When asked to build web pages, LLMs found to include manipulative design practices

Deceptive designs in interactive webpages created by ChatGPT. Credit: arXiv (2024). DOI: 10.48550/arxiv.2411.03108 A team of computer scientists at Technical University of Darmstadt, working with a colleague from the University of Glasgow, and another from Humbold University of Berlin, has found evidence via experiments they ran, that when asked to build a web page, LLMs…

Read More

Apple appeals EU’s “unprecedented” $568m fine

Apple has confirmed it will appeal the EU’s $568.6 million (€500m) fine. The tech giant was fined after it was deemed to have violated EU law by not permitting App Store apps to link, or even make reference to, alternative means of payment that could circumvent Apple’s own storefront, thereby compelling developers to share 30…

Read More

New optical modulator can operate at 10 times the speed of current devices

Between the two probes you can find the PLZT optical modulator developed by the research team. The modulator is 2.5 mm in length. The waveform demonstrates the results from the two tests conducted on the optical modulator: on-off-keying method (top) and four-level pulse-amplitude-modulation method (bottom). The four-level pulse-amplitude-modulation method can double the transmission rate by…

Read More

Airport Lounges Are Sexy Again—if You Can Get In

Let’s be honest: A crowded airport lounge without a seat in sight is usually less appealing than an empty gate area. Over the past decade, an influx of travelers with club access has led to overcrowding, long wait lists, and a diminished (read: not luxurious) experience. However, a version of commercial air travel—often hidden from…

Read More

Cybersecurity Researchers Find 20 Crypto-Phishing Apps on Google Play Store: Check List

A team of cybersecurity researchers have found 20 apps on the Google Play Store which were targeting cryptocurrency wallet users. According to a report by a cybersecurity research firm, these crypto-phishing applications impersonated legitimate crypto wallets such as Hyperliquid, PancakeSwap, and Raydium. Threat actors leveraged phishing tactics and compromised or repurposed developer accounts, forcing users…

Read More