it will be available for $20/month per line... More details and consumer registration can be found here.

A Vision for Universal Coverage

As T-Mobile and Starlink continue to work towards eliminating mobile deadzones, the companies welcome wireless providers from around the world to join their growing alliance, which aims to provide reciprocal roaming for all participating carriers. So far, KDDI (Japan), Telstra (Australia), Optus (Australia), One NZ (New Zealand), Salt (Switzerland), Entel (Chile & Peru), Rogers (Canada) and Kyivstar (Ukraine) are among the providers that have signed on to join the cause and launch satellite-to-mobile technology. Learn more about the alliance and how providers can join at direct.starlink.com.
Apple

Retrocomputing Enthusiast Explores 28-Year-Old Powerbook G3: 'Apple's Hope For Redemption' (youtube.com) 60

Long-time Slashdot reader Shayde once restored a 1986 DEC PDP-11 minicomputer, and even ran Turbo Pascal on a 40-year-old Apple II clone.

Now he's exploring a 27-year-old Macintosh PowerBook G3 — with 64 megabytes memory and 4 gigabytes of disk space. "The year is 1997, and Apple is in big trouble." (Apple's market share had dropped from 16% in 1980 to somewhere below 4%...) Turns out this was one of the first machines able to run OS X, and was built during the transition period for Apple after Steve Jobs came back in to rescue the company from bankruptcy.
It's clearly old technology. There's even a SCSI connector, PCMCIA sockets, a modem port for your phone/landline cable, and a CD-ROM drive. There's also Apple's proprietary ports for LocalTalk and an Apple Desktop Bus port ("used for keyboards, mice, and stuff like that"). And its lithium-ion batteries "were meant to be replaced and moved around, so you could carry spare batteries with you."

So what's it like using a 27-year-old laptop? "The first thing I had to note was this thing weighs a ton! This thing could be used as a projectile weapon! I can't imagine hauling these things around doing business..." And it's a good thing it had vents, because "This thing runs hot!" (The moment he plugs it in he can hear its ancient fan running...) It seems to take more than two minutes to boot up. ("The drive is rattling away...") But soon he's looking at a glorious desktop from 1998 desktop. ("Applications installed... Oh look! Adobe Acrobat Reader! I betcha that's going to need an update...")

After plugging in a network cable, a pop-up prompts him to "Set up your .Mac membership." ("I have so little interest in doing this.") He does find an old version of Safari, but it refuses to launch-- though "While puttering around in the application folder, I did notice that we had Internet Explorer installed. But that pretty much went as well as expected." In the end it seems like he ends up "on the network, but we have no browser." Although at least he does find a Terminal program — and successfully pings Google.

The thing that would drive me crazy is when opening the laptop, Apple's logo is upside-down!
GNU is Not Unix

The FSF Will Auction the Original GNU Logo Drawing, Stallman's Medal, and an Amiga (fsf.org) 25

The Free Software Foundation "hinted that it would organize an unprecedented virtual memorabilia auction" in March to celebrate this year's 40th anniversary, according to an announcement this week. Those hints "left collectors and free software fans wondering which of the pieces of the FSF's history would be auctioned off."

But Tuesday the FSF "lifted the veil and gave a sneak peak of some of the more prestigious entries in the memorabilia auction." First of all, the memorabilia auction will feature an item that could be especially interesting for art collectors but will certainly also draw the attention of free software fans from all over: the original GNU head drawing by Etienne Suvasa, which became the blueprint for the iconic GNU logo present everywhere in the free software world.

The list of memorabilia for sale also entails some rare and historic hardware, such as a "terminus-est" microcomputer, and an Amiga 3000UX that was used in the FSF's old office at the Massachusetts Institute of Technology (MIT) in the early days of GNU, when these machines were capable of running a GNU-like operating system. Another meaningful item to be auctioned off, and one that collectors will want to keep a keen eye on, is the Internet Hall of Fame medal awarded to founder Richard Stallman. When Stallman was inducted into the Internet Hall of Fame, it was the ultimate recognition of free software's immense impact on the development and advancement of the Internet. This medal is definitely worthy of joining a fine historical collection...! [T]here are several more historic awards, more original GNU artwork, and a legendary katana [as seen in an XKCD comic] that became a lighthearted weapon in the fight for computer user freedom.

The auction is only the opening act to a whole agenda of activities celebrating forty years of free software activism. In May, the FSF invites free software supporters all over the world to gather for local in-person community meetups to network, discuss what people can do next to make the world freer, and celebrate forty years of commitment to software freedom. Then, on the actual birthday of the FSF on October 4, 2025, the organization intends to bring the international free software community to Boston for a celebration featuring keynotes and workshops by prominent personalities of the free software movement.

"The bidding will start as a virtual silent auction on March 17 and run through March 21, with more auction items revealed each day, and will culminate in an virtual live auction on March 23, 2025, 14:00 to 17:00 EDT," according to the announcement.

"Register here to attend the live auction. There's no need to register for the silent auction; you can simply join the bidding on the FSF's LibrePlanet wiki."
AI

DeepSeek IOS App Sends Data Unencrypted To ByteDance-Controlled Servers (arstechnica.com) 68

An anonymous Slashdot reader quotes a new article from Ars Technica: On Thursday, mobile security company NowSecure reported that [DeepSeek] sends sensitive data over unencrypted channels, making the data readable to anyone who can monitor the traffic. More sophisticated attackers could also tamper with the data while it's in transit. Apple strongly encourages iPhone and iPad developers to enforce encryption of data sent over the wire using ATS (App Transport Security). For unknown reasons, that protection is globally disabled in the app, NowSecure said. What's more, the data is sent to servers that are controlled by ByteDance, the Chinese company that owns TikTok...

[DeepSeek] is "not equipped or willing to provide basic security protections of your data and identity," NowSecure co-founder Andrew Hoog told Ars. "There are fundamental security practices that are not being observed, either intentionally or unintentionally. In the end, it puts your and your company's data and identity at risk...." This data, along with a mix of other encrypted information, is sent to DeepSeek over infrastructure provided by Volcengine a cloud platform developed by ByteDance. While the IP address the app connects to geo-locates to the US and is owned by US-based telecom Level 3 Communications, the DeepSeek privacy policy makes clear that the company "store[s] the data we collect in secure servers located in the People's Republic of China...."

US lawmakers began pushing to immediately ban DeepSeek from all government devices, citing national security concerns that the Chinese Communist Party may have built a backdoor into the service to access Americans' sensitive private data. If passed, DeepSeek could be banned within 60 days.

PlayStation (Games)

PlayStation Network Suffering Major Outage 17

According to Downdetector, PlayStation Network (PSN) has been down since 6 PM ET, with Sony assuring users that they're working to fix the problem "as soon as possible." For gaming specifically, Sony says that "you might have difficulty launching games, apps, or network features."

"We are aware some users might be currently experiencing issues with PSN," Sony said in an 8:46PM ET post on X. No further details were made available.

An r/PlayStation thread has more than 10,000 comments. As of 11:35 PM PST, the service remains down.
Supercomputing

Quantum Teleportation Used To Distribute a Calculation (arstechnica.com) 58

An anonymous reader quotes a report from Ars Technica: In today's issue of Nature, a team at Oxford University describes using quantum teleportation to link two pieces of quantum hardware that were located about 2 meters apart, meaning they could easily have been in different rooms entirely. Once linked, the two pieces of hardware could be treated as a single quantum computer, allowing simple algorithms to be performed that involved operations on both sides of the 2-meter gap. [...] The Oxford team was simply interested in a proof-of-concept, and so used an extremely simplified system. Each end of the 2-meter gap had a single trap holding two ions, one strontium and one calcium. The two atoms could be entangled with each other, getting them to operate as a single unit.

The calcium ion served as a local memory and was used in computations, while the strontium ion served as one of the two ends of the quantum network. An optical cable between the two ion traps allowed photons to entangle the two strontium ions, getting the whole system to operate as a single unit. The key thing about the entanglement processes used here is that a failure to entangle left the system in its original state, meaning that the researchers could simply keep trying until the qubits were entangled. The entanglement event would also lead to a photon that could be measured, allowing the team to know when success had been achieved (this sort of entanglement with a success signal is termed "heralded" by those in the field).

The researchers showed that this setup allowed them to teleport with a specific gate operation (controlled-Z), which can serve as the basis for any other two-qubit gate operation -- any operation you might want to do can be done by using a specific combination of these gates. After performing multiple rounds of these gates, the team found that the typical fidelity was in the area of 70 percent. But they also found that errors typically had nothing to do with the teleportation process and were the product of local operations at one of the two ends of the network. They suspect that using commercial hardware, which has far lower error rates, would improve things dramatically. Finally, they performed a version of Grover's algorithm, which can, with a single query, identify a single item from an arbitrarily large unordered list. The "arbitrary" aspect is set by the number of available qubits; in this case, having only two qubits, the list maxed out at four items. Still, it worked, again with a fidelity of about 70 percent.

While the work was done with trapped ions, almost every type of qubit in development can be controlled with photons, so the general approach is hardware-agnostic. And, given the sophistication of our optical hardware, it should be possible to link multiple chips at various distances, all using hardware that doesn't require the best vacuum or the lowest temperatures we can generate. That said, the error rate of the teleportation steps may still be a problem, even if it was lower than the basic hardware rate in these experiments. The fidelity there was 97 percent, which is lower than the hardware error rates of most qubits and high enough that we couldn't execute too many of these before the probability of errors gets unacceptably high.

Medicine

US Health System Notifies 882,000 Patients of August 2023 Breach 8

An anonymous reader quotes a report from BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information. Established in 1875, HSHS works with over 2,200 physicians and has around 12,000 employees. It also operates a network of physician practices and 15 local hospitals across Illinois and Wisconsin, including two children's hospitals. The non-profit healthcare system said in data breach notifications sent to those impacted that the incident was discovered on August 27, 2023, after detecting that the attacker had gained access to HSHS' network.

After the security breach, its systems were also impacted by a widespread outage that took down "virtually all operating systems" and phone systems across Illinois and Wisconsin hospitals. HSHS also hired external security experts to investigate the attack, assess its impact, and help its IT team restore affected systems. [...] While the incident and the resulting outage have all the signs of a ransomware attack, no ransomware operation has claimed the breach. Following the forensic investigation, HSHS found that the attackers had accessed files on compromised systems between August 16 and August 27, 2023.

The information accessed by the threat actors while inside HSHS' systems varies for each impacted individual, and it includes a combination of name, address, date of birth, medical record number, limited treatment information, health insurance information, Social Security number, and/or driver's license number. While HSHS added that there is no evidence that the victims' information has been used in fraud or identity theft attempts, it warned affected individuals to monitor their account statements and credit reports for suspicious activity. The health system also offers those affected by the breach one year of free Equifax credit monitoring.
Security

Phishing Tests, the Bane of Work Life, Are Getting Meaner (msn.com) 99

U.S. employers are deploying increasingly aggressive phishing tests to combat cyber threats, sparking backlash from workers who say the simulated scams create unnecessary panic and distrust in the workplace. At the University of California, Santa Cruz, a test email about a fake Ebola outbreak sent staff scrambling before learning it was a security drill. At Lehigh Valley Health Network, employees who fall for phishing tests lose external email access, with termination possible after three failures.

Despite widespread use, recent studies question these tests' effectiveness. Research from ETH Zurich found that phishing tests combined with voluntary training actually made employees more vulnerable, while a University of California, San Diego study showed only a 2% reduction [PDF] in phishing success rates. "These are just an ineffective and inefficient way to educate users," said Grant Ho, who co-authored the UCSD study.
It's funny.  Laugh.

French Train Passenger Fined $155 For Using Phone on Speaker (thelocal.fr) 123

A passenger on the French rail network SNCF has revealed that he received a $155 fine for using his phone on loud speaker within a train station. From a report: The passenger, named only as David, told French TV channel BFM that he was on the phone to his sister while waiting at Nantes station when the SNCF staff member told him to switch his phone's loud speaker off, or risk being fined. When he argued, he was served with the $155 fine, which has been increased to $207 because he did not pay it immediately. Further reading: Flying Was Already the Worst. Then America Stopped Using Headphones.
Network

$42 Billion Broadband Grant Program May Scrap Biden Admin's Preference For Fiber (arstechnica.com) 106

An anonymous reader quotes a report from Ars Technica: US Senator Ted Cruz (R-Texas) has been demanding an overhaul of a $42.45 billion broadband deployment program, and now his telecom policy director has been chosen to lead the federal agency in charge of the grant money. "Congratulations to my Telecom Policy Director, Arielle Roth, for being nominated to lead NTIA," Cruz wrote last night, referring to President Trump's pick to lead the National Telecommunications and Information Administration. Roth's nomination is pending Senate approval. Roth works for the Senate Commerce Committee, which is chaired by Cruz. "Arielle led my legislative and oversight efforts on communications and broadband policy with integrity, creativity, and dedication," Cruz wrote.

Shortly after Trump's election win, Cruz called for an overhaul of the Broadband Equity, Access, and Deployment (BEAD) program, which was created by Congress in November 2021 and is being implemented by the NTIA. Biden-era leaders of the NTIA developed rules for the program and approved initial funding plans submitted by every state and territory, but a major change in approach could delay the distribution of funds. Cruz previously accused the NTIA of "technology bias" because the agency prioritized fiber over other types of technology. He said Congress would review BEAD for "imposition of statutorily-prohibited rate regulation; unionized workforce and DEI labor requirements; climate change assessments; excessive per-location costs; and other central planning mandates."

Roth criticized the BEAD implementation at a Federalist Society event in June 2024. "Instead of prioritizing connecting all Americans who are currently unserved to broadband, the NTIA has been preoccupied with attaching all kinds of extralegal requirements on BEAD and, to be honest, a woke social agenda, loading up all kinds of burdens that deter participation in the program and drive up costs," she said. Municipal broadband networks and fiber networks in general could get less funding under the new plans. Roth is "expected to change the funding conditions that currently include priority access for government-owned networks" and "could revisit decisions like the current preference for fiber," Bloomberg reported, citing people familiar with the matter.
Congress defined priority broadband projects under BEAD as those that "ensure that the network built by the project can easily scale speeds over time to meet the evolving connectivity needs of households and businesses; and support the deployment of 5G, successor wireless technologies, and other advanced services."

The Biden NTIA determined that only end-to-end fiber-optic architecture meet these criteria. "End-to-end fiber networks can be updated by replacing equipment attached to the ends of the fiber-optic facilities, allowing for quick and relatively inexpensive network scaling as compared to other technologies. Moreover, new fiber deployments will facilitate the deployment and growth of 5G and other advanced wireless services, which rely extensively on fiber for essential backhaul," the Biden NTIA said (PDF).
IT

Cloudflare Rolls Out Digital Tracker To Combat Fake Images (cloudflare.com) 14

Cloudflare, a major web infrastructure company, will now track and verify the authenticity of images across its network through Content Credentials, a digital signature system that documents an image's origin and editing history. The technology, developed by Adobe's Content Authenticity Initiative, embeds metadata showing who created an image, when it was taken, and any subsequent modifications - including those made by AI tools.

Major news organizations including the BBC, Wall Street Journal and New York Times have already adopted the system. The feature is available immediately through a single toggle in Cloudflare Images settings. Users can verify an image's authenticity through Adobe's web tool or Chrome extension.

Slashdot Top Deals