Error message

  • Notice: Undefined offset: 5 in user_node_load() (line 3604 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3604 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Undefined offset: 5 in user_node_load() (line 3605 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3605 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Undefined offset: 5 in user_node_load() (line 3606 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).
  • Notice: Trying to get property of non-object in user_node_load() (line 3606 of /home/ewg56ffgqu3p/public_html/modules/user/user.module).

News

AI’s invisible labor is tech’s biggest blind spot - Tuesday, August 19, 2025 - 02:51

Behind the polished responses of AI platforms lies a lesser-known truth: workers from emerging economies, such as Africa, Latin America, and Asia, were paid less than $2 per hour to sift through graphic and traumatic content to help train their safety systems. This labor practice has sparked global concern, lawsuits, and calls for ethical reform in the AI industry.

Artificial intelligence is the crown jewel of modern enterprise – a sector exceeding $500 billion, reshaping everything from banking to healthcare. However, the truth is that behind every chatbot, image generator, and recommendation engine are armies of human workers who perform tasks that AI can’t handle, including labeling data, filtering toxic content, and correcting machine errors.

Without them, the algorithms would collapse, and the irony is hard to miss. AI is at risk of becoming the digital frontier for labor malpractice and a new form of unethical conduct. If businesses and innovators don’t act, AI’s promise could unravel under the weight of its own contradictions.

The Invisible Labor Fueling AI’s Rise

It is tempting to believe that AI systems are self-sufficient, refining themselves through endless feedback loops of data and computation. The reality, however, is far more complex. AI systems don’t clean or train themselves. The scale of this hidden labor crisis is staggering. Major gig platforms employ millions to annotate data, correct model errors, and sift through violent or explicit content.

These gig workers are outsourced from countries in the Global South, such as Kenya, India, and the Philippines, who prop up the $8 billion industry that powers the AI revolution. These workers are often highly educated but take on these jobs because better opportunities are scarce. They sign up believing they will contribute to cutting-edge technology, only to find themselves trapped in digital piecework. Pay is low, mental health support is rare, and job security is virtually nonexistent.

Why haven’t businesses fixed this? Because it’s cheap and easy to ignore. However, it comes with growing risks. Consumers and regulators are already beginning to question the ethics of AI supply chains. The European Union’s AI Act and similar efforts globally are setting new expectations for transparency, fairness, and accountability. Companies that fail to address the human cost of AI could face reputational damage, regulatory fines, or worse – a collapse of trust in the systems they have built.

Web3 might be the overlooked fix AI desperately needs

The promise of Web3 – decentralization, transparency, and user empowerment - directly addresses many of the failings in AI’s hidden labor ecosystem. Yet these tools remain largely untapped by enterprise AI, which is clearly a missed opportunity.

Decentralized Autonomous Organizations (DAOs) offer a way to embed genuine transparency and fairness into AI’s supply chains. Unlike traditional gig platforms, where decisions about pay, task selection, or working conditions are made behind closed doors, DAOs make every decision transparent and visible.

Every vote cast, every rule change, and every payment to a contributor is stored on a public ledger, creating an auditable trail that cannot be altered after the fact. This means that anyone, from participants to external auditors, can trace who made the decisions on ‘what, when, and how’. Immutable payment records eliminate the disputes that plague opaque gig work, while public governance logs ensure that power isn’t concentrated in the hands of a few.

Real-world examples are beginning to show what’s possible. Some decentralized employment platforms enable independent workers to collectively manage their pay structures and benefits, with all transactions and decisions recorded on-chain for complete transparency.

Others apply similar principles to research and contributor projects, where rules around compensation and project selection are codified in smart contracts, leaving little room for hidden decisions or unfair practices.

These models exist and are effective, but the reality is that enterprise AI has shown little interest in adopting them so far.

The Limits and Urgency of Change

Many enterprise AI leaders cling to the idea that ethical supply chains are simply too expensive - an unfortunate cost that doesn’t fit the margins demanded by investors or customers. But this is a myth that Web3 technologies can finally dismantle.

Web3’s value isn’t limited to ethics; it offers efficiency gains that traditional systems struggle to match. Smart contracts automate payments and bonuses, reducing the need for large administrative teams and eliminating intermediaries that add cost without providing value. Immutable blockchain records mean payment disputes, task verifications, and contract enforcement happen with far less friction, saving time, legal costs, and operational headaches.

However, Web3 isn’t flawless. Decentralized systems can replicate biases if data or governance isn’t audited. Transparency alone doesn’t guarantee explainability in AI decisions. And DAOs risk elitism if influence skews toward a wealthy few.

Clearly, the real risk is in doing nothing. The companies that lead on ethical AI supply chains will not only avoid the coming backlash but also earn the trust of their customers, regulators, and employees. Those who continue to look the other way will eventually find that the cost of cleaning up the mess is far higher than the cost of reforming now.

Web3 offers the clearest path to cleaning up AI’s hidden mess. But the window for voluntary reform is closing fast. Enterprises can either lead this change or be dragged into it when the backlash hits.

The choice won’t stay theirs for long.

We've listed the best employee management software and the best HR software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

The AI Triple Threat: mitigating the dangers of AI adoption with identity security - Tuesday, August 19, 2025 - 03:35

A succession of recent high‑profile breaches has shown that the UK remains vulnerable to ever‑more advanced cyber threats. This exposure is intensifying as artificial intelligence becomes increasingly embedded in everyday business operations. AI tools have become essential for organizations seeking to deliver value and maintain competitiveness. Yet, its benefits also bring risks that far too many organizations have yet to fully mitigate.

CyberArk’s latest research identifies AI as a complex “triple threat”. It is being leveraged as an attack vector, utilized defensively, and—perhaps most worryingly—creating significant new security gaps. In light of this evolving threat landscape, organizations must position identity security at the heart of their AI strategies if they wish to build future resilience.

AI: Same threats, new problems

AI has raised the bar for traditional attack methods. Phishing, which remains the most common entry point for identity breaches, has evolved beyond poorly worded emails to sophisticated scams that use AI-generated deepfakes, cloned voices and authentic-looking messages.

Nearly 70% of UK organizations fell victim to successful phishing attacks last year, with more than a third reporting multiple incidents. This shows that even robust training and technical safeguards can be circumvented when attackers use AI to mimic trusted contacts and exploit human psychology.

It is no longer enough to assume that conventional perimeter defenses can stop such threats. Organizations must adapt by layering in stronger identity verification processes and building a culture where suspicious activity is flagged and investigated without hesitation.

Using AI in defense

While AI is strengthening attackers’ capabilities, it is also transforming how defenders operate. Nearly nine in ten UK organizations now use AI and large language models to monitor network behavior, identify emerging threats and automate repetitive tasks that previously consumed hours of manual effort. In many security operations centers, AI has become an essential force multiplier that allows small teams to handle a vast and growing workload.

Almost half of organizations expect AI to be the biggest driver of cybersecurity spending in the coming year. This reflects a growing recognition that human analysts alone cannot keep up with the scale and speed of modern attacks. However, AI-powered defense must be deployed responsibly.

Over-reliance without sufficient human oversight can lead to blind spots and false confidence. Security teams must ensure AI tools are trained on high-quality data, tested rigorously, and reviewed regularly to avoid drift or unexpected bias.

AI is broadening the scope of attacks

The third element of the triple threat is the rapid growth in machine identities and AI agents. As employees embrace new AI tools to boost productivity, the number of non-human accounts accessing critical data has surged, now outnumbering human users by a ratio of 100 to one.

Many of these machine identities have elevated privileges but operate with minimal governance. Weak credentials, shared secrets and inconsistent lifecycle management create opportunities for attackers to compromise systems with little resistance.

Shadow AI is compounding this challenge. Research indicates that over a third of employees admit to using unauthorized AI applications, often to automate tasks or generate content quickly. While the productivity gains are real, the security consequences are significant. Unapproved tools can process confidential data without proper safeguards, leaving organizations exposed to data leaks, regulatory non-compliance and reputational damage.

Addressing this risk

Addressing this risk requires more than technical controls alone. Organizations should establish clear policies on acceptable AI use, educate staff on the risks of bypassing security, and provide approved, secure alternatives that meet business needs without creating hidden vulnerabilities.

Positioning identity security at the heart of digital strategy Securing AI‑driven enterprises requires embedding identity security at every layer of an organization's digital strategy. That means ensuring real‑time visibility of all identities - human, machine or AI agent -applying least privilege consistently, and continuously monitoring for unusual access behavior that may signal a breach.

Forward‑facing organizations are already updating their access and identity management frameworks to meet AI’s distinct demands. This entails adopting just‑in‑time access for machine identities, monitoring privilege escalation, and treating all AI agents with the same scrutiny as human accounts.

AI offers tremendous value for organizations that embrace it responsibly, but without robust identity security, that value can swiftly become a liability. The businesses that thrive will be those recognizing that resilience isn’t optional- it’s the foundation for long‑term growth.

At a time where businesses and their adversaries are both empowered by AI, one principle stands firm: securing AI begins and ends with securing identity.

We list the best software asset management (SAM) tools.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

7 Easy Ways to Take Screenshots in Windows 11 - Tuesday, August 19, 2025 - 05:00
If you've just updated your laptop and are wondering how to take screenshots in Windows 11, we've got you covered.
Lenovo Legion Go S Is My New Favorite Way to Play Call of Duty Anywhere - Tuesday, August 19, 2025 - 06:00
With Battlefield 6 on its way, its time to take the fight on the road with my new gaming handheld, the Lenovo Legion Go S.
You Can Get This Asus TUF 32 4K Monitor at an All-New Low Price Right Now - Tuesday, August 19, 2025 - 06:14
Get this high-powered Asus monitor while it's 20% off and upgrade your gaming.
Best Samsung Phone of 2025 - Tuesday, August 19, 2025 - 06:30
From the Galaxy S25 to the Z Fold 7, here's which phone might be a good fit for you.
Watch Out for iPhone-Tracking Porch Pirates This Year: Here's What to Know - Tuesday, August 19, 2025 - 07:00
As Labor Day approaches and a new iPhone release looms, beware of thieves using this latest trick to nab iPhones right when they're delivered.
The path to European data sovereignty - Tuesday, August 19, 2025 - 03:47

Back in 2020, the European Parliament published a briefing paper which set out “growing concern that the citizens, businesses and Member States of the European Union (EU) are gradually losing control over their data, over their capacity for innovation, and over their ability to shape and enforce legislation in the digital environment.”

At the heart of the matter is the domination that the likes of Amazon, Microsoft and Google have established over the European cloud computing market. One of the effects of their success is that the region now faces significant challenges in ensuring data is subject to the laws and governance structures of the country or region in which it is collected, stored or processed.

For organizations based in the EU hosting their data with providers based elsewhere, this raises serious questions about who ultimately has jurisdiction over that data and whether it can be governed by foreign legal frameworks beyond their control.

Let’s also be clear - the market-leading hyperscalers offer efficiency, scale and a whole host of other compelling advantages. They are all highly innovative, trusted providers that have transformed how businesses operate and have enabled extraordinary digital progress at speed and scale.

Thousands of European organizations rely on – and will continue to rely on – these brands for good reason. At the same time, however, it’s also vital that organizations understand that where they store their data, and under whose jurisdiction it falls, carries implications far beyond IT.

Whether viewed through a political, economic, or operational lens, data sovereignty matters. In some scenarios, it can shape access rights, trigger regulatory obligations or even expose organizations to geopolitical risk.

For example, laws in one country could compel a cloud provider to share data stored in another, an issue that’s been flagged in relation to executive powers and national security mandates at the disposal of foreign governments.

So, how is the landscape changing? Firstly, there are a number of promising European cloud initiatives, including regulatory developments, sovereign cloud frameworks and consortium-based models designed to create local alternatives to the all-in-one hyperscaler stack. However, these solutions are not without their challenges, with cost, fragmentation, scalability and adoption hurdles potentially standing in the way of an effective regional system.

For many organizations, a full switch isn’t viable due to issues such as existing investment commitments, operational complexity and the simple absence of mature, like-for-like alternatives that can match the scale and capabilities of established providers.

The US hyperscalers are also getting in on the act. This time last year, for instance, AWS announced plans to invest €7.8 billion in the AWS European Sovereign Cloud, an initiative which the company says reinforces its “commitment to offer customers the most advanced set of sovereignty controls, privacy safeguards, and security features available in the cloud.”

How this plays out remains to be seen, but whatever route organizations favor in the pursuit of data sovereignty, access to choice and autonomy over where their data is stored is likely to grow in importance as time passes.

The role of intelligent data management

For European organizations in this position, and there are many, the good news is that they don’t need to wait for systemic changes in the cloud landscape to start regaining control. Data sovereignty can be addressed today through the implementation of modern, vendor-neutral data management technologies, which enable them to visualize their entire data landscape and apply consistent policies across disparate storage environments.

Armed with a unified view of their data across cloud and on-premises environments, organizations can then make informed choices about what data to store, where to store it and how best to safeguard it.

The obvious starting point is visibility because, without knowing what data exists, where it resides and how it moves, businesses are flying blind. This is particularly significant and challenging in contemporary multi-cloud and hybrid-cloud environments, where data can be extremely fragmented, often with little consistency or oversight.

But by establishing a clear picture of all data assets, classifying them based on sensitivity and business value and ensuring local copies of critical data are always available, IT management can also enforce policies that align with governance and regulatory requirements.

In the end, this is not just a technology and geography issue; it goes much deeper to cover everything from business resilience and compliance to control and, ultimately, customer trust. Europe’s digital future will depend not only on where its data lives, but on who can access it, govern it and protect it.

As the European Parliament data sovereignty briefing concludes, “Building a secure pan-European data framework and adopting new standards and practices to provide trustworthy and controllable digital products and services would ensure a safer digital environment.”

We list the best cloud storage.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Why Britain's £187M skills investment needs to work for everyone, not just students - Tuesday, August 19, 2025 - 04:27

The UK government just announced £187 million for the TechFirst initiative to embed digital and AI skills in classrooms and communities. It's a smart move that will pay dividends in the long run. But here's the problem — we can't wait 10 years for today's secondary school students to join the workforce.

Right now, businesses are grappling with AI disruption and cybersecurity threats that demand immediate attention. Our research shows that while 44% of professionals report their organizations have invested in AI, many employees lack adequate skills to use these tools effectively. That's a recipe for wasted investment and security vulnerabilities.

The gap becomes particularly dangerous when you consider how threats are evolving. Many office workers don't know that advanced AI can impersonate anyone's voice, putting companies at serious risk from social engineering attacks. At this point, nearly one in three security and IT professionals have no documented strategy for managing generative AI risks.

Starting in schools is absolutely the right foundation. But we need to build on that foundation with programs that reach everyone from recent graduates to senior executives.

Getting current workers up to speed

The TechFirst initiative includes four strands — youth, graduate, expert and local. That's encouraging because it acknowledges we need different approaches for different groups. But the real test will be how well these programs connect with each other and with what businesses are already doing.

Companies can't outsource digital skills development to government programs alone. They need to take ownership of getting their teams ready for an AI-powered workplace. This means practical training that goes further than basic digital literacy, addressing real security risks and productivity opportunities.

It’s far too common for organizations to rush to implement new AI tools without considering whether their people know how to use them appropriately. The result is often disappointing returns on technology investments and unnecessary exposure to cyber threats.

Making education relevant to work

To make an impact, skills programs must connect classroom learning with actual business challenges. Students need exposure to real workplace scenarios, not just theoretical concepts. This means tech companies should work directly with schools and universities to provide hands-on experience opportunities.

However, we also need to consider regional differences. Digital literacy levels vary significantly across the UK, and a program that works in London might not be right for smaller cities or rural areas. The TechFirst initiative's local strand recognizes this reality, but success will depend on strong partnerships between government, education and local businesses.

Industry networks can help tailor programs to what companies actually need. Too often, educational qualifications don't match up with workplace requirements because there's no ongoing dialogue between educators and employers.

Cultivating skills that last

As AI automates routine tasks, workers need to develop capabilities that complement rather than compete with technology. Critical thinking, complex problem-solving and the ability to work alongside AI systems are emerging as more valuable than the ability to memorize technical procedures.

This requires a different approach to professional development. Instead of occasional training courses, organizations need cultures where people continuously update their skills. The pace of change in AI and cybersecurity means what you learned six months ago might already be outdated.

Different people learn differently, too. Some thrive with online courses, others need hands-on projects or peer mentoring. The best upskilling programs offer multiple ways to build competence and confidence with new technologies.

Connecting the dots

Fragmentation is arguably the biggest risk with any large-scale skills initiative. Government programs, university courses and corporate training often operate independently, creating gaps and duplicated effort. Coordination between all these moving parts is a critical part of ensuring success.

This means sharing resources, aligning what gets taught and ensuring smooth transitions between different types of learning. A student who develops AI skills through TechYouth should be able to build on that foundation in university and then in their first job without starting from scratch each time.

Companies should also recognize their role in making these connections work. Hiring managers need to understand what different qualifications actually mean. Training departments should build on skills people already have rather than ignoring previous learning.

What success looks like

Getting this right means creating learning pathways that support people throughout their careers, not just at specific points. It means businesses that can confidently deploy new technologies because their teams understand both the opportunities and the risks.

Most importantly, it means a UK workforce that can compete globally in an increasingly digital economy. The £187 million TechFirst investment provides a strong starting point, but realizing its potential requires recognizing that skills development doesn't end when people leave school.

We need programs that work for 16-year-olds choosing their A-levels, 25-year-olds starting their careers, 40-year-olds managing teams and 55-year-olds adapting to new technologies. Only by addressing skills gaps across all these groups can we build the digitally resilient economy Britain needs.

Taking a comprehensive approach — supporting both future and current workers — can multiply the impact of this investment. With cyber threats evolving daily and AI capabilities advancing monthly, connecting these efforts across all age groups delivers much stronger returns.

We list the best online learning platforms.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Ready to Escape Google? Start by Changing Your Phone's Default Search Engine - Tuesday, August 19, 2025 - 07:15
One way to avoid seeing Google's AI Overviews is to stop using Google.
Starting Off the School Year: How to Use AI to Manage Your Time as a Student - Tuesday, August 19, 2025 - 07:52
Speaking with real students about common time management pitfalls, I came up with this list of artificial intelligence tools that can help you find your balance.
This Portable AC Cools Your Tent, but Don't Get Fooled by the Marketing | Prove It video - Tuesday, August 19, 2025 - 08:00
The EcoFlow Wave 3 promises rapid cooling for your tent and speedy solar charging so you can keep your camp setup cold even in the heat of the summer. Does it live up to the hype? We put it to the test in this episode of Prove It.
Best VPN for Gaming in 2025: Lower Ping and Protect Against DDoS Attacks - Tuesday, August 19, 2025 - 08:00
Level up your play with one of CNET’s top gaming VPN picks -- reducing ping, bypassing throttling and adding an extra layer of protection.
Google Gemini Is Looking to Get More Personal, Will Apple Delay the iPhone 18? | Tech Today video - Tuesday, August 19, 2025 - 08:00
Supply chain experts say Apple may delay the launch of the iPhone 18 next year to make room for a possible iPhone Fold, Google Gemini is going to start remembering more of your conversations (unless you opt out), and the Trump administration is reportedly considering buying a stake in US chipmaker Intel.
How to Keep These 3 Settings From Killing Your iPhone Battery - Tuesday, August 19, 2025 - 08:00
Do you want cool widgets or do you want your iPhone to last longer?
Ethernet vs. Wi-Fi: One Crushed the Speed Test, the Other Barely Kept Up - Tuesday, August 19, 2025 - 08:00
I put Wi-Fi and Ethernet to the test in my home, and the results were eye-opening.
Anker Says Its New Portable Power Station Can Charge to 100% in Just 49 Minutes - Tuesday, August 19, 2025 - 09:00
Anker's new C1000 Gen 2 is smaller and lighter than its previous model while still being able to recharge to full in 49 minutes. Here's what else is new.
ROG Xbox Ally: Specs, Price Leaks and How It Compares to Steam Deck - Tuesday, August 19, 2025 - 10:34
Can Microsoft and Asus stop Valve?
Apple Won't Have to Provide an Encryption Backdoor in the UK, Says US Official - Tuesday, August 19, 2025 - 10:50
Director of National Intelligence Tulsi Gabbard says the US and UK worked out a deal.
I'm Enjoying Sony's New Inzone H9 II Gaming Headset but Its Price Is Startling - Tuesday, August 19, 2025 - 12:00
Sony's released a new line of PC gaming accessories, including a new flagship headset and its first gaming keyboard, mouse and in-ear monitor headphones.

Pages