Connect with us

Technology

Former NSA hacker and former Apple researcher launches startup to protect Apple devices

Published

on

Two experienced security experts are starting a startup that goals to help other cybersecurity product developers improve their efforts to protect Apple devices.

Their startup is known as Double You, the name comes from the initials of its co-founder, Patrick Wardle, who worked on the US National Security Agency in 2006-2008. Wardle then worked for years as an offensive security researcher before independently researching the defensive security of Apple’s macOS. Since 2015, Wardle has been developing free and open source macOS security tools under its wing. Purpose – see Foundationwhich can be hosting an Apple-centric event Objective By The Sea conference.

Its co-founder is Mikhail Sosonkin, who before working at Apple from 2019 to 2021 was also an offensive cybersecurity researcher for years. Wardle, who described himself as a “mad scientist in the lab,” said Sosonkin was “the right partner” for whom he needed to turn his ideas into reality.

Advertisement

“Mike may not be making waves, but he’s an amazing software engineer,” Wardle said.

The idea behind DoubleYou is that compared to Windows, there are still only a couple of good security products for macOS and iPhones. This is an issue because Macs have gotten an increasingly popular selection for businesses world wide, which implies malicious hackers are increasingly targeting Apple computers too. Wardle and Sosonkin said there aren’t many talented macOS and iOS security researchers, which implies corporations are struggling to develop their products.

Wardle and Sosonkin’s idea is to take a page out of the playbook of hackers who focus on attacking systems and apply it to defense. Several offensive cybersecurity corporations offer modular products, able to delivering an entire exploit chain or only one element of it. The DoubleYou team wants to just do that – but with defensive tools.

“Instead of building an entire product from scratch, for example, we really took a step back and said, ‘hey, how do adversaries do this?’” Wardle said in an interview with TechCrunch. “Can we basically take the same model of basically democratizing security, but from a defensive standpoint where we develop individual capabilities that we can then license and have other companies integrate into their security products?”

Advertisement

Wardle and Sosonkin consider they’ll.

And while the co-founders have not yet selected the total list of modules they need to offer, they said their product will certainly include a core offering that features analyzing a complete recent process to detect and block untrusted code (which in macOS means they don’t seem to be “notarized” by Apple) and monitoring and blocking unusual DNS network traffic, which may detect malware when connecting to domains related to hacking groups. Wardle said that, a minimum of for now, they might be primarily for macOS.

The founders also want to develop tools to monitor software that wishes to develop into persistent – an indicator of malware – to detect cryptocurrency miners and ransomware based on their behavior and to detect when the software tries to gain permission to use a webcam and microphone.

Sosonkin described it as an “off-the-shelf, catalog-based approach” during which each customer can select the components they need to use of their product. Wardle described it as a supplier of automotive parts reasonably than a manufacturer of your entire automotive. This approach, Wardle added, is comparable to the one he took when developing various Objective-See tools comparable to Oversight, which monitors microphone and webcam usage; AND Knock Knockwhich monitors whether the appliance wants to persist.

Advertisement

“We don’t have to use new technology to make it work. We need to actually take the tools that are available and put them in the right place,” Sosonkin said.

Wardle and Sosonkin’s plan doesn’t involve making any outside investments for now. The co-founders said they wanted to remain independent and avoid a few of the pitfalls of attracting outside investment, namely having to scale an excessive amount of and too quickly, allowing them to give attention to technology development.

“Maybe in some ways we are like stupid idealists,” Sosonkin said. “We just want to catch some malware. Hopefully we can make some money along the way.”

Advertisement

This article was originally published on : techcrunch.com

Technology

The next large Openai plant will not be worn: Report

Published

on

By

Sam Altman speaks onstage during The New York Times Dealbook Summit 2024.

Opeli pushed generative artificial intelligence into public consciousness. Now it might probably develop a very different variety of AI device.

According to WSJ reportThe general director of Opeli, Altman himself, told employees on Wednesday that one other large product of the corporate would not be worn. Instead, it will be compact, without the screen of the device, fully aware of the user’s environment. Small enough to sit down on the desk or slot in your pocket, Altman described it each as a “third device” next to MacBook Pro and iPhone, in addition to “Comrade AI” integrated with on a regular basis life.

The preview took place after the OpenAI announced that he was purchased by IO, a startup founded last 12 months by the previous Apple Joni Ive designer, in a capital agreement value $ 6.5 billion. I will take a key creative and design role at Openai.

Advertisement

Altman reportedly told employees that the acquisition can ultimately add 1 trillion USD to the corporate conveyorsWearing devices or glasses that got other outfits.

Altman reportedly also emphasized to the staff that the key would be crucial to stop the copying of competitors before starting. As it seems, the recording of his comments leaked to the journal, asking questions on how much he can trust his team and the way rather more he will be able to reveal.

(Tagstotransate) devices

This article was originally published on : techcrunch.com
Advertisement
Continue Reading

Technology

The latest model AI Google Gemma can work on phones

Published

on

By

It grows “open” AI Google, Gemma, grows.

While Google I/O 2025 On Tuesday, Google removed Gemma 3N compresses, a model designed for “liquid” on phones, laptops and tablets. According to Google, available in a preview starting on Tuesday, Gemma 3N can support sound, text, paintings and flicks.

Models efficient enough to operate in offline mode and without the necessity to calculate within the cloud have gained popularity within the AI ​​community lately. They will not be only cheaper to make use of than large models, but they keep privacy, eliminating the necessity to send data to a distant data center.

Advertisement

During the speech to I/O product manager, Gemma Gus Martins said that GEMMA 3N can work on devices with lower than 2 GB of RAM. “Gemma 3N shares the same architecture as Gemini Nano, and is also designed for incredible performance,” he added.

In addition to Gemma 3N, Google releases Medgemma through the AI ​​developer foundation program. According to Medgemma, it’s essentially the most talented model to research text and health -related images.

“Medgemma (IS) OUR (…) A collection of open models to understand the text and multimodal image (health),” said Martins. “Medgemma works great in various imaging and text applications, thanks to which developers (…) could adapt the models to their own health applications.”

Also on the horizon there may be SignGEMMA, an open model for signaling sign language right into a spoken language. Google claims that Signgemma will allow programmers to create recent applications and integration for users of deaf and hard.

Advertisement

“SIGNGEMMA is a new family of models trained to translate sign language into a spoken text, but preferably in the American sign and English,” said Martins. “This is the most talented model of understanding sign language in history and we are looking forward to you-programmers, deaf and hard communities-to take this base and build with it.”

It is value noting that Gemma has been criticized for non -standard, non -standard license conditions, which in accordance with some developers adopted models with a dangerous proposal. However, this didn’t discourage programmers from downloading Gemma models tens of tens of millions of times.

.

(Tagstransate) gemma

Advertisement
This article was originally published on : techcrunch.com
Continue Reading

Technology

Trump to sign a criminalizing account of porn revenge and clear deep cabinets

Published

on

By

President Donald Trump is predicted to sign the act on Take It Down, a bilateral law that introduces more severe punishments for distributing clear images, including deep wardrobes and pornography of revenge.

The Act criminalizes the publication of such photos, regardless of whether or not they are authentic or generated AI. Whoever publishes photos or videos can face penalty, including a advantageous, deprivation of liberty and restitution.

According to the brand new law, media firms and web platforms must remove such materials inside 48 hours of termination of the victim. Platforms must also take steps to remove the duplicate content.

Advertisement

Many states have already banned clear sexual desems and pornography of revenge, but for the primary time federal regulatory authorities will enter to impose restrictions on web firms.

The first lady Melania Trump lobbyed for the law, which was sponsored by the senators Ted Cruz (R-TEXAS) and Amy Klobuchar (d-minn.). Cruz said he inspired him to act after hearing that Snapchat for nearly a 12 months refused to remove a deep displacement of a 14-year-old girl.

Proponents of freedom of speech and a group of digital rights aroused concerns, saying that the law is Too wide And it will probably lead to censorship of legal photos, similar to legal pornography, in addition to government critics.

(Tagstransate) AI

Advertisement
This article was originally published on : techcrunch.com
Continue Reading
Advertisement

OUR NEWSLETTER

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending