logo
Meta's new ‘Llamacon' event is all about open-source AI

Meta's new ‘Llamacon' event is all about open-source AI

Yahoo19-02-2025

Meta announced on Tuesday that it is launching a new developers conference in April, dubbed 'Llamacon,' that will focus on 'open source AI developments.'
The event is scheduled to take place April 29, 2025 and comes on the heels of 'the unprecedented growth and momentum of our open-source Llama collection of models and tools,' in an announcement post. The company has not shared any additional details, such as where the conference will take place or how much ticket prices will run, but the company promises to share more details 'in the coming weeks.'
Meta also revealed that its Meta Connect event, geared towards virtual and mixed reality developers and content creators, is returning in the fall with 'the latest and greatest in Meta Horizon updates.' The conference will September 17-18, 2025, and promises to 'peel back the curtain on tomorrow's tech.'
As with the rest of the American AI industry, Meta plans to spend freely on the technology in 2025. At the end of January, Meta founder and CEO Mark Zuckerberg announced that the company will invest between $60 billion and $65 billion on AI infrastructure this year, including a new data center that will consume a full gigawatt of energy — the equivalent energy output of two nuclear power stations.
'This will be a defining year for AI,' Zuckerberg wrote. 'In 2025, I expect Meta AI will be the leading assistant serving more than one billion people, Llama 4 will become the leading state of the art model and we'll build an AI engineer that will start contributing increasing amounts of code to our R&D efforts.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'

time42 minutes ago

Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'

WASHINGTON -- WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'

How to tell if a login alert is real or a scam
How to tell if a login alert is real or a scam

Fox News

time44 minutes ago

  • Fox News

How to tell if a login alert is real or a scam

Online scams thrive on the urgency and fear of their victims. If you've ever been a victim of a scam, you'd know that bad actors often try to rush you into taking action by creating a sense of fear. A scammer may call you impersonating a government agency and claim your Social Security number has been linked to drug trafficking. A phishing email might ask you to update your tax details or claim you've won a lottery or a free product, all to get you to click a malicious link. A more effective tactic scammers use is sending fake login alerts. These are warnings that someone has logged into your account, prompting you to take immediate action. This method works well because legitimate services like Google, Apple, Netflix and Facebook also send these types of notifications when someone, including you, logs in from a new device. It can be tricky to tell the difference. As Robert from Danville asks, "I constantly get in my spam junk folder emails saying 'someone has logged into your account.' Is this spam? legitimate? concerning? How do I know? How to avoid wasting time checking? How do I check?" Thanks for writing to us, Robert. I completely understand how tricky it can be to figure out whether these messages are legitimate or just another scam attempt. Let's break down what these urgent warnings usually look like and go over a few ways you can stay safe. Scammers often pose as login alerts from Google, Apple, Meta or even your bank, complete with official-looking logos, because fear is effective. But not every alert is a scam. In many cases, these notifications are legitimate and can help you detect unauthorized access to your accounts. Let's focus on the scam side first. Login alert scams have been around for a while. Early reports date back to 2021, and the trend has persisted since then. In 2022, reports surfaced that scammers were impersonating Meta and sending phishing emails to users. One such email used a clean layout with minimal text. It avoided the usual scare tactics and stuck to a simple message. But that is not always the case. A common red flag in phishing attempts is the tendency to overload the email with unnecessary details. These messages often include cluttered formatting, excessive explanations and an increasing number of typos or design errors. One phishing email simply gets to the point: Someone tried to Iog into Your Account, User lD A user just logged into your Facebook account from a new device Samsung S21. We are sending you this email to verify it's really you. Thanks, The Facebook Team What's concerning now is that poor grammar is no longer a reliable sign of a scam. Thanks to AI, even those with limited English skills can write emails that sound polished and professional. As a result, many phishing messages today read just like legitimate emails from trusted companies. Receiving a phishing email is not the real issue. The real problem starts when you click on it. Most of these emails contain links that lead to fake login pages, designed to look exactly like platforms such as Facebook, Google or your bank. If you enter your credentials there, they go directly to the scammer. In some cases, simply clicking the link can trigger a malware download, especially if your browser is outdated or your device lacks proper security. Once inside, attackers can steal personal information, monitor your activity or take control of your accounts. Real login notifications do exist; they're just much less scary. A genuine alert from Google, Apple or Microsoft will come from an official address (for example, no-reply@ or security@ and use consistent branding. The tone is factual and helpful. For instance, a legit Google security alert might say, "We detected a login from a new sign-in to your Google Account on a Pixel 6 Pro device. If this was you, you don't need to do anything. If not, we'll help you secure your account." It may include a "Check activity" button, but that link always redirects to a address, and it won't prompt you to reenter your password via the email link. Similarly, Apple notes it will never ask for passwords or verification codes via email. 1. Don't click any links or attachments and use strong antivirus software: Instead, manually log in to the real site (or open the official app) by typing the URL or using a bookmarked link. This guarantees you're not walking into a scammer's trap. The FTC recommends this: if you have an account with that company, contact them via the website or phone number you know is real, not the info in the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Remove your data from the internet: Scammers are able to send you targeted messages because your data, like your email address or phone number, is already out there. This often happens due to past data breaches and shady data brokers. A data removal service can help clean up your digital trail by removing your information from public databases and people-search sites. It's not a quick fix, but over time, it reduces how easily scammers can find and target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 3. Check your account activity: Go to your account's security or sign-in page. Services like Gmail, iCloud or your bank let you review recent logins and devices. If you see nothing unusual, you're safe. If you do find a strange login, follow the site's process (usually changing your password and logging out all devices). Even if you don't find anything odd, change your password as a precaution. Do it through the official site or app, not the email. Consider using a password manager to generate and store complex passwords. 4. Enable two-factor authentication (2FA): This is your best backup. With 2FA enabled, even if someone has your password, they can't gain access without your phone and an additional second factor. Both Google and Apple make 2FA easy and say it "makes it harder for scammers" to hijack your account. 5. Report suspicious emails: If you receive a suspicious email claiming to be from a specific organization, report it to that organization's official support or security team so they can take appropriate action. You shouldn't have to vet every sketchy email. In fact, your email's spam filters catch most phishing attempts for you. Keep them enabled, and make sure your software is up to date so that malicious sites and attachments are blocked. Still, the most powerful filter is your own awareness. You're definitely not alone in this. People receive these spammy login scares every day. By keeping a cool head and following the steps above, you're already ahead of the game. Have you ever encountered a suspicious email or phishing attempt? How did you handle it, and what did you learn from the experience? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

American presidents have long used autopens. Just ask Trump.
American presidents have long used autopens. Just ask Trump.

Politico

timean hour ago

  • Politico

American presidents have long used autopens. Just ask Trump.

Donald Trump has repeatedly slammed Joe Biden's use of an autopen during his presidency, going so far as to center its usage in a broad investigation Trump announced Wednesday into his predecessor. But politicians on both sides of the aisle are deeply familiar with the tool. The autopen — also referred to as the robot pen — replicates an individual's signature using a writing utensil, rather than a scanned and printed version of it. The tool, which resembles a small printer with a long arm that allows users to attach a pen to the center, has a long history of use in American politics. The device was first patented in 1803, according to the Shapell Manuscript Foundation, an independent research organization that collects original manuscripts and historical documents. Iterations of the autopen have been used by presidents as far back as Thomas Jefferson, who wrote that 'I could not, now therefore, live without' the device he used to duplicate letters. 'The Autopen has long been a tool for the world's most influential leaders, allowing them to more effectively apply their time and attention to important issues without compromising the impact of personalized correspondence,' according to The Autopen Co., which sells the machines. U.S. leaders on both sides of the aisle have used the autopen for decades — and have faced criticism for their use of the tool. During Lyndon Johnson's administration, the autopen was featured in The National Enquirer for an article headlined 'One of the Best Kept Secrets in Washington: The Robot That Sits In For The President.' Even Trump himself has said he used autopens, but 'only for very unimportant papers.' 'We may use it, as an example, to send some young person a letter because it's nice,' Trump said in March, according to The Associated Press. 'You know, we get thousands and thousands of letters, letters of support for young people, from people that aren't feeling well, etcetera. But to sign pardons and all of the things that he signed with an autopen is disgraceful.' In 2004, George W. Bush's secretary of Defense, Donald Rumsfeld, faced criticism from some veterans for using an autopen to sign condolence letters to families of troops killed in the Iraq War. In 2011, Barack Obama used an autopen to sign a Patriot Act extension — becoming the first known, apparent use of the tool by a president for legislation — and used it subsequently in his administration. The move resulted in Republicans questioning the constitutionality of Obama's decision, though Bush's Office of Legal Counsel, which is part of the Department of Justice, had already concluded the use of autopens was constitutional. 'The President need not personally perform the physical act of affixing his signature to a bill he approves and decides to sign in order for the bill to become law,' the office's 2005 ruling stated. 'Rather, the President may sign a bill within the meaning of Article I, Section 7 by directing a subordinate to affix the President's signature to such a bill, for example by autopen.' There is no specific law governing a president's use of an autopen. But the ruling from the Department of Justice hasn't stopped Trump from accusing Biden and his team of illegally using the tool, alleging that Biden's team used an autopen to sign documents without Biden's permission or knowledge. Trump has also claimed that Biden's round of pardons — including 'preemptive pardons' of Jan. 6 investigators, his son Hunter Biden and Anthony Fauci — were illegal and are 'void' and 'vacant.' However, most legal scholars are in agreement that pardons cannot be overturned once granted. In 1869, a federal court ruled, 'The law undoubtedly is, that when a pardon is complete, there is no power to revoke it, any more than there is power to revoke any other completed act.' Biden has denied the claims that any decision was ever made or issued in his name without his approval or knowledge. Trump and other Republican accusers have provided no evidence that aides used an autopen without the former president's approval. 'Let me be clear: I made the decisions during my presidency,' Biden told POLITICO in a statement. 'I made the decisions about the pardons, executive orders, legislation, and proclamations. Any suggestion that I didn't is ridiculous and false. This is nothing more than a distraction by Donald Trump and Congressional Republicans who are working to push disastrous legislation that would cut essential programs like Medicaid and raise costs on American families, all to pay for tax breaks for the ultra-wealthy and big corporations.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store