Topic: industry response
-
Connected Cars: The Smart, Convenient, and Vulnerable Future
Consumers are increasingly concerned about vehicle cybersecurity, with many fearing remote hacking and prioritizing physical safety over data protection in their purchasing decisions. Modern cars' complexity and reliance on software, including over-the-air updates and third-party components, intr...
Read More » -
AI Models Tricked by Fake Data to Increase Visibility
Recent academic research shows that AI models rank content with newer timestamps higher, even without substantive changes, indicating a strong bias towards perceived freshness over accuracy. This recency bias creates pressure for content creators to frequently update or artificially adjust public...
Read More » -
Ford, GM Buy Their Own EVs to Save $7500 Tax Credit
Ford and General Motors are implementing temporary leasing programs through their financing divisions to preserve the $7,500 EV tax credit for consumers after its official expiration. The strategy involves Ford Credit and GM Financial purchasing vehicles from dealers before the deadline and leasi...
Read More » -
AI Companionship Faces a Regulatory Crackdown
Regulatory scrutiny of AI companionship is intensifying in the U.S., with lawmakers focusing on safety and ethical concerns, especially for vulnerable users like minors. California has passed a pioneering bill requiring AI developers to notify minors of AI interactions, handle crisis conversation...
Read More » -
Perplexity Launches Comet Plus, Shares Revenue With Publishers
Perplexity has launched Comet Plus, a $5/month subscription that shares revenue with publishers when users read their content or AI systems reference it for responses. The revenue-sharing model compensates publishers based on three types of engagement: human visits, search citations, and agent ac...
Read More » -
Satellites Are Leaking Your Private Data: Calls, Texts, and Secrets
Researchers found that approximately half of geostationary satellite signals are unencrypted, allowing interception of sensitive communications like phone calls and military data with basic equipment. Using affordable hardware, the team captured private data including T-Mobile customer communicat...
Read More »