|
|||||
The US Department of State is unwinding a 2023 decision to use san-serif Calibri font on all official communications and switching to Times New Roman instead, The New York Times reports. In a memo obtained by NYT titled "Return to Tradition: Times New Roman 14-Point Font Required for All Department Paper," Secretary of State Marco Rubio frames the change as a way to return professionalism to the State Department."Switching to Calibri achieved nothing except the degradation of the departments official correspondence," Rubio said in the memo. That's because the font is "informal" and clashes with the State Department's letterhead, according to Rubio, while serif fonts like Times New Roman "connote tradition, formality and ceremony."Former Secretary of State Antony Blinken originally switched the State Department to Calibri in 2023 to improve the accessibility of official communications. The curvy, flourish-free lines of sans-serif fonts work better with assistive technologies like screen readers and text-to-speech tools. Serif fonts, meanwhile, are typically used in things like newspapers to make small, printed text legible.While Rubio notes that Calibri "was not among the departments most illegal, immoral, radical or wasteful instances of D.E.I.A.," it seems clear that Rubio lumps the font in with those same diversity, equity, inclusion and accessibility initiatives. Getting rid of it is an easy (and weirdly petty) way to follow through on the second Trump administration's anti-DEI stance towards just about everything.This article originally appeared on Engadget at https://www.engadget.com/big-tech/state-department-calibri-font-was-a-dei-hire-190454957.html?src=rss
Category:
Marketing and Advertising
Ever since reporting earlier this year on how easy it is to trick an agentic browser, I've been following the intersections between modern AI and old-school scams. Now, there's a new convergence on the horizon: hackers are apparently using AI prompts to seed Google search results with dangerous commands. When executed by unknowing users, these commands prompt computers to give the hackers the access they need to install malware. The warning comes by way of a recent report from detection-and-response firm Huntress. Here's how it works. First, the threat actor has a conversation with an AI assistant about a common search term, during which they prompt the AI to suggest pasting a certain command into a computer's terminal. They make the chat publicly visible and pay to boost it on Google. From then on, whenever someone searches for the term, the malicious instructions will show up high on the first page of results. Huntress ran tests on both ChatGPT and Grok after discovering that a Mac-targeting data exfiltration attack called AMOS had originated from a simple Google search. The user of the infected device had searched "clear disk space on Mac," clicked a sponsored ChatGPT link and lacking the training to see that the advice was hostile executed the command. This let the attackers install the AMOS malware. The testers discovered that both chatbots replicated the attack vector. As Huntress points out, the evil genius of this attack is that it bypasses almost all the traditional red flags we've been taught to look for. The victim doesn't have to download a file, install a suspicious executable or even click a shady link. The only things they have to trust are Google and ChatGPT, which they've either used before or heard about nonstop for the last several years. They're primed to trust what those sources tell them. Even worse, while the link to the ChatGPT conversation has since been taken off Google, it was up for at least half a day after Huntress published their blog post. This news comes at a time that's already fraught for both AIs. Grok has been getting dunked on for sucking up to Elon Musk in despicable ways, while ChatGPT creator OpenAI has been falling behind the competition. It's not yet clear if the attack can be replicated with other chatbots, but for now, I strongly recommend using caution. Alongside your other common-sense cybersecurity steps, make sure to never paste anything into your command terminal or your browser URL bar if you aren't certain of what it will do.This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/hackers-tricked-chatgpt-grok-and-google-into-helping-them-install-malware-185711492.html?src=rss
Category:
Marketing and Advertising
YouTube TV, which launched in 2017 as a $35-per-month all-in-one service, will soon introduce YouTube TV Plans. Although the announcement is light on details, we know the initiative will let you sign up for genre-specific packages, such as sports and news. In other words, it's the final step in the legacy-cable-ification of the service.YouTube hasn't said anything about pricing. But it's probably safe to assume that narrowing your available content will reduce your bill. A year ago, the company raised its monthly cost to $83. That's 137 percent higher than the services launch price nearly nine years ago.We don't yet have the full list of available plans, but YouTube mentioned packages for sports, news and "family and entertainment content." As expected, it promised that you can mix and match them. The YouTube TV Sports Plan will include access to all major broadcast channels and several sports networks, like all ESPN networks, FS1, and NBC Sports Network. It sounds similar to offerings from Fubo and DirecTV.YouTube TV plans will launch in early 2026. The current $83 all-in-one model will remain available alongside it.This article originally appeared on Engadget at https://www.engadget.com/entertainment/streaming/youtube-tv-plans-will-let-you-choose-genre-specific-content-packages-182909455.html?src=rss
Category:
Marketing and Advertising
All news |
||||||||||||||||||
|
||||||||||||||||||