ChatGPT’s Deep Research just identified 20 jobs it will replace. Is yours on the list?

source: zdnet.com (contributed by Artemus founder, Bob Wallace)  |  image: pexels.com

 

After researching 24 sources in seven minutes, ChatGPT came up with the top jobs that might be on the chopping block.

This week, OpenAI launched its Deep Research feature which can synthesize content from across the web into one detailed report in minutes leveraging a version of the company’s latest model, o3

This feature is a powerful tool for workers, as it can save them hours by completing research autonomously. But can the technology’s underlying model replace workers? Yes, suggests Deep Research. Continue reading “ChatGPT’s Deep Research just identified 20 jobs…”

X is blocking links to Signal

source: theverge.com (contributed by FAN, Steve Page)  |  image: pexels.com

Users attempting to add their Signal.me URL to posts, DMs, and bio descriptions are being met with error messages.

X users are currently unable to post links to Signal.me, which are used to quickly and securely send direct messages to Signal users. A variety of failure notifications are being reported when X users attempt to post Signal links on the platform, some of which identify the blocked message as containing spam, harmful content, or malicious activity. Continue reading “X is blocking links to Signal”

The Spy Who Exposed the Secrets of the Black Chamber, One of America’s First Code-Breaking Organizations

source: smithsonianmag.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

In 1931, Herbert O. Yardley published a tell-all book about his experiences leading a covert government agency called the Cipher Bureau

Herbert O. Yardley was being followed. He knew it, as much as he knew something was off when a beautiful woman struck up a conversation with him at an illegal speakeasy in New York City in 1929. “Her friendliness was a bit forced,” he later recalled. “It did not seem reasonable for one of her beauty and charm to possess such warmth for a bald-headed man.” The drinks flowed liberally as Yardley sipped straight whiskey, only to let it run slowly through his lips into the ginger ale cup used as his chaser. The woman removed a compact mirror from her purse and disappeared into the ladies’ room. Yardley wasted no time in searching the purse but found nothing except $15, a key and two or three handkerchiefs.

At the end of the night, after Yardley helped the stranger home in a taxi, he waited until she fell asleep, then searched her apartment. In a dresser drawer, he found a typewritten note: “Have tried to reach you all day by telephone. See mutual friend at first opportunity. Important you get us information at once.” The cryptologist covered the woman with a blanket and quietly let himself out. Once again, he’d avoided falling into a spy’s trap. Even so, his days as the head of the top-secret Black Chamberagency were numbered.

READ THE FULL STORY AND VIEW THE MANY IMAGES FROM THIS FASCINATING SMITHSONIAN ARTICLE.  CLICK HERE

We’re In for a Rude Awakening on Cybersecurity

source: city-journal.org (contributed by FAN, Steve Page)  |  image: pexels.com

America remains ill-prepared for Chinese hackers targeting critical infrastructure.

It’s a crisis that almost no one is talking about. The Chinese Communist Party is now the world’s preeminent practitioner of cyber warfare. Once notoriously loud and clumsy, the CCP’s hackers have become stealthy and sophisticated. They’re intercepting the calls and texts of our leaders and infiltrating servers at our ports, power plants, and water-treatment facilities. Yet hardly anyone seems to care. When Congress held hearings on cybersecurity late last year, only a handful of journalists bothered to cover them. Continue reading “We’re In for a Rude Awakening on Cybersecurity”

Malicious Ads in Search Results Are Driving New Generations of Scams

source: wired.com (contributed by Artemus founder, Bob Wallace)  |  image: pixabay.com

 

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it’s contributing to the rise of investment scams and the spread of new strains of malware.

MALICIOUS DIGITAL ADVERTISEMENTS and “SEO poisoning” that gets those ads to prime spots in search results have been mainstays of the digital scamming ecosystem for years. But as online crime evolves and malicious trends like “pig butchering” investment scams and infostealing malware proliferate, researchers say that so-called “malvertising” is still a key technique for scammers—and still a growing problem. Continue reading “The scourge of “malvertising” is nothing new…”

FBI Sounds Alarm Over AT&T Hackers Stealing Agent Call Logs That Man Expose Informants

source: ibtimes.com (contributed by Steve Page)  |  image: fbi.gov

 

Hackers who breached AT&T’s systems may have handed criminals a roadmap to FBI informants

 

Hackerswho breached AT&T‘s systems may have handed criminals a roadmap to FBIinformants, stealing call logs that could unravel investigations and jeopardize lives, according to alarming new details revealed Thursday.

FBI officials have warned that last year’s AT&T system breach likely led to the theft of months’ worth of call and text records tied to federal agents, raising concerns about the safety of confidential informants, Bloomberg News reported. Continue reading “FBI Sounds Alarm Over AT&T Hackers…”

US data-center power use could nearly triple by 2028, DOE-backed report says

source: finance.yahoo.com (contributed by Steve Page)  |  image: pixabay.com

 

NEW YORK (Reuters) – U.S. data-center power demand could nearly triple in the next three years, and consume as much as 12% of the country’s electricity, as the industry undergoes an artificial-intelligence transformation, according to a Department of Energy-backed study that was first reported by Reuters.

The Lawrence Berkeley National Laboratory produced the report as the U.S. power industry and government attempt to understand how Big Tech’s data-center demand will affect electrical grids, power bills and the climate. Continue reading “US data-center power use could nearly triple by 2028”

The incredible true story of a CIA plane crash in Death Valley National Park

source: sfgate.com (contributed by Bill Amshey)  |  image: pixabay.com

 

The plane was part of a ‘super-secret operation’

On a cold, dark night in January 1952, a distress call went out over Death Valley.

“Mayday. Mayday. Mayday. This is Air Force 001 bailing out north of Barstow, California,” an official crash report would later read. Seconds later, six men jumped out of a 16-ton, two-engine, SA-16 Albatross plane into total darkness. The plane — with its backdoor hanging open — continued unmanned for a few moments, eventually crashing into a nearby desert mountain.

More than 70 years later, the metallic carcass is still there. Continue reading “True story of a CIA plane crash in Death Valley”