(g+) ChatGPT und Co.: KI für alle, aber wer zahlt?

KI-Werkzeuge sind im Alltag angekommen. Doch nur ein Bruchteil der Nutzer zahlt. Wo die Branche nach neuen Einnahmen suchen sollte. Eine Analyse von Oliver Jessner (KI, Wirtschaft)

KI-Werkzeuge sind im Alltag angekommen. Doch nur ein Bruchteil der Nutzer zahlt. Wo die Branche nach neuen Einnahmen suchen sollte. Eine Analyse von Oliver Jessner (KI, Wirtschaft)

Oh Schreck: Halloween-Horror zum Spielen

Grusel und Gänsehaut: Pünktlich zu Halloween liefern Horrorgames von düster bis charmant den perfekten Anlass, die Nerven zu testen. Von Rainer Sigl (Indiegames, Disney)

Grusel und Gänsehaut: Pünktlich zu Halloween liefern Horrorgames von düster bis charmant den perfekten Anlass, die Nerven zu testen. Von Rainer Sigl (Indiegames, Disney)

YouTube denies AI was involved with odd removals of tech tutorials

YouTubers suspect AI is bizarrely removing popular video explainers.

This week, tech content creators began to suspect that AI was making it harder to share some of the most highly sought-after tech tutorials on YouTube, but now YouTube is denying that odd removals were due to automation.

Creators grew alarmed when educational videos that YouTube had allowed for years were suddenly being bizarrely flagged as “dangerous” or “harmful,” with seemingly no way to trigger human review to overturn removals. AI seemed to be running the show, with creators’ appeals seemingly getting denied faster than a human could possibly review them.

Late Friday, a YouTube spokesperson confirmed that videos flagged by Ars have been reinstated, promising that YouTube will take steps to ensure that similar content isn’t removed in the future. But, to creators, it remains unclear why the videos got taken down, as YouTube claimed that both initial enforcement decisions and decisions on appeals were not the result of an automation issue.

Read full article

Comments

Neural network finds an enzyme that can break down polyurethane

Given a dozen hours, the enzyme can turn a foam pad into reusable chemicals.

You’ll often hear plastic pollution referred to as a problem. But the reality is that it’s multiple problems. Depending on the properties we need, we form plastics out of different polymers, each of which is held together by a distinct type of chemical bond. So the method we use to break down one type of polymer may be incompatible with the chemistry of another.

That problem is why, even though we’ve had success finding enzymes that break down common plastics like polyesters and PET, they’re only partial solutions to plastic waste. However, researchers aren’t sitting back and basking in the triumph of partial solutions, and they’ve now got very sophisticated protein design tools to help them out.

That’s the story behind a completely new enzyme that researchers developed to break down polyurethane, the polymer commonly used to make foam cushioning, among other things. The new enzyme is compatible with an industrial-style recycling process that breaks the polymer down into its basic building blocks, which can be used to form fresh polyurethane.

Read full article

Comments

Oberes 6-Gigahertz-Band: Wildberger vor “fataler technischer Fehleinschätzung”

Die Entscheidung von Bundesdigitalminister Wildberger, das obere 6-Gigahertz-Band an den Mobilfunk zu geben, stößt auf Protest. HPE und der Breko hatten versucht, dass zu verhindern. (Bundesministerium für Digitalisierung un, WLAN)

Die Entscheidung von Bundesdigitalminister Wildberger, das obere 6-Gigahertz-Band an den Mobilfunk zu geben, stößt auf Protest. HPE und der Breko hatten versucht, dass zu verhindern. (Bundesministerium für Digitalisierung un, WLAN)

Cursor introduces its coding model alongside multi-agent interface

The vibe-coding IDE put an emphasis on speed with Composer.

Cursor has for the first time introduced what it claims is a competitive coding model, alongside the 2.0 version of its integrated development environment (IDE) with a new feature that allows running tasks with multiple agents in parallel.

The company’s flagship product is an IDE modeled after Visual Studio Code in many respects, but with a strong emphasis on vibe coding and heavier direct integration of large language model-based tools in the interface and workflow. Since its introduction, Cursor has supported models developed by other companies such as OpenAI, Google, and Anthropic. However, while it has trialed its own built-in models, they weren’t competitive with the big frontier models.

It’s a different story now, according to the company’s claims about Composer. Built with reinforcement learning and a mixture-of-experts architecture, Composer is dubbed by Cursor “a frontier model that is 4x faster than similarly intelligent models”—a significant claim when you consider what it’s competing with.

Read full article

Comments

Two Windows vulnerabilities, one a 0-day, are under active exploitation

Both vulnerabilities are being exploited in widescale operations.

Two Windows vulnerabilities—one a zero-day that has been known to attackers since 2017 and the other a critical flaw that Microsoft initially tried and failed to patch recently—are under active exploitation in widespread attacks targeting a swath of the Internet, researchers say.

The zero-day went undiscovered until March, when security firm Trend Micro said it had been under active exploitation since 2017, by as many as 11 separate advanced persistent threats (APTs). These APT groups, often with ties to nation-states, relentlessly attack specific individuals or groups of interest. Trend Micro went on to say that the groups were exploiting the vulnerability, then tracked as ZDI-CAN-25373, to install various known post-exploitation payloads on infrastructure located in nearly 60 countries, with the US, Canada, Russia, and Korea being the most common.

A large-scale, coordinated operation

Seven months later, Microsoft still hasn’t patched the vulnerability, which stems from a bug in the Windows Shortcut binary format. The Windows component makes opening apps or accessing files easier and faster by allowing a single binary file to invoke them without having to navigate to their locations. In recent months, the ZDI-CAN-25373 tracking designation has been changed to CVE-2025-9491.

Read full article

Comments