The prospect of artificial intelligences (AIs) that can get away with fooling humans is leading experts to question whether it's time to regulate telemarketing phone calls from robots.
Wendell Wallach, author of A Dangerous Master and senior adviser to The Hastings Center, says new laws may be needed as the lines between humans and simulations of human activity get blurred.
"If you're basically intelligent you still should be able to deduce when you're talking with a bot," he says. "But perhaps that space is closing more quickly than we would think. I wonder whether we're going to need to signal that it's not a human."
Wallach believes it could still be some time before an AI could phone you up and dupe you into thinking it was a person for long. "There'll be all kinds of inversions of grammar," he says.
Tens of thousands of words have been written about the "WannaCry" ransomware attack on computers and computer servers all across the world. Below is a summary of what occurred. Fortunately for Computing Center cients, no one got hit. We are very diligent about keeping Microsoft and other operating systems fully patched and up-to-date. Additionally, the perimeter security systems that we deploy kept the expoit from even reaching many networks.
But this is not over. The next exploit could be far more difficult to detect and recover from. We continue to caution all our clients on the basic three steps that every business and organization must take to protect its computer systems:
- Be absolutely vigilant in securing your systems, including running all patches and updates promptly.
- A reliable backup and disaster recovery solution remains the best and most effective defense against ransomware attacks. If you are hit with ransomware, restoring your system and data from fresh backups is the only way to recover without paying the ransom.
- And finally, people should be cautious when opening emails and attachments (particularly executable files and zipped files). Employees can greatly benefit from IT security awareness training on how to recognize threats and suspicious activity.