A review of Lennart Maschmeyer, “Subversion: From Covert Operations to Cyber Conflict” (Oxford University Press,…
INFRASTRUCTURE & TECHNOLOGY
With the European Parliament elections now underway, millions of EU citizens are finalizing their decisions…
China Turns to Private Hackers as It Cracks Down on Online Activists on Tiananmen Square Anniversary
Every year ahead of the June 4 commemoration of the Tiananmen Square massacre, the Chinese…
Experiments by ETH Zurich computer security researchers showed that smartphones can be manipulated to allow…
On a cold winter night in 2016, Ukrainians experienced the first-ever known blackout caused by…
Some forms of “prompt injection” may violate federal law. In light of recent advancements in…
Controlling AI through compute may be necessary, but it won’t be easy. The continued development…
There are no neutral baselines for foundation models. Shortly into its brief and controversial career,…
More U.S. partners are considering building their own nuclear deterrents. Editor’s Note: Most of the attention…
Should regulators focus on present-day or potential future AI risks? Both. Since the release of…