Sports Metaverse company LootMogul is partnering with a leading sports marketing and commercial rights agency Six Sport, to support its strategic growth plans and expedite the adoption of blockchain gaming for sports organizations and athletes, delivering truly immersive sports fan experiences. Continue reading
Category Archives: Technology
56% of Internet Users Fall for Phishing Scams, CUJO AI Reports
CUJO AI, the global leader of cybersecurity and network intelligence solutions for Internet Service Providers (ISPs), today released its annual report, “Cybersecurity Report 2022: Consumer Devices Under Threat.” Continue reading
Deepfakes: faces created by AI now look more real than genuine photos
Manos Tsakiris, Royal Holloway University of London
Even if you think you are good at analysing faces, research shows many people cannot reliably distinguish between photos of real faces and images that have been computer-generated. This is particularly problematic now that computer systems can create realistic-looking photos of people who don’t exist.
ChatGPT: why education should embrace the AI chatbot, not shun it
Brian Lucey, Trinity College Dublin and Michael Dowling, Dublin City University
Just under two months ago, the US artificial intelligence company OpenAI introduced a program called ChatGPT. Essentially an advanced chatbot, it has been the subject of much debate.
106 institutions to deliver soft skills training in VR through Bodyswaps and Meta Immersive Learning grant
Bodyswaps, together with Meta Immersive Learning, has announced the final list of higher and further education institutions to participate in their Immersive Learning Pilot Programme. Continue reading
The spy clause and the end of anonymity
By Samuel Woodhams | Digital rights researcher and journalist The long, turbulent history of UK’s Online Safety Bill can be traced back to 2017, with the publication of the Internet Safety Strategy green paper. Since then, the proposed legislation has gone through endless revisions, been delayed and, at times, looked like it might be dropped entirely. Continue reading |
Introducing TAE Power Solutions, a power management spin-off company from fusion energy leader TAE Technologies
TAE Technologies, the world’s largest private fusion energy company, today announces the formation of a new subsidiary, TAE Power Solutions.
Spun out from TAE Technologies, TAE Power Solutions intends to deliver a first-of-its-kind technology to fundamentally improve the reliability, efficiency, longevity, and affordability of electric-powered products, from vehicles to renewable energy storage. The proprietary technology platform is derived from fusion research, and is a foundational step toward mass onboarding of electric vehicles and deployment of intermittent renewable energy as dispatchable power. Continue reading
Digital welfare dystopia
By Samuel Woodhams | Digital rights researcher and journalist
Algorithms to determine welfare payments and detect fraud are becoming standard practice around the world. From Manchester to Melbourne, peoples’ lives are being shaped by secretive tools that determine who is eligible for what, and how much debt is owed. Although the technology has been around for some time, the outbreak of COVID-19 renewed enthusiasm for the digital welfare state and, for thousands of cash-strapped public bodies, the promise of increased efficiency and lower costs has proven irresistible. |
SecurityGen identifies the cybersecurity priorities for mobile operators in 2023
SecurityGen, the award-winning global provider of security solutions and services for the telecoms industry, today announced its cybersecurity priorities for telecom operators in 2023. Continue reading
How to spot a cyberbot – five tips to keep your device safe
How to spot a cyberbot – five tips to keep your device safe
Adrian Winckles, Anglia Ruskin University and Andrew Moore, Anglia Ruskin University
You may know nothing about it, but your phone – or your laptop or tablet – could be taken over by someone else who has found their way in through a back door. They could have infected your device with malware to make it a “bot” or a “zombie” and be using it – perhaps with hundreds of other unwitting victims’ phones – to launch a cyberattack.