Wednesday, March 18, 2026


DIGITAL LIFE


AI tools malware campaign detected targeting programmers

Kaspersky has identified a malware campaign targeting AI tools that uses sponsored ads on Google to distribute infostealers disguised as Claude Code, OpenClaw, and Doubao. The attackers accurately mimic the official documentation of these tools, inducing programmers to execute installation commands that compromise their systems. Once infected, devices are exposed to the theft of credentials, source code of active projects, browser sessions, and cryptocurrency wallet data.

The central mechanism of this campaign distinguishes it from email phishing or supply chain attacks. When searching for "Claude Code download," sponsored ads appear at the top of the results, redirecting to fraudulent pages hosted on Squarespace. These pages are visually identical to the official documentation and copy the installation instructions verbatim, making manual detection virtually impossible for a user without prior suspicions.

The user copies the commands and executes them. At this point, instead of installing the development tool, it installs malware on your system.

According to Kaspersky, the malware installed varies depending on the victim's operating system:

-Operating: Windows  System: Amatera  Malware targeted data: User directories, browsers, cryptocurrency wallets

-Operating: macOS  System: AMOS Browser  Malware targeted data: data wallets, confidential files

Amatera operates according to a Malware-as-a-Service (MaaS) model, which means that the infrastructure is available to multiple criminal groups, not just the original perpetrators. AMOS, on the other hand, is an infostealer with a documented history of previous campaigns targeting Apple devices, described by Kaspersky itself in previous reports.

Claude Code and OpenClaw: high-value targets...The choice of imitated tools is not random. Claude Code is a development agent created by Anthropic, with increasing adoption in software engineering teams globally. OpenClaw, in turn, is an open-source tool that has accumulated more than 190,000 stars on GitHub and is among the most sought after by programmers in 2026. The popularity of these platforms makes them prime targets for imitation: the more users search for installation instructions, the greater the likelihood of clicking on a fraudulent ad.

Kaspersky also identified similar campaigns imitating Doubao, a ByteDance tool with a presence mainly in the Asian market. Its relevance to the European context is not justified in the statement.

A pattern that is not new...This is not the first campaign to exploit users' interest in AI tools. In December 2025, Kaspersky documented a similar attack in which attackers distributed an infostealer for macOS through Google Ads. A chat interface mimicked a ChatGPT tutorial and guided users to install the Atlas Browser, with the instructions hosted on a website that simulated the presence of OpenAI. The pattern is the same: exploiting the trust that programmers place in sponsored search results.

What the press release doesn't say...Kaspersky does not present verifiable technical indicators of compromise, such as malicious domains, file hashes, or command and control server addresses. Without this data, security teams lack a concrete basis for implementing preventative blocks. The press release also does not quantify the number of identified victims or the affected countries, preventing an objective assessment of the campaign's true scale.

How to reduce the risk...Kaspersky presents four recommendations for programmers and IT teams:

Always verify that download links point to the official websites of the projects.

Review any command-line instructions before executing them, especially when copied from external sources.

Do not follow installation guides that have not been specifically requested or that are not fully understood.

Use endpoint security solutions with the ability to detect infostealers and malicious downloads.

A sophisticated, ongoing malware campaign active as of March 2026 is actively targeting software developers and programmers by impersonating popular AI coding tools and, in a separate campaign, through fake, highly convincing job interviews. The primary goal of these campaigns is to steal sensitive data, including credentials, browser-stored passwords, cryptocurrency wallets, and internal company code.

Key aspects of the AI tool malware campaign(below)

Targets & method: Attackers are targeting developers searching for tools like Claude Code, OpenClaw, and others. They use Google Search ads to display fake, malicious, top-ranked websites that mimic official sites.

Malware distribution (Claude Fraud): This campaign, often called "Claude Fraud," has two main vectors:

macOS (MacSync Infostealer): Fake landing pages use a "ClickFix" terminal command technique to persuade users to execute malicious code.

Windows (Trojanized Extension): A malicious VS Code extension masquerades as an official Claude Code plugin, executing PowerShell silently to bypass Defender and download additional payloads.

Impact: Over 15,600 victims have been documented, and the attackers are actively adapting by using new domains (e.g., Squarespace-hosted pages) when their sites are taken down. 

"Contagious Interview" Campaign (Job-Themed Attack)

Vector: Attackers conduct fake, detailed technical interviews with software developers at reputable firms.

Method: Victims are convinced to download "assignments" or "coding tools" that actually contain malware.

Target: Developers at large enterprise solution providers and media firms are being targeted, with the goal of infiltrating corporate networks. 

Recommendations for protection(below):

Verify downloads: Only download AI tools from official, verified vendors.

Beware of sponsored ads: Avoid clicking on "Sponsored" search results for popular tools; use direct URLs.

Inspect commands: Carefully review any command-line instructions (especially copy-pasted curl or chmod commands) from websites before running them.

Check vs code extensions: Verify the publisher of any vs Code extension before installation.

Monitor for IOCs: Check for unusual osascript activity on macOS or unexpected powershell.exe execution from Code.exe on Windows. 

These campaigns are part of a broader trend of "malvertising" and social engineering that leverages the high demand for AI tools among developers to bypass traditional security measures. 

https://www.microsoft.com/en-us/security/blog/2026/03/11/contagious-interview-malware-delivered-through-fake-developer-job-interviews/

mundophone

Tuesday, March 17, 2026


DIGITAL LIFE


AI facial recognition error gets grandma arrested at gunpoint and 6 months in jail

A grandmother from Tennessee is working to get her life back after what she says was a case of mistaken identity linked to North Dakota that nearly cost her everything.

In a quiet suburb of Tennessee, the AI and physical world collided with devastating consequences for a grandmother whose only crime was existing in a database. Law enforcement’s increasing reliance on facial recognition technology has shifted from a futuristic tool for catching fugitives into a bureaucratic nightmare that treats algorithmic matches as absolute truth, regardless of the human cost, in this case causing the grandma to be wrongfully arrested and jailed for almost six months.

The ordeal began when facial recognition software used to investigate a series of fraud cases in Fargo, North Dakota, flagged Angela Lipps(image above), a grandmother living hundreds of miles away in Tennessee. Despite having no connection to the crime and a lack of physical evidence linking her to the scene, the software hit was treated as a definitive ID. Lipps was arrested at gunpoint by U.S. Marshals on July 14 last year, and subsequent incarcerated in a Fargo jail where she remained for months, separated from her family and struggling to clear her name from a crime she did not commit.

This incident is not an isolated glitch but part of a growing pattern of automation bias within law enforcement departments. Experts argue that while facial recognition is marketed as a precision tool, it often struggles with demographic accuracy, frequently misidentifying women and people of color at higher rates. When a computer provides a potential match, investigators sometimes bypass traditional verification steps. In the case of Lipps, no one checked her alibis or other proof of innocence. Records showed that even as the police placed the grandma in Fargo, she was actually in Tennessee that entire time depositing her Social Security checks and buying cigarettes. 

It was found that the software used to identify the criminal attempted to find patterns where they may not exist. In this case, the grandmother’s facial structure, body type, and hair were deemed similar enough to the investigated suspect’s that the system generated a high-confidence match. Unfortunately, once those data points entered the legal system, it triggered a chain of events that the victim was powerless to stop. For 50-year old Lipps, the eventual dismissal of charges came too late to prevent the trauma of being uprooted and jailed. 

Angela Lipps spent nearly six months in jail after Fargo police connected her to a bank fraud case in the metro.

It's an alleged crime she says she didn't commit. In fact, she said she's never been to North Dakota.

Lipps, 50, is the mother of three grown children and has five grandchildren, spending nearly her entire life in north-central Tennessee. The extent of her travels is limited to neighboring states.

She's never been on an airplane in her life.

That changed last summer when police flew her to North Dakota to face criminal charges, after facial recognition showed she was the main suspect in what Fargo police alleged was an organized bank fraud case.

"It was so scary, I can still see it in my head, over and over again," Lipps said.

It was July 14, the day a team of U.S. Marshals arrested Lipps at her home in Tennessee. She said she was taken away at gunpoint while babysitting four young children. She was booked into her county jail in Tennessee as a fugitive from justice from North Dakota.

"I've never been to North Dakota, I don't know anyone from North Dakota," Lipps said.

Lipps would sit in that Tennessee jail cell for nearly four months. As an alleged fugitive, she was held without bail. Lipps learned, following a Fargo Police Department investigation, she had been charged with four counts of unauthorized use of personal identifying information and four counts of theft in North Dakota.

In Tennessee, she was given a court appointed lawyer for the extradition process. To fight the charges, she was told she would have to go to North Dakota.

Surveillance video shows a woman using a fake military ID to withdraw large sums of money; Fargo police mistakenly identified her as Angela Lipps. Contributed

Through an open records request, WDAY News obtained the Fargo police file in this case. In April and May 2025, detectives were investigating several bank fraud cases. A woman is seen using a fake U.S. Army military I.D. card to withdraw tens of thousands of dollars.

In an effort to help identify the woman in the surveillance video, court documents show Fargo police used facial recognition software. The software identified the person as Angela Lipps. According to the court documents, the Fargo detective working the case then looked at Lipps' social media accounts and Tennessee driver's license photo.

The detective wrote in his charging document that Lipps does appear to be the suspect based on facial features, body type and hairstyle and color.

Lipps told WDAY News that no one from the Fargo Police Department ever called to question her.

Officers from North Dakota did not pick up Lipps from her jail cell in Tennessee until Oct. 30, a total of 108 days after her arrest. Then, the next day she made her first appearance in a North Dakota courtroom to fight the charges.

"If the only thing you have is facial recognition, I might want to dig a little deeper," said Jay Greenwood, the lawyer representing Lipps in North Dakota.

Greenwood immediately asked Lipps for her bank records. Once they were in hand, Fargo police met with him and Lipps at the Cass County jail on Dec. 19. She had already been in jail for more than five months. It was the first time police ever interviewed her.

Her bank records showed she was more than 1,200 miles away, at home in Tennessee, at the same time police claimed she was in Fargo committing fraud.

                 Angela Lipps booking photo while at the Cass County Jail. Contributed/Cass County Jail

"Around the same time she's depositing Social Security checks ... she is buying cigarettes at a gas station, around the same time, she is buying a pizza, she is using a cash app to buy an Uber Eats," Greenwood said.

On Christmas Eve, five days after the interview with Fargo police, the case was dismissed, and she was released from jail.

But Lipps was now stranded in Fargo.

"I had my summer clothes on, no coat, it was so cold outside, snow on the ground, scared, I wanted out but I didn't know what I was going to do, how I was going to get home," Lipps said.

Fargo police did not cover Angela's expenses to get home after her release from jail. Local defense attorneys gave her money to pay for a hotel room and food on Christmas Eve and Christmas Day.

The day after Christmas, F5 Project founder Adam Martin drove Lipps to Chicago so she could get home to Tennessee.

"I'm just glad it's over. I'll never go back to North Dakota," Lipps said.

For more than a week, WDAY News tried to arrange an on-camera interview with Fargo Police Chief David Zibolski to discuss the case. Through a spokesperson, the chief declined an on-camera interview. WDAY News brought the issue up on Wednesday, March 11, at Zibolski's retirement press conference.

"Why did nobody from Fargo Police ever speak with Angela Lipps for the five months she was in jail?" Zibolski was asked.

"Thank you, Matt (Henson), for that question, but we are not here to talk about that today," Zibolski replied.

Lipps is back home in Tennessee now but is still feeling the impact from the incident. She told WDAY News that no one from the Fargo Police Department has apologized for the incident.

Unable to pay her bills from jail, she lost her home, her car and even her dog.

Fargo police say the bank fraud case is still under investigation and no arrests have been made.

So far eight other Americans have been wrongfully arrested due to erroneous facial recognition matches. In and of itself, the technology, as proponents argue, has saved thousands of man-hours and solved cold cases that would otherwise remain dormant. However, civil liberties advocates point out that the legal safeguards have not kept pace with the technology. In many jurisdictions, there are no mandatory standards for how confident an algorithm must be before an arrest is made, nor are there requirements for independent human reviews of digital matches.

mundophone


DIGITAL LIFE


In the field, AI helps detect crop pests and control livestock in Brazil

Artificial intelligence (AI) is already part of the routine of 41.9% of farms and agribusinesses in Brazil, according to an estimate prepared by Professor Oscar Burd, from the Getulio Vargas Foundation (FGV). In 2022, this rate was 16.9%. To arrive at this number, the specialist cross-referenced data from surveys by IBGE (Pintec Semiannual 2024), Sebrae, the World Intellectual Property Organization (WIPO), and consultancies specializing in agtechs.

— The speed is surprising. While previous technologies, such as GPS, took decades to become widespread, AI jumped from an experimental curiosity to a core business tool in less than five years — says Burd.

According to him, AI is no longer exclusive to large groups and has been "democratized" with applications, platforms, and technologies embedded in equipment:

— Today, low-power tractors already leave the factory with intelligent monitoring systems, and startups offer AI solutions as a service (SaaS), which allow small producers to access diagnostics via smartphone.

The technology has multiple applications in the daily routine of farms, such as in crop management, animal husbandry, and business management.

With digitalization, almost everything can generate data, which is processed by AI programs. From there, the technology relates them to available information databases and generates recommendations for productive activities.

Back to the 'good old days'... SLC Agrícola, one of the largest grain producers in the country, entered the "AI Era" between 2017 and 2018. According to the group's Technology Director, Rafael Rosa, AI permeates various activities, with applications and programs embedded in equipment (machinery, drones, sensors, scales, silos, etc.).

The main benefit, he says, lies in the analysis of large volumes of data to allow for faster decision-making:

— Just one tractor can generate a million data points per day. But, in addition to them, we have data from sensors, satellites, drones, and thousands of other pieces of equipment.

In agronomic management, the benefits include the detection of pests and diseases through real-time imaging for selective spraying, prediction of water stress per plot, and nutritional deficiencies in plants.

Rural producer Tasso Jayme sees in AI the possibility of returning to the “good old days of livestock farming.” He has 2,500 head of cattle in Goianésia (GO), about 170 km from Goiânia, in addition to 4,000 hectares of soybean and sugarcane crops.

— I've been in livestock farming for 50 years, since adolescence. Before, it was my main activity, but a few years ago it became complicated. New technologies can bring back the good old days — says Jayme.

He started using the technology in February: a drone with computer vision that identifies the best areas and the exact volume of seeds for planting pasture:

— With AI, we can locate the ideal areas to sow seeds over the soybean fields. This way, the pasture will benefit from the fertilization. The drone took images to indicate the needs for liming, fertilization, and the number of head (of cattle) per hectare — he says.

For the rancher, those who don't adopt AI will be left behind.

But there are structural obstacles. One of them is connectivity. Although 4G and 5G coverage in rural properties reached 43.8% in 2024, according to ConectarAgro, more than half of the properties still depend on offline solutions or satellite connections.

— Technology can be sophisticated, but without connectivity it simply doesn't reach the field — says Burd.

According to him, another obstacle is the scarcity of professionals capable of interpreting the data and recommendations produced by AI systems.

Unlike office AI, field AI focuses on physical autonomy and data collection in locations with difficult connectivity.

1. Areas of operation and impact...AI is transforming work "on the ground" through tools that increase productivity and safety:

-Precision agriculture: Use of sensors and AI to monitor crop health, predict harvests, and automate irrigation and planting.

-Predictive maintenance: Systems that analyze photos and sensor data to identify structural flaws (such as rust or cracks) in machines or infrastructure before they cause disruptions.

-Workplace safety: Smart cameras monitor construction sites to ensure the use of PPE and prevent accidents in real time.

Voice data collection: Tools like Fulcrum's Audio FastFill allow technicians to fill out complex reports simply by speaking, eliminating manual typing in the field.

2. Main technologies used...For an AI to operate outside the laboratory, it depends on three pillars:

-Edge AI: Data processing directly on the device (such as a drone or robot), allowing the machine to make decisions even without internet access.

-Computer vision: Allows machines to identify objects, obstacles, and hazards through cameras.

-Autonomous robotics: Software that allows vehicles to navigate irregular and unmapped terrain, an area led by companies like FieldAI.

3. The future...Experts predict that AI will cease to be just a tool and become a "digital colleague." In the field, this means robots that learn new tasks simply by observing humans and systems that manage entire fleets of machines in a coordinated way to maximize energy and operational efficiency.

mundophone

Monday, March 16, 2026


SAMSUNG


Future Galaxy Z Wide Fold could be a calculated risk in a volatile market

The foldable device market is about to receive a new protagonist that promises to shake things up, but perhaps not in the way the most fervent enthusiasts expected. Samsung, which has dominated this segment almost unchallenged in the West, seems to be preparing a direct response to Apple's imminent entry into this sector. The device in question, provisionally nicknamed the Galaxy Z Wide Fold, emerges as an attempt to anticipate Apple's strategy, focusing on a wider format that prioritizes productivity and multimedia consumption in an authentic tablet format.

The most recent leaks indicate that Samsung is not planning a complete break with what we already know, but rather an ergonomic adaptation. The Galaxy Z Wide Fold should feature a 7.6-inch main screen. Interestingly, this value is slightly smaller than the 8 inches expected for the Galaxy Z Fold 7, but the big difference lies in the aspect ratio. By adopting a wider design, Samsung seeks to offer you an experience much closer to that of an iPad Mini or a conventional small tablet when the device is open.

This paradigm shift is a clear defensive move. We know that Apple is betting on a design that transforms the iPhone into a fluid work device, and the Galaxy Z Wide Fold is Samsung's way of saying it has arrived. If you are used to the narrower, more vertical format of the traditional Fold line, this new model may be the alternative you've been waiting for to read documents or edit photos with greater visual comfort.

As for what's "under the hood," the news brings a mix of predictability and uncertainty. As would be expected in a top-of-the-line device for 2026, Qualcomm's Snapdragon 8 Elite Gen 5 processor is the strongest candidate to equip this foldable. However, there are strong rumors that Samsung could opt for its own Exynos 2600 processor, manufactured with a 2-nanometer lithography.

For you, as a user, this choice will be crucial for the device's thermal performance and energy efficiency. Regardless of the final choice, you can expect top-tier performance, capable of handling heavy multitasking and demanding applications without any difficulty. The question that remains is whether this incremental evolution will be enough to justify the price tag, which certainly won't be for every budget.

New information about the upcoming Galaxy Z Wide Fold has emerged through the well-known informant Digital Chat Station, responsible for disclosing preliminary details about the screen, battery, and chipset of the new foldable. If the information is confirmed, the model should be part of the future generation that also includes the Galaxy Z Fold 8 and Galaxy Z Flip 8.

According to the leak, the Galaxy Z Wide Fold should have a 7.6-inch internal screen, a size similar to other foldables from the brand. The difference may lie in the panel format, with an estimated aspect ratio of 4:3 or close to 16:10, a factor that could influence the multitasking and productivity experience.

Performance may also receive significant improvements. The leak indicates the presence of the Snapdragon 8 Elite Gen 5, the same as the recent Galaxy S26 Ultra. The choice suggests that Samsung intends to keep the new foldable at the same performance level as the brand's main models.

It is not yet clear whether this processor will be used globally or only in some markets. In previous generations, the company alternated between Snapdragon and Exynos chips depending on the region, a strategy that may be repeated. Despite the initial details, several pieces of information remain unknown. The leak doesn't mention camera configuration, storage, or other design aspects, points that should emerge as the launch approaches.

The eternal question of battery life...If there's one area where Samsung remains conservative, it's in the power capacity of its foldable devices. While Chinese brands comfortably surpass the 5,000 mAh barrier in ultra-thin formats, the Galaxy Z Wide Fold should stay at 4,800 mAh. Although this is an increase compared to the 4,400 mAh seen in the Galaxy Z Fold 7 and its predecessor, it falls short of what many would consider ideal for a screen of this magnitude.

Samsung uses a dual-cell battery configuration to optimize internal space, but it seems the focus remains on maintaining a slim and elegant profile rather than battery life that lasts for several days. You will most likely have enough battery for a full day of normal use, but if you are an intensive user who takes advantage of the widescreen display for games or video, you may have to carry the charger around more often than you would like.

This new Galaxy Z Wide Fold is, above all, an experimental device. Samsung is closely watching Apple's moves. If the concept of a foldable iPhone with a tablet interface doesn't convince the public, this new Samsung model may suffer the same fate as other less successful projects in the past. It's a bet on device convergence that tries to prove that the future is not just about folding your phone in half, but about transforming the way you interact with information on the go.

It remains to be seen whether the marginal improvements in terms of hardware and the new format will be attractive enough to convince you to trade in your current smartphone for this new wide design concept.

For now, the Galaxy Z Wide Fold remains a few months away from its official presentation. New leaks should reveal more details about the device before the expected announcement of Samsung's next generation of foldable phones.

by mundophone


DIGITAL LIFE


Your Android can be hacked in less than three minutes

If you were to lose your Android smartphone, whether by accident or theft, you might take comfort in the fact that it is locked down so that it cannot be accessed, at least. Unless, that is, you are one of the estimated 875 million people using a phone that includes any of a number of MediaTek chips. Security researchers uncovered a vulnerability that allowed them to recover the security PIN number and the root keys that are there to protect encrypted storage, all before the device was fully booted. All of which took less than 60 seconds. While the Android smartphone was switched off.

Billions of devices worldwide are under an unprecedented security threat due to a critical flaw discovered in several MediaTek processors. If you have an Android smartphone, there is a 25% chance that your device is vulnerable to an attack that allows them to extract your PIN, passwords, and even banking data in less than 180 seconds. This vulnerability, identified as CVE 2026-20435, affects approximately 875 million devices, including popular models such as the Nothing CMF Phone 1.

The scenario described by researchers at Ledger's Donjon Hacker Lab sounds like something out of a science fiction movie, but it's a frightening technical reality. The flaw allows an attacker with physical access to your phone to bypass all biometric security barriers. This means that even if you use a complex fingerprint or the most advanced facial recognition on the market, a hacker can ignore these defenses if your processor is on the list of affected models.

The gravity of the situation increases when we realize that the attack can be executed even if the smartphone is turned off and locked. The process occurs the moment the device is turned on while connected via USB to a malicious device. In just over a minute, the attacker can obtain the root keys that protect all the encrypted content on your phone.

A critical vulnerability in the MediaTek Dimensity 7300 chipset allows a physical attacker to extract device PINs, decrypt on-device storage, and steal cryptocurrency wallet seed phrases in approximately 45 seconds, raising serious alarms for the roughly 25% of Android users whose devices rely on the affected chip.

The vulnerability uncovered by Ledger’s Donjon security research team resides in the Boot ROM of the MediaTek Dimensity 7300 (also known as MT6878) chip the very first code that executes when the device powers on, running at the highest possible hardware privilege level (EL3) before Android ever loads.

🚨 @DonjonLedger has struck again discovering a MediaTek vulnerability potentially impacting millions of Android phones. Another reminder that smartphones aren’t built for security. Even when powered off, user data – including pins & seeds – can be extracted in under a minute— Charles Guillemet (@P3b7_) March 11, 2026

Because Boot ROM is permanently hard-coded into the processor’s silicon, the core hardware flaw cannot be eliminated through software patches.

Ledger’s researchers exploited this weakness using Electromagnetic Fault Injection (EMFI), a technique that delivers precisely timed electromagnetic pulses to the chip during boot-up to corrupt its execution flow.

By connecting to the device over USB and repeatedly triggering boot cycles while injecting faults, attackers can bypass all security layers and achieve arbitrary code execution at the chip’s highest privilege level without ever launching the Android operating system.

The real danger behind losing the master key...When a computer hacker manages to "unwrap" the master key from your device, your privacy no longer exists. With access to these keys, all your files—from personal photos to private messages and work documents—can be read in plain text through processing on a supercomputer.

Even more serious is the fact that this vulnerability allows the system to accept any fingerprint or face as valid for unlocking. If you save cryptocurrency wallet recovery phrases or access codes in note-taking applications, you should know that they are completely exposed. Your phone ceases to be a secure vault and becomes an open book for anyone who masters this technique.

List of processors at risk and the fragmentation problem...MediaTek has already reacted and released a fix for this flaw in January. However, the Android ecosystem faces a chronic problem: fragmentation. Because Google releases updates, but they need to be adapted by each manufacturer (such as Oppo, Realme, Vivo, or Xiaomi), many users still haven't received the necessary security reinforcement.

You should check if your smartphone uses one of the following processors from the MT6700, MT6800, or MT6900 series:

Specific models: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6813, MT6833, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6885, MT6886, MT6890, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT6990, MT6993.

MT8100 to MT8700 Series: MT8169, MT8186, MT8188, MT8370, MT8390, MT8676, MT8678, MT8696, MT8793, MT2737.

If your device's processor is on this list, the risk is real and immediate. The Nothing CMF Phone 1 served as proof of concept to demonstrate how simple and quick the hacking is, but hundreds of other mid-range models are in the same dangerous situation.

How can you protect your smartphone now...The only effective way to neutralize this threat is by installing the March 2026 security update. You should access your Android settings, look for the system updates section and check if there are any pending packages.

Do not ignore system notifications. As long as you do not install this security "patch," your PIN and bank details are just a USB cable away from being stolen. In a world where our financial and personal lives reside almost entirely in our pockets, keeping your software updated is not just a recommendation, it's an absolute necessity for your digital survival. Check today if your manufacturer has already released a fix for this serious MediaTek flaw.

mundophone

Sunday, March 15, 2026

 

DIGITAL LIFE


Three questions: On the future of AI and the mathematical and physical sciences

Curiosity-driven research has long sparked technological transformations. A century ago, curiosity about atoms led to quantum mechanics, and eventually the transistor at the heart of modern computing. Conversely, the steam engine was a practical breakthrough, but it took fundamental research in thermodynamics to fully harness its power.

Today, artificial intelligence and science find themselves at a similar inflection point. The current AI revolution has been fueled by decades of research in the mathematical and physical sciences (MPS), which provided the challenging problems, datasets, and insights that made modern AI possible. The 2024 Nobel Prizes in physics and chemistry, recognizing foundational AI methods rooted in physics and AI applications for protein design, made this connection impossible to miss.

In 2025, MIT hosted a Workshop on the Future of AI+MPS, funded by the National Science Foundation with support from the MIT School of Science and the MIT departments of Physics, Chemistry, and Mathematics. The workshop brought together leading AI and science researchers to chart how the MPS domains can best capitalize on—and contribute to—the future of AI. Now a white paper, with recommendations for funding agencies, institutions, and researchers, has been published in Machine Learning: Science and Technology. In this interview, Jesse Thaler, MIT professor of physics and chair of the workshop, describes key themes and how MIT is positioning itself to lead in AI and science.

Scientists in the mathematical and physical sciences have been strategizing about how AI can help shape their fields—and vice versa. Credit: Marisa LeFleur/MIT

What are the report's key themes regarding last year's gathering of leaders across the mathematical and physical sciences? Gathering so many researchers at the forefront of AI and science in one room was illuminating. Though the workshop participants came from five distinct scientific communities—astronomy, chemistry, materials science, mathematics, and physics—we found many similarities in how we are each engaging with AI. A real consensus emerged from our animated discussions: Coordinated investment in computing and data infrastructures, cross-disciplinary research techniques, and rigorous training can meaningfully advance both AI and science.

One of the central insights was that this has to be a two-way street. It's not just about using AI to do better science; science can also make AI better. Scientists excel at distilling insights from complex systems, including neural networks, by uncovering underlying principles and emergent behaviors. We call this the "science of AI," and it comes in three flavors: science driving AI, where scientific reasoning informs foundational AI approaches; science inspiring AI, where scientific challenges push the development of new algorithms; and science explaining AI, where scientific tools help illuminate how machine intelligence actually works.

In my own field of particle physics, for instance, researchers are developing real-time AI algorithms to handle the data deluge from collider experiments. This work has direct implications for discovering new physics, but the algorithms themselves turn out to be valuable well beyond our field. The workshop made clear that the science of AI should be a community priority—it has the potential to transform how we understand, develop, and control AI systems.

Of course, bridging science and AI requires people who can work across both worlds. Attendees consistently emphasized the need for "centaur scientists"—researchers with genuine interdisciplinary expertise. Supporting these polymaths at every career stage, from integrated undergraduate courses to interdisciplinary Ph.D. programs to joint faculty hires, emerged as essential.

How do MIT's AI and science efforts align with the workshop recommendations? The workshop framed its recommendations around three pillars: research, talent, and community. As director of the NSF Institute for Artificial Intelligence and Fundamental Interactions (IAIFI)—a collaborative AI and physics effort among MIT and Harvard, Northeastern, and Tufts universities—I've seen firsthand how effective this framework can be. Scaling this up to MIT, we can see where progress is being made and where opportunities lie.

On the research front, MIT is already enabling AI-and-science work in both directions. Even a quick scroll through MIT News shows how individual researchers across the School of Science are pursuing AI-driven projects, building a pipeline of knowledge and surfacing new opportunities. At the same time, collaborative efforts like IAIFI and the Accelerated AI Algorithms for Data-Driven Discovery (A3D3) Institute concentrate interdisciplinary energy for greater impact. The MIT Generative AI Impact Consortium is also supporting application-driven AI work at the university scale.

To foster early-career AI-and-science talent, several initiatives are training the next generation of centaur scientists. The MIT Schwarzman College of Computing's Common Ground for Computing Education program helps students become "bilingual" in computing and their home discipline. Interdisciplinary Ph.D. pathways are also gaining traction; IAIFI worked with the MIT Institute for Data, Systems, and Society to create one in physics, statistics, and data science, and about 10% of physics Ph.D. students now opt for it—a number that's likely to grow. Dedicated postdoctoral roles like the IAIFI Fellowship and Tayebati Fellowship give early-career researchers the freedom to pursue interdisciplinary work. Funding centaur scientists and giving them space to build connections across domains, universities, and career stages has been transformative.

Finally, community-building ties it all together. From focused workshops to large symposia, organizing interdisciplinary events signals that AI and science isn't siloed work—it's an emerging field. MIT has the talent and resources to make a significant impact, and hosting these gatherings at multiple scales helps establish that leadership.

What lessons can MIT draw about further advancing its AI and science efforts? The workshop crystallized something important: The institutions that lead in AI and science will be the ones that think systematically, not piecemeal. Resources are finite, so priorities matter. Workshop attendees were clear about what becomes possible when an institution coordinates hires, research, and training around a cohesive strategy.

MIT is well positioned to build on what's already underway with more structural initiatives—joint faculty lines across computing and scientific domains, expanded interdisciplinary degree pathways, and deliberate "science of AI" funding. We're already seeing moves in this direction; this year, the MIT Schwarzman College of Computing and the Department of Physics are conducting their first-ever joint faculty search, which is exciting to see.

The virtuous cycle of AI-and-science has the potential to be truly transformative—offering deeper insight into AI, accelerating scientific discovery, and producing robust tools for both. By developing an intentional strategy, MIT will be well positioned to lead in, and benefit from, the coming waves of AI.

Provided by Massachusetts Institute of Technology 


APPLE


Apple already decrees the likely fiasco of the foldable iPhone with a starting price of US$1,999

The Apple is preparing to launch its first foldable  smartphone for September 2026, marking the company’s entry into the segment dominated by rivals such as the Samsung and Google. The device, known internally as the iPhone Fold, is expected to be announced alongside the iPhone 18 line, including models Pro

Market analysts point out that the product emerges after years of speculation and internal testing, with a focus on durability and integration into the iOS ecosystem. Mass production is expected to begin in the second half of 2026, ensuring global availability shortly after the announcement.

Supply chain reports indicate that the iPhone Fold adopts a book-style design, opening horizontally to reveal a large internal screen, while maintaining compact functionality when closed. Essa approach aims to serve users who seek versatility without compromising the premium experience characteristic of the brand.

The iPhone Essa configuration adopts an aspect ratio close to 4:3, similar to the iPad mini, which makes it easy to adapt existing applications.

When closed, the device measures around 9.6 mm thick, with a 5.5-inch external screen for quick operations such as checking notifications or answering calls. The narrow 1.3mm bezel contributes to a high screen utilization rate, making the device more immersive compared to competitors.

The arrival of the first foldable iPhone is undoubtedly one of the most anticipated moments of the last decade in the world of technology. For years, we have heard rumors, seen patents, and speculated about how Apple would approach this format. However, there was one constant in all the conversations: the price would be astronomical. After all, we are talking about the brand that launched luxury headphones and a monitor stand for a thousand euros. But, against all expectations, the latest information points to a completely different scenario.

According to leaks circulating in the sector, the foldable iPhone could arrive in stores with a starting price of US$1,999. If this value seems familiar, it is because it is exactly the same launch price as the Samsung Galaxy Z Fold 7. This parity is, at the very least, strange for a company that usually charges a "prestige fee" on all its first-generation products.

The idea that Apple will launch its most innovative device ever at the same price as its biggest rival is almost hard to believe. Traditionally, the brand positions itself in a premium segment, often above the competition. However, it seems that Apple has learned valuable lessons from the launch of the Vision Pro. The mixed reality headset, despite being technologically impressive, faced difficulties in mass adoption due to its prohibitive price of $3,499.

By pricing the foldable iPhone at $1,999, Apple isn't just launching a product; it's declaring war on Samsung. If you had to choose between the South Korean brand's seventh-generation foldable or Apple's first and highly desired foldable for the same price, which would you choose? The answer seems obvious to most consumers, and that's exactly what Tim Cook is betting on.

The end of Apple's foldable pricing? Looking at the detailed pricing structure, the base model of the foldable iPhone should offer 256GB of storage. If you need more space, the capacity jumps should follow the brand's usual logic, with increments of $200. This means that the 512 GB version would cost around $2,199 and the 1 TB model would rise to $2,399.

Interestingly, these calculations put the iPhone in an extremely competitive position. To give you an idea, the 1 TB version of the Galaxy Z Fold 7 is slightly more expensive, hovering around $2,419. It's an almost unprecedented scenario: an Apple product that, specification for specification, could end up being cheaper or equivalent to Samsung's top-of-the-line model.

Another point that reinforces the veracity of this price is the internal comparison with the rest of the brand's smartphone line. Currently, the iPhone 17 Pro Max in its maximum 2 TB configuration already reaches the level of $1,999. By setting the foldable at this price, Apple creates a natural transition for users who are already accustomed to paying high prices for the "Pro Max" models, but who can now opt for a completely new format without spending more.

This decision may be a direct response to the success of the Galaxy Z TriFold, which sold out in minutes despite costing almost $3,000. Apple realized that there is a real demand for innovation in the physical format of devices and that users are willing to loosen their purse strings, as long as the product brings something new to the user experience.

You may be wondering how Apple manages to maintain this price without sacrificing the profit margin to which we are accustomed. The explanation may lie in the production chain and the strategic postponement of the launch. By waiting several years to enter this market, Apple benefits from components that are now cheaper to produce than they were three or four years ago. The flexible screen and complex hinges are no longer experimental technologies, but components with optimized manufacturing processes.

Still, you should view these prices with caution. Until the official announcement, everything can change. But one thing is certain: if the foldable iPhone really reaches that price, the smartphone market will never be the same again, and the competition will have to reinvent itself quickly to avoid losing its place in this new world of flexible screens.

by mundophone

DIGITAL LIFE AI tools malware campaign detected targeting programmers Kaspersky has identified a malware campaign targeting AI tools that us...