Tech
EU’s AI Code of Practice Delayed as Tech Giants Push for Simplicity
The European Commission’s long-anticipated voluntary Code of Practice on General-Purpose Artificial Intelligence (GPAI) has been delayed but is now expected to be published before August, according to officials. The code is intended to support compliance with the EU’s AI Act, particularly for developers of large language models and other general-purpose AI systems.
The delay comes amid growing pressure from major U.S. technology companies — including Amazon, IBM, Google, Meta, Microsoft, and OpenAI — who have urged the Commission to streamline the code. Minutes from a meeting held last week between the companies and Werner Stengg, a senior official in the cabinet of EU Tech Commissioner Henna Virkkunen, reveal calls for the code to avoid excessive complexity and administrative burden.
“The code should be as simple as possible, so as to avoid redundant reporting and unnecessary administrative burden,” the companies reportedly told Stengg. They also emphasized that the final version should offer a realistic timeline for implementation and remain within the scope of the AI Act.
Initially scheduled for release on May 2, the final draft was postponed after the Commission received requests for extended consultation periods. Over the past year, the Commission has held a series of workshops and plenary sessions involving around 1,000 participants, including industry experts and civil society representatives. Thirteen experts were formally appointed to contribute to the drafting process.
Previous iterations of the text have drawn criticism from multiple stakeholders. European publishers raised concerns over copyright implications, while tech companies warned that the proposals could hinder innovation. Cultural figures have also weighed in: ABBA’s Björn Ulvaeus, president of the International Confederation of Societies of Authors and Composers (CISAC), recently cautioned lawmakers against yielding to Big Tech pressures that could erode creative rights.
Despite the delays, the Commission has stated it still aims to publish the revised code before summer. The timing is significant, as the rules related to general-purpose AI tools will enter into force on August 2. Meanwhile, the broader AI Act — which classifies AI systems according to risk levels — is being phased in and will become fully enforceable by 2027.
The forthcoming code is seen as an important step in shaping responsible AI development within the EU, even as debates continue over how best to balance innovation, regulation, and rights protection.
Tech
European Journalist Suspended for Using AI-Generated Fake Quotes
Journalist Peter Vandermeersch, who worked with Dutch publisher Mediahuis, reportedly fabricated expert quotes into 15 of 53 articles written for them. Vandermeersch, a senior European journalist, has been temporarily suspended after an investigation revealed he published quotes generated by artificial intelligence (AI) as if they were genuine.
The Dutch newspaper NRC reported that Vandermeersch inserted “dozens” of fabricated quotes into articles published on two Mediahuis websites. Some of the statements attributed to experts could not be found in the sources Vandermeersch cited, including news articles and scientific studies. Seven of the individuals whose quotes were used confirmed they had never made the statements attributed to them.
Vandermeersch served as chief executive of Mediahuis Ireland from 2022 to 2025 before taking on a fellowship role in journalism and society at Mediahuis. He confirmed his temporary suspension on his blog, saying he relied on AI tools including ChatGPT, Perplexity, and Google’s Notebook to summarise lengthy reports, trusting the outputs to be accurate.
Instead, the systems generated fabricated quotes that “put words into people’s mouths,” Vandermeersch admitted. “That was not just careless, it was wrong,” he wrote. “It is particularly painful that I made precisely the mistake I have repeatedly warned colleagues about: these language models are so good that they produce irresistible quotes you are tempted to use as an author.”
Vandermeersch said he first discovered the issue last year, when two of his articles were found to contain AI-generated quotes. He did not correct the errors at the time, which allowed the problem to persist. “When I realised this a few months ago, my enthusiasm diminished, as did my use of AI,” he said.
He explained that he continues to use AI for tasks such as translation, generating ideas, creating headlines, and developing story angles, but with “far less naive trust than before.” Mediahuis has yet to announce any further disciplinary measures or whether it will retract the affected articles.
The case has raised fresh concerns about the use of AI in journalism, highlighting the risks of relying on automated systems to generate content without verification. Industry experts warn that while AI tools can be valuable for research and drafting, uncritical use can lead to serious ethical breaches, including the misrepresentation of sources.
Mediahuis said it takes the matter seriously and is reviewing editorial procedures to prevent similar incidents in the future. The scandal has sparked a wider discussion in European media about the ethical boundaries of AI in reporting, particularly when it comes to quoting real people.
The incident underscores the growing tension between technological convenience and journalistic integrity, as newsrooms across Europe experiment with AI tools while balancing accuracy and accountability.
Tech
Cyberattacks Intensify as Iran Conflict Spills Into Digital Domain
State-linked and hacktivist groups have claimed a series of cyberattacks against the United States and Israel since the war with Iran began, marking a significant escalation in the digital dimension of the conflict.
One of the most notable incidents involved Stryker, which confirmed on March 11 that a cyberattack had disrupted its global network. According to reports, employees encountered the logo of Handala, an إيران-linked hacking group, on login pages across the company’s systems. The breach reportedly targeted the firm’s Microsoft-based infrastructure, though the full extent of the disruption remains unclear.
Handala has claimed responsibility for the attack, stating it exploited cloud management systems to remotely wipe large numbers of devices worldwide. The group said the operation was carried out in retaliation for a missile strike in Iran. Independent verification of these claims is still pending.
Cybersecurity analysts say the attack is part of a broader campaign by groups linked to Iran’s security apparatus. According to findings from CloudSek, organisations associated with the Islamic Revolutionary Guard Corps have targeted US critical infrastructure. These include CyberAv3ngers, APT33 and APT55, which are accused of attempting to infiltrate industrial systems such as power grids and water facilities.
Experts say some of these groups use simple methods, including default passwords, to access systems, while others deploy malware aimed at disrupting operations or gathering intelligence. Additional networks linked to Iran’s Ministry of Intelligence have also been active, targeting telecommunications, energy companies and government organisations.
At the same time, the United States and Israel are conducting their own cyber operations. General Dan Caine said US Cyber Command played a key role early in the conflict, disrupting Iranian communications and sensor networks. Defence Secretary Pete Hegseth confirmed that artificial intelligence and cyber tools are being used alongside conventional military operations.
Israeli intelligence has also reportedly relied on hacked data to support military planning, highlighting the growing role of cyber capabilities in modern warfare.
Hacktivist activity has surged as well. More than 60 groups formed a loose coalition known as the Cyber Islamic Resistance, coordinating attacks through online platforms. These groups have claimed hundreds of operations, including attempts to disrupt Israeli infrastructure and private sector systems. Analysts warn that such actors are often less restrained and may pose risks to civilian networks.
The conflict has also drawn in groups from outside the region, including actors based in Iraq, Russia and other parts of the Middle East. Some have targeted government websites and transport infrastructure, while pro-Israeli groups have carried out retaliatory attacks against Iranian entities.
Security experts say the growing scale and coordination of cyber operations reflect a shift in how modern conflicts are fought, with digital attacks now running parallel to military action on the ground.
Tech
Study Finds Hormone-Disrupting Chemicals in Popular Headphones Sold Across Europe
-
Entertainment2 years agoMeta Acquires Tilda Swinton VR Doc ‘Impulse: Playing With Reality’
-
Business2 years agoSaudi Arabia’s Model for Sustainable Aviation Practices
-
Business2 years agoRecent Developments in Small Business Taxes
-
Home Improvement1 year agoEffective Drain Cleaning: A Key to a Healthy Plumbing System
-
Politics2 years agoWho was Ebrahim Raisi and his status in Iranian Politics?
-
Business2 years agoCarrectly: Revolutionizing Car Care in Chicago
-
Sports2 years agoKeely Hodgkinson Wins Britain’s First Athletics Gold at Paris Olympics in 800m
-
Business2 years agoSaudi Arabia: Foreign Direct Investment Rises by 5.6% in Q1
