Skip to main content

Blackberry seems to be following the ongoing vogue of the bezel-less smartphones and it could also drop the manual keyboard once and for all. Mobile industry watcher Evan Blass has leaked an image of a smartphone, supposedly “Blackberry Ghost” in a Tweet, which might be launching in India anytime soon. The leaked picture claims the device to be a bezel-less premium handset, a high-end full-screen Andriod phone designed by an Indian company “Optiemus Infracom”. Optiemus Infracom is the company who signed the contract for the license of Blackberry, last year and this “Ghost” phone would be its first ever Blackberry designed phone. The company is s a renowned Telecom firm based in Delhi. The company has also acquired the rights to Blackberry for Srilanka, Bangladesh, and Nepal. Meanwhile, other recent models of Blackberry are being made by different companies including some mega manufacturers like TCL and BB Merah Putih, soon after the company stopped designing and producing the phones, back in 2016. According to the rumors, upcoming blackberry will not provide mechanical keyboard on its phone and you will get a more sleek, slim and bezel-less phone like what people see in iPhone X and Samsung Galaxy S8. Though the phone will be produced for premium Indian Market, however, it is still unclear whether the Blackberry Ghost will be for other markets too or it will be just available in India.

PHOTO: FILE PHOTO

PARIS: Artificial intelligence could be deployed by dictators, criminals, and terrorists to manipulate elections and use drones in terrorist attacks, more than two dozen experts said Wednesday as they sounded the alarm over misuse of the technology.






In a 100-page analysis, they outlined a rapid growth in cybercrime and the use of “bots” to interfere with news gathering and penetrate social media among a host of plausible scenarios in the next five to 10 years.
“Our report focuses on ways in which people could do deliberate harm with AI,” said Sean O hEigeartaigh, Executive Director of the Cambridge Centre for the Study of Existential Risk.
“AI may pose new threats, or change the nature of existing threats, across cyber-, physical, and political security,” he told AFP.


The common practice, for example, of “phishing” – sending emails seeded with malware or designed to finagle valuable personal data – could become far more dangerous, the report detailed.
Currently, attempts at phishing are either generic but transparent – such as scammers asking for bank details to deposit an unexpected windfall – or personalized but labor intensive – gleaning personal data to gain someone’s confidence, known as “spear phishing”.
“Using AI, it might become possible to do spear phishing at scale by automating a lot of the process” and making it harder to spot, O hEigeartaigh noted.
In the political sphere, unscrupulous or autocratic leaders can already use advanced technology to sift through mountains of data collected from omnipresent surveillance networks to spy on their own people.
“Dictators could more quickly identify people who might be planning to subvert a regime, locate them, and put them in prison before they act,” the report said.
Likewise, targeted propaganda along with cheap, highly believable fake videos have become powerful tools for manipulating public opinion “on previously unimaginable scales”.
An indictment handed down by US special prosecutor Robert Mueller last week detailed a vast operation to sow social division in the United States and influence the 2016 presidential election in which so-called “troll farms” manipulated thousands of social network bots, especially on Facebook and Twitter.
Another danger zone on the horizon is the proliferation of drones and robots that could be repurposed to crash autonomous vehicles, deliver missiles, or threaten critical infrastructure to gain ransom.
“Personally, I am particularly worried about autonomous drones being used for terror and automated cyber attacks by both criminals and state groups,” said co-author Miles Brundage, a researcher at Oxford University’s Future of Humanity Institute.
The report details a plausible scenario in which an office-cleaning SweepBot fitted with a bomb infiltrates the German finance ministry by blending in with other machines of the same make.
The intruding robot behaves normally – sweeping, cleaning, clearing litter – until its hidden facial recognition software spots the minister and closes in.
“A hidden explosive device was triggered by proximity, killing the minister and wounding nearby staff,” according to the sci-fi storyline.
“This report has imagined what the world could look like in the next five to 10 years,” O hEigeartaigh said.
“We live in a world fraught with day-to-day hazards from the misuse of AI, and we need to take ownership of the problems.”
The authors called on policy makers and companies to make robot-operating software unhackable, to impose security restrictions on some research, and to consider expanding laws and regulations governing AI development.
Giant high-tech companies – leaders in AI – “have lots of incentives to make sure that AI is safe and beneficial,” the report said.
Another area of concern is the expanded use of automated lethal weapons.
Last year, more than 100 robotics and AI entrepreneurs – including Tesla and SpaceX CEO Elon Musk, and British astrophysicist Stephen Hawking – petitioned the United Nations to ban autonomous killer robots, warning that the digital-age weapons could be used by terrorists against civilians.
“Lethal autonomous weapons threaten to become the third revolution in warfare,” after the invention of machine guns and the atomic bomb, they warned in a joint statement, also signed by Google DeepMind co-founder Mustafa Suleyman.
“We do not have long to act. Once this Pandora’s box is opened, it will be hard to close.”
Contributors to the new report – entitled “The Malicious Use of AI: Forecasting, Prevention, and Mitigation” – also include experts from the Electronic Frontier Foundation, the Center for a New American Security, and OpenAI, a leading non-profit research company.
“Whether AI is, all things considered, helpful or harmful in the long run is largely a product of what humans choose to do, not the technology itself,” said Brundage.

Comments

Popular posts from this blog

HP launches a new range of EliteBooks with built-in webcam cover

HP’s new EliteBook range this year provides a shutter for webcam and external mic for better voice distribution with other tools for their users. HP has recently launched a new range of EliteBook 800 series laptops and monitors but main pointers of these products in a public view are: which is used to  cover Webcam , so you are ensured that one is not being watched. Secondly,  Mics  on both sides for clearer sound are also added. The three new refreshed models of HP’s EliteBook are providing a shutter for webcam in their default configuration. The models are dubbed as the fifth-generation EliteBooks 830, 840, and 850, as reported by  The Verge . But if you want to upgrade your system into touchscreen than according to HP’s management the bezels don’t have enough space to include cover for Webcam too. HP isn’t the only one with this feature, two years back Lenovo provided Webcam cover in its ThinkPad laptops but respectively this feature is still new in sense of security.

POS

POINT OF SALE Point of sale  (also called  POS  or  checkout , during computerization later becoming  electronic point of sale  or  EPOS ) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services. At the point of sale the retailer would calculate the amount owed by the customer and provide options for the customer to make payment. The merchant will also normally issue a receipt for the transaction. The POS in various retail industries uses customized hardware and software as per their requirements. Retailers may utilize weighing scales, scanners, electronic and manual cash registers, EFTPOS terminals, touch screens and any other wide variety of hardware and software available for use with POS. For example, a grocery or candy store uses a scale at the point of sale, while bars and restaurants use software to customize the item or service sold when a customer has a special meal or dr

Make Your Donations and Deliver Change with Yayvo This Ramadan

Yayvo came up with a creative idea this year with their well-received isMay box. The box came with goodies, many of them in pairs. The idea was to share the goodness with others, specially the deserving. In addition to that, the box could be refilled with items such as clothing, stationery, toys, books etc; and return to any TCS Express Center for the items in the box to be given to Saylani Trust. This message of Delivering Change came just in time for Ramadan, fostering a spirit of giving to those in need. Ramadan is all about sharing blessings and caring for fellow human beings. The spirit of giving continues with Delivering Change in Ramadan through  Yayvo.com . You can donate to various charities under four causes (Health, Education, Vocational Training and Act of Kindness). 5 Best Free Antivirus Software to Keep Yourself Protected Through Yayvo Delivering Change, even those who didn’t receive an isMay box can donate and play their part at making ours a better soci