A bill designed to curb the spread of non-consensual intimate imagery (NCII), whether real or AI-generated, is on the brink of becoming law. Known as the Take It Down Act, the legislation commands online platforms to delete such material within 48 hours of being notified by victims. It’s expected to clear the House of Representatives and head swiftly to the White House, where President Donald Trump has pledged to sign it into law, aligning with First Lady Melania Trump’s strong support.
Backed by survivors of digital abuse—many of them minors—the law has stirred intense emotion and urgency on Capitol Hill. Their advocacy spotlighted the devastating impact of fake sexual content and revenge porn, which can proliferate across the internet in minutes, leaving permanent scars on victims. [Read more…]
If you’ve been losing sleep over the idea of AI replacing you at work, you can relax. Your job is safe, at least for now. It’s not that artificial intelligence doesn’t have ambitions; it’s just that it’s nowhere near capable enough to pull it off.
For college seniors eagerly anticipating that first step onto the career ladder, reality is hitting like a brick wall. The tech jobs they studied for? Drying up. Entry-level finance and consulting gigs? Not what they used to be. Even internships are getting scarce. Blame a shaky economy, cautious employers, and a new coworker who doesn’t need coffee breaks: generative AI.
Apple just pushed out emergency updates across iOS, macOS, and other platforms to squash two zero-day bugs that were actively being exploited. But before you panic: unless you’re someone Apple might actually send a holiday card to, you’re probably not the target. Their official language? These vulnerabilities were used against “specific targeted individuals.” Translation: celebrities, high-ranking officials, or people who pay someone else to clean their AirPods.
So… turns out one of the leading enterprise security products forgot the “security” part. More than 16,000 Fortinet devices exposed to the internet have been found carrying a persistent symlink backdoor—one that grants read-only access to sensitive files.