Tag Archive for: EDGE

Microsoft Edge needs to copy this new Google Chrome security feature


I’m a longtime MacBook user who has found the perfect browser for macOS: Microsoft Edge. I could tell you all about my journey from Chrome to Safari to Edge, but then my colleague José Adorno did a great job explaining why Microsoft Edge is such a good browser for Mac.

I’ll tell you that I didn’t get back to Chrome from Safari because Microsoft built Edge on top of Chromium. And that meant I could just install all the extensions I use on Chrome on Edge and forget about Google’s browser. Still, Google Chrome is the main Chromium browser out there, and Google keeps improving it.

Since I left it, Google made it more energy efficient on Mac, which was my main issue with it. This week, Google rolled out a feature I hope I’ll never have to use. But one that Microsoft Edge and any other Chrome-based browser should copy right away. Google Chrome will finally tell you whether any of your extensions are malware and help you ditch them.

We and others routinely inform you about malicious Chrome extensions, and you should take action the minute you hear about them. Some may steal your data or go after your crypto wallets. Other malware apps may try to take over your browser. The point is you don’t want any malware from the PC app you use the most.

But you might miss warnings from the media that something might be afoot with one of your Chrome extensions. And you might keep using it for as long as it’s available.

Google Chrome will notify you about extensions that might contain malware.
Google Chrome will notify you about extensions that might contain malware. Image source: Google

Thankfully, Google announced that it’s taking a more proactive step to warn users about potential malware inside Chrome extensions. It all starts with Google Chrome 117. You’ll see warnings inside the browser to take action in three types of extensions-related scenarios:

The extension has been unpublished by the developer.
The extension has been taken down for violating Chrome Web Store policy.
The item was marked as malware.

The last one is key here. You…

Source…

DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities


Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI.

AI generated image of a hacker in front of a laptop.
Image: AVC Photo Studio/Adobe Stock

OpenAI, Google, Meta and more companies put their large language models to the test on the weekend of August 12 at the DEF CON hacker conference in Las Vegas. The result is a new corpus of information shared with the White House Office of Science and Technology Policy and the Congressional AI Caucus. The Generative Red Team Challenge organized by AI Village, SeedAI and Humane Intelligence gives a clearer picture than ever before of how generative AI can be misused and what methods might need to be put in place to secure it.

Jump to:

Generative Red Team Challenge could influence AI security policy

The Generative Red Team Challenge asked hackers to force generative AI to do exactly what it isn’t supposed to do: provide personal or dangerous information. Challenges included finding credit card information and learning how to stalk someone. The AI Village team is still working on analyzing the data that came from the event and expects to present it next month.

This challenge is the largest event of its kind and one that will allow many students to get in on the ground floor of cutting-edge hacking. It could also have a direct impact on the White House’s Office of Science and Technology Policy, with office director Arati Prabhakar working on bringing an executive order to the table based on the event’s results.

Organizers expected more than 3,000 people would participate, with each taking a 50-minute slot to try to hack a large language model chosen at random from a pre-established selection. The large language models being put to the test were built by Anthropic, Cohere, Google, Hugging Face, Meta, NVIDIA, OpenAI and Stability. Scale AI developed a scoring system.

“The diverse issues with these models will not be resolved until more people know how to red team and assess them,” said Sven Cattell, the founder of AI Village, in a press release. “Bug bounties, live hacking events and other standard community engagements in security can be modified for machine learning model-based systems.”

SEE: At Black…

Source…

Edge computing security issues attract attention amid AI application development boom


ChatGPT has taken the world by storm, bringing unprecedented AI experiences to numerous consumers. This highlights the continuous development of AI technology and its rapid proliferation in people’s daily lives. Meanwhile, with the vigorous development of technologies such as 5G, IoT, and cloud native computing, the concept of edge computing has also emerged to provide the best online experience for Internet users.

Traditional AI applications involve using the Internet to upload raw data to large cloud servers for analysis. However, with the increasing number of IoT devices, this often leads to issues such as raw data leakage, insufficient network bandwidth, and communication delays. Therefore, when cloud AI is deployed in smart manufacturing, smart transportation, and other scenarios, there may be a significant degradation in service quality as devices may not work together properly, potentially causing traffic accidents, industrial safety hazards, and other problems. For this reason, using edge computing servers to analyze data locally to mitigate such problems is a popular option in the market today. However, with the rapid proliferation of AI services, the issue of potential information security risks has also come to the fore. Hacker groups have begun launching attacks on AI applications such as ChatGPT to steal large amounts of sensitive data. Edge computing security has therefore become a major challenge that needs to be addressed in the development of AI services.

Dr. John K. Zao, the founder and chairman of FiduciaEdge Technologies, pointed out that existing information security solutions can be roughly divided into three categories. The first category includes the use of virtual private networks (VPNs), firewalls, and other mechanisms to protect data in transit. The second category deals with security mechanisms for websites and databases to ensure the security of data in storage. The third category aims to implement appropriate information isolation in the trusted edge computing environments to protect those data in use. Trusted edge computing is becoming increasingly important as more manufacturers are now running AI applications on their sites to…

Source…

Q&A on How Dell Sees Security at the Edge


Edge computing modern IT technology on virtual screen.
Image: Adobe Stock

In May 2023, Dell announced NativeEdge, an edge operations software platform. Dell has been talking to customers for years in advance of the release about the needs of technology operating at the edge.

To get into the details, I spoke with Aaron Chaisson, Dell Technologies’ vice president of telecom and edge solutions marketing, at Dell Technologies World in Las Vegas. The following is a transcript of my interview with Chaisson; the interview has been edited for length and clarity.

Jump to:

Challenges of cloud spending and deployment

Megan Crouse: What decisions are you seeing customers or potential customers struggle with right now in terms of enterprise cloud purchasing that weren’t being talked about a year or three years ago?

Aaron Chaisson: One of the biggest things that companies are looking to do is there is an interest in being able to consume (cloud) in an as-a-service fashion. They want to take the experiences they are getting from hyperscalers and potentially be able to bring those experiences on-prem, especially toward the edge. Customers want to leverage edge technologies to drive new business outcomes, to be able to act upon data more rapidly. How do they take the capabilities, the features and the experiences that they get from a cloud and deliver those in edge environments?

One of the questions that we commonly see is: Are you taking established cloud technologies and moving them to the edge? Or are you really looking to use the best practices of cloud, of automation and orchestration-as-a-service, but to deliver it in a more purpose-built fashion that delivers unique value to the edge? And that’s really where NativeEdge is designed to be able to deliver an edge experience, but in a customized way that targets outcomes that customers are looking to at the edge.

SEE: Don’t curb your enthusiasm: Trends and challenges in edge computing (TechRepublic)

Customers choose between edge and on-prem

Megan Crouse: Do you see customers deciding workflow-by-workflow, where they’re going to pull from the edge, and if so, how is Dell working on simplifying that process through something like NativeEdge?

Aaron Chaisson: It’s early days for the…

Source…