Download AI-102 free real questions with study guide

killexams.com Designing and Implementing a Microsoft Azure AI Solution Certification exam guides are setup by IT specialists. We have a group of AI-102 guaranteed individuals that cooperate to make a tremendous assortment of AI-102 actual test inquiries for the possibility to simply go through and finish their test. Simply retaining the AI-102 PDF Download that we give is adequate to finish the AI-102 test at the absolute first endeavor.

AI-102 Designing and Implementing a Microsoft Azure AI Solution action | http://babelouedstory.com/

AI-102 action - Designing and Implementing a Microsoft Azure AI Solution Updated: 2024

Pass4sure AI-102 practice exams with Real Questions
Exam Code: AI-102 Designing and Implementing a Microsoft Azure AI Solution action January 2024 by Killexams.com team

AI-102 Designing and Implementing a Microsoft Azure AI Solution

Exam Number: AI-102

Exam Name : Designing and Implementing a Microsoft Azure AI Solution



Exam TOPICS



The Cisco Customer Success Manager (DTCSM) v2.1 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.



Candidates for the Azure AI Engineer Associate certification should have subject matter expertise building, managing, and deploying AI solutions that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework.



Their responsibilities include participating in all phases of AI solutions development—from requirements definition and design to development, deployment, maintenance, performance tuning, and monitoring.



Azure AI Engineers work with solution architects to translate their vision and with data scientists, data engineers, IoT specialists, and AI developers to build complete end-to-end AI solutions.



Candidates for this certification should be proficient in C# or Python and should be able to use REST-based APIs and SDKs to build computer vision, natural language processing, knowledge mining, and conversational AI solutions on Azure.



They should also understand the components that make up the Azure AI portfolio and the available data storage options. Plus, candidates need to understand and be able to apply responsible AI principle.



Plan and manage an Azure Cognitive Services solution

Implement Computer Vision solutions

Implement natural language processing solutions

Implement knowledge mining solutions

Implement conversational AI solutions



Plan and Manage an Azure Cognitive Services Solution (15-20%)

Select the appropriate Cognitive Services resource

 select the appropriate cognitive service for a vision solution

 select the appropriate cognitive service for a language analysis solution

 select the appropriate cognitive Service for a decision support solution

 select the appropriate cognitive service for a speech solution

Plan and configure security for a Cognitive Services solution

 manage Cognitive Services account keys

 manage authentication for a resource

 secure Cognitive Services by using Azure Virtual Network

 plan for a solution that meets responsible AI principles

Create a Cognitive Services resource

 create a Cognitive Services resource

 configure diagnostic logging for a Cognitive Services resource

 manage Cognitive Services costs

 monitor a cognitive service

 implement a privacy policy in Cognitive Services

Plan and implement Cognitive Services containers

 identify when to deploy to a container

 containerize Cognitive Services (including Computer Vision API, Face API, Text Analytics,
Speech, Form Recognizer)

 deploy Cognitive Services Containers in Microsoft Azure

Implement Computer Vision Solutions (20-25%)

Analyze images by using the Computer Vision API

 retrieve image descriptions and tags by using the Computer Vision API

 identify landmarks and celebrities by using the Computer Vision API

 detect brands in images by using the Computer Vision API

 moderate content in images by using the Computer Vision API

 generate thumbnails by using the Computer Vision API

Extract text from images

 extract text from images or PDFs by using the Computer Vision service

 extract information using pre-built models in Form Recognizer

 build and optimize a custom model for Form Recognizer

Extract facial information from images

 detect faces in an image by using the Face API

 recognize faces in an image by using the Face API

 analyze facial attributes by using the Face API

 match similar faces by using the Face API

Implement image classification by using the Custom Vision service

 label images by using the Computer Vision Portal

 train a custom image classification model in the Custom Vision Portal

 train a custom image classification model by using the SDK

 manage model iterations

 evaluate classification model metrics

 publish a trained iteration of a model

 export a model in an appropriate format for a specific target

 consume a classification model from a client application

 deploy image classification custom models to containers

Implement an object detection solution by using the Custom Vision service

 label images with bounding boxes by using the Computer Vision Portal

 train a custom object detection model by using the Custom Vision Portal

 train a custom object detection model by using the SDK

 manage model iterations

 evaluate object detection model metrics

 publish a trained iteration of a model

 consume an object detection model from a client application

 deploy custom object detection models to containers

Analyze video by using Video Indexer

 process a video

 extract insights from a video

 moderate content in a video

 customize the Brands model used by Video Indexer

 customize the Language model used by Video Indexer by using the Custom Speech service

 customize the Person model used by Video Indexer

 extract insights from a live stream of video data

Implement Natural Language Processing Solutions (20-25%)

Analyze text by using the Text Analytics service

 retrieve and process key phrases

 retrieve and process entity information (people, places, urls, etc.)

 retrieve and process sentiment

 detect the language used in text

Manage speech by using the Speech service

 implement text-to-speech

 customize text-to-speech

 implement speech-to-text

 Improve speech-to-text accuracy

 Improve text-to-speech accuracy

 implement intent recognition

Translate language

 translate text by using the Translator service

 translate speech-to-speech by using the Speech service

 translate speech-to-text by using the Speech service

Build an initial language model by using Language Understanding Service (LUIS)

 create intents and entities based on a schema, and then add utterances

 create complex hierarchical entities

o use this instead of roles

 train and deploy a model

Iterate on and optimize a language model by using LUIS

 implement phrase lists

 implement a model as a feature (i.e. prebuilt entities)

 manage punctuation and diacritics

 implement active learning

 monitor and correct data imbalances

 implement patterns

Manage a LUIS model

 manage collaborators

 manage versioning

 publish a model through the portal or in a container

 export a LUIS package

 deploy a LUIS package to a container

 integrate Bot Framework (LUDown) to run outside of the LUIS portal

Implement Knowledge Mining Solutions (15-20%)

Implement a Cognitive Search solution

 create data sources

 define an index

 create and run an indexer

 query an index

 configure an index to support autocomplete and autosuggest

 boost results based on relevance

 implement synonyms

Implement an enrichment pipeline

 attach a Cognitive Services account to a skillset

 select and include built-in skills for documents

 implement custom skills and include them in a skillset

Implement a knowledge store

 define file projections

 define object projections

 define table projections

 query projections

Manage a Cognitive Search solution

 provision Cognitive Search

 configure security for Cognitive Search

 configure scalability for Cognitive Search

Manage indexing

 manage re-indexing

 rebuild indexes

 schedule indexing

 monitor indexing

 implement incremental indexing

 manage concurrency

 push data to an index

 troubleshoot indexing for a pipeline

Implement Conversational AI Solutions (15-20%)

Create a knowledge base by using QnA Maker

 create a QnA Maker service

 create a knowledge base

 import a knowledge base

 train and test a knowledge base

 publish a knowledge base

 create a multi-turn conversation

 add alternate phrasing

 add chit-chat to a knowledge base

 export a knowledge base

 add active learning to a knowledge base

 manage collaborators

Design and implement conversation flow

 design conversation logic for a bot

 create and evaluate *.chat file conversations by using the Bot Framework Emulator

 choose an appropriate conversational model for a bot, including activity handlers and dialogs

Create a bot by using the Bot Framework SDK

 use the Bot Framework SDK to create a bot from a template

 implement activity handlers and dialogs

 use Turn Context

 test a bot using the Bot Framework Emulator

 deploy a bot to Azure

Create a bot by using the Bot Framework Composer

 implement dialogs

 maintain state

 implement logging for a bot conversation

 implement prompts for user input

 troubleshoot a conversational bot

 test a bot

 publish a bot

 add language generation for a response

 design and implement adaptive cards

Integrate Cognitive Services into a bot

 integrate a QnA Maker service

 integrate a LUIS service

 integrate a Speech service

 integrate Dispatch for multiple language models

 manage keys in app settings file
Designing and Implementing a Microsoft Azure AI Solution
Microsoft Implementing action

Other Microsoft exams

MOFF-EN Microsoft Operations Framework Foundation
62-193 Technology Literacy for Educators
AZ-400 Microsoft Azure DevOps Solutions
DP-100 Designing and Implementing a Data Science Solution on Azure
MD-100 Windows 10
MD-101 Managing Modern Desktops
MS-100 Microsoft 365 Identity and Services
MS-101 Microsoft 365 Mobility and Security
MB-210 Microsoft Dynamics 365 for Sales
MB-230 Microsoft Dynamics 365 for Customer Service
MB-240 Microsoft Dynamics 365 for Field Service
MB-310 Microsoft Dynamics 365 for Finance and Operations, Financials (2023)
MB-320 Microsoft Dynamics 365 for Finance and Operations, Manufacturing
MS-900 Microsoft Dynamics 365 Fundamentals
MB-220 Microsoft Dynamics 365 for Marketing
MB-300 Microsoft Dynamics 365 - Core Finance and Operations
MB-330 Microsoft Dynamics 365 for Finance and Operations, Supply Chain Management
AZ-500 Microsoft Azure Security Technologies 2023
MS-500 Microsoft 365 Security Administration
AZ-204 Developing Solutions for Microsoft Azure
MS-700 Managing Microsoft Teams
AZ-120 Planning and Administering Microsoft Azure for SAP Workloads
AZ-220 Microsoft Azure IoT Developer
MB-700 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
AZ-104 Microsoft Azure Administrator 2023
AZ-303 Microsoft Azure Architect Technologies
AZ-304 Microsoft Azure Architect Design
DA-100 Analyzing Data with Microsoft Power BI
DP-300 Administering Relational Databases on Microsoft Azure
DP-900 Microsoft Azure Data Fundamentals
MS-203 Microsoft 365 Messaging
MS-600 Building Applications and Solutions with Microsoft 365 Core Services
PL-100 Microsoft Power Platform App Maker
PL-200 Microsoft Power Platform Functional Consultant
PL-400 Microsoft Power Platform Developer
AI-900 Microsoft Azure AI Fundamentals
MB-500 Microsoft Dynamics 365: Finance and Operations Apps Developer
SC-400 Microsoft Information Protection Administrator
MB-920 Microsoft Dynamics 365 Fundamentals Finance and Operations Apps (ERP)
MB-800 Microsoft Dynamics 365 Business Central Functional Consultant
PL-600 Microsoft Power Platform Solution Architect
AZ-600 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub
SC-300 Microsoft Identity and Access Administrator
SC-200 Microsoft Security Operations Analyst
DP-203 Data Engineering on Microsoft Azure
MB-910 Microsoft Dynamics 365 Fundamentals (CRM)
AI-102 Designing and Implementing a Microsoft Azure AI Solution
AZ-140 Configuring and Operating Windows Virtual Desktop on Microsoft Azure
MB-340 Microsoft Dynamics 365 Commerce Functional Consultant
MS-740 Troubleshooting Microsoft Teams
SC-900 Microsoft Security, Compliance, and Identity Fundamentals
AZ-800 Administering Windows Server Hybrid Core Infrastructure
AZ-801 Configuring Windows Server Hybrid Advanced Services
AZ-700 Designing and Implementing Microsoft Azure Networking Solutions
AZ-305 Designing Microsoft Azure Infrastructure Solutions
AZ-900 Microsoft Azure Fundamentals
PL-300 Microsoft Power BI Data Analyst
PL-900 Microsoft Power Platform Fundamentals
MS-720 Microsoft Teams Voice Engineer
DP-500 Designing and Implementing Enterprise-Scale Analytics Solutions Using Microsoft Azure and Microsoft Power BI
PL-500 Microsoft Power Automate RPA Developer
SC-100 Microsoft Cybersecurity Architect
MO-201 Microsoft Excel Expert (Excel and Excel 2019)
MO-100 Microsoft Word (Word and Word 2019)
MS-220 Troubleshooting Microsoft Exchange Online
DP-420 Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB
MB-335 Microsoft Dynamics 365 Supply Chain Management Functional Consultant Expert
MB-260 Microsoft Dynamics 365 Customer Insights (Data) Specialist
AZ-720 Troubleshooting Microsoft Azure Connectivity
700-821 Cisco IoT Essentials for System Engineers (IOTSE)
MS-721 Microsoft 365 Certified: Collaboration Communications Systems Engineer Associate
MD-102 Microsoft 365 Certified: Endpoint Administrator Associate
MS-102 Microsoft 365 Administrator

We are doing great struggle to provide you actual AI-102 dumps and practice test. Each AI-102 question on killexams.com has been Checked and updated by our team. All the online AI-102 dumps are tested, validated and updated according to the AI-102 course.
AI-102 Dumps
AI-102 Braindumps
AI-102 Real Questions
AI-102 Practice Test
AI-102 dumps free
Microsoft
AI-102
Designing and Implementing a Microsoft Azure AI Solution
http://killexams.com/pass4sure/exam-detail/AI-102
Question: 116
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 117
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 118
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 119
You build a custom Form Recognizer model.
You receive sample files to use for training the model as shown in the following table.
Which three files can you use to train the model? Each correct answer presents a complete solution. (Choose three.)
NOTE: Each correct selection is worth one point.
A. File1
B. File2
C. File3
D. File4
E. File5
F. File6
Answer: ACF
Explanation:
Input requirements
Form Recognizer works on input documents that meet these requirements:
Format must be JPG, PNG, PDF (text or scanned), or TIFF. Text-embedded PDFs are best because theres no
possibility of error in character extraction and location. File size must be less than 50 MB.
Reference: https://docs.microsoft.com/en-us/azure/cognitive-services/form-recognizer/overview
Question: 120
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 121
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 122
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 123
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 124
DRAG DROP
You plan to use a Language Understanding application named app1 that is deployed to a container.
App1 was developed by using a Language Understanding authoring resource named lu1.
App1 has the versions shown in the following table.
You need to create a container that uses the latest deployable version of app1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose three.)
Answer:
Explanation:
Step 1: Export the model using the Export for containers (GZIP) option.
Export versioned apps package from LUIS portal
The versioned apps package is available from the Versions list page.
Question: 125
DRAG DROP
You plan to use containerized versions of the Anomaly Detector API on local devices for testing and in on-premises
datacenters.
You need to ensure that the containerized deployments meet the following requirements:
Prevent billing and API information from being stored in the command-line histories of the devices that run the
container.
Control access to the container images by using Azure role-based access control (Azure RBAC).
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order. (Choose four.)
NOTE: More than one order of answer choices is correct. You will receive credit for any of the correct orders you
select.
Answer:
Explanation:
Step 1: Pull the Anomaly Detector container image.
Step 2: Create a custom Dockerfile
Step 3: Push the image to an Azure container registry.
To push an image to an Azure Container registry, you must first have an image.
Step 4: Distribute the docker run script
Use the docker run command to run the containers.
Reference: https://docs.microsoft.com/en-us/azure/container-registry/container-registry-intro
For More exams visit https://killexams.com/vendors-exam-list
Kill your test at First Attempt....Guaranteed!

Microsoft Implementing action - BingNews https://killexams.com/pass4sure/exam-detail/AI-102 Search results Microsoft Implementing action - BingNews https://killexams.com/pass4sure/exam-detail/AI-102 https://killexams.com/exam_list/Microsoft Microsoft takes action against malware distribution through 'App Installer'

Microsoft has disabled its ms-app installer URI scheme (App Installer) after observing that the threat actors are using the tool to distribute malware. As per the blog from Microsoft Threat Intelligence, the tech giant has been observing threat actors since mid-November 2023.

Microsoft stated. "Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilising the ms-appinstaller URI scheme (App Installer) to distribute malware.”

It further added, "In addition to ensuring that customers are protected from observed attacker activity, Microsoft investigated the use of App Installer in these attacks. In response to this activity, Microsoft has disabled the ms-appinstaller protocol handler by default.”

The tech giant notes the observed threat actor’s activity which was involved in the exploitation of the current implementation of the ms-appinstaller protocol handler. This misuse serves as an access vector for malware, which potentially results in the distribution of ransomware.

Furthermore, it observed the multiple cybercriminals who are selling a malware kit as a service that abuses the MSIX file format and ms-appinstaller protocol handler.

The company stated, "These threat actors distribute signed malicious MSIX application packages using websites accessed through malicious advertisements for legitimate popular software. A second vector of phishing through Microsoft Teams is also in use by Storm-1674.”

According to Microsoft, hackers have likely chosen the ms-appinstaller protocol handler vector because "it can bypass mechanisms designed to help keep users safe from malware, such as Microsoft Defender SmartScreen and built-in browser warnings for downloads of executable file formats".In mid-November of this year, Microsoft Threat Intelligence discovered many cyber gangs employing App Installer as a conduit for ransomware operations.

As mentioned in the report, the observed activity includes spoofing legitimate applications, luring users into installing malicious MSIX packages posing as legitimate applications, and evading detections on the initial installation files.

ALSO READ: Here is how you can buy an iPhone 15 below Rs 70,000 | Limited period offer you must not miss

Latest Technology News

Sat, 30 Dec 2023 22:51:00 -0600 en text/html https://www.indiatvnews.com/technology/news/microsoft-takes-action-against-malware-distribution-through-app-installer-2023-12-31-909745
Microsoft to implement new feature to reinstall Windows without deleting any files or apps

Microsoft Corp. is reportedly integrating a built-in recovery system that will allow users to reinstall the Windows 11 operating system through Windows Update without losing their existing files.

The new feature was first spotted by Windows Latest today, and will be made available through a new setting called “Fix problems using Windows Update.”

According to that report, the new setting can be found by heading to Settings > System > Recovery on Windows 11. It’s currently only available to members of the Windows Canary Channel, who get to test new features before they become more widely available.

Microsoft first mentioned the upcoming feature around six months ago in a blog post, but its implementation in public Windows 11 test versions suggests it’s almost ready for prime time.

The feature could be particularly useful for users that want to reinstall, update, or repair the OS without losing files, documents, pictures, videos or apps. “This operation reinstalls the OS that you have and will not remove any files, settings, or apps,” the company said in the original blog post. “Devices may need to complete in progress updates prior to this process taking effect.”

Previously, the best way to reinstall or recover Windows 11 without losing any files was to use the “In-Place Upgrade” option within Microsoft’s Media Creation Tool. While both this and the newer option allow users to do the same thing, the In-Place Upgrade is known to be quite a lengthy process. With the new feature, the process of recovering Windows will be rapidly accelerated.

Windows Latest says the new features could be integrated within the Windows 11 Moment 5 Update that’s expected to roll out in February 2024. That will be a cumulative update that’s typically rolled out through the Windows Update feature, as previous “Moment” updates were.

It’s also expected to be the last minor update for Windows 11 ahead of a much bigger one that’s slated to take place in 2025. Other new capabilities to come in the minor update include new quality-of-life features such as better support for digital pens, and the ability to make certain apps uninstallable, such as Microsoft Edge and Cortana.

Image: Windows Latest

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU

Tue, 26 Dec 2023 09:55:00 -0600 en-US text/html https://siliconangle.com/2023/12/26/microsoft-implement-new-feature-reinstall-windows-without-deleting-files-apps/
Microsoft and Cerence Drive Innovation with New AI Car Experience No result found, try new keyword!Cerence Inc (NASDAQ: CRNC) has announced a collaboration with Microsoft Corp (NASDAQ: MSFT) to enhance in-vehicle experiences by integrating Cerence's automotive technology with Microsoft Azure AI ... Wed, 03 Jan 2024 05:42:54 -0600 en-us text/html https://www.msn.com/ Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks

Microsoft on Thursday said it's once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat actors to distribute malware.

"The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution," the Microsoft Threat Intelligence team said.

It further noted that several cybercriminals are offering a malware kit for sale as a service that leverages the MSIX file format and ms-appinstaller protocol handler. The changes have gone into effect in App Installer version 1.21.3421.0 or higher.

The attacks take the form of signed malicious MSIX application packages that are distributed via Microsoft Teams or malicious advertisements for legitimate popular software on search engines like Google.

At least four different financially motivated hacking groups have been observed taking advantage of the App Installer service since mid-November 2023, using it as an entry point for follow-on human-operated ransomware activity -

  • Storm-0569, an initial access broker which propagates BATLOADER through search engine optimization (SEO) poisoning with sites spoofing Zoom, Tableau, TeamViewer, and AnyDesk, and uses the malware to deliver Cobalt Strike and handoff the access to Storm-0506 for Black Basta ransomware deployment.
  • Storm-1113, an initial access broker that uses bogus MSIX installers masquerading as Zoom to distribute EugenLoader (aka FakeBat), which acts as a conduit for a variety of stealer malware and remote access trojans.
  • Sangria Tempest (aka Carbon Spider and FIN7), which uses Storm-1113's EugenLoader to drop Carbanak that, in turn, delivers an implant called Gracewire. Alternatively, the group has relied on Google ads to lure users into downloading malicious MSIX application packages from rogue landing pages to distribute POWERTRASH, which is then used to load NetSupport RAT and Gracewire.
  • Storm-1674, an initial access broker that sends harmless-looking landing pages masquerading as Microsoft OneDrive and SharePoint through Teams messages using the TeamsPhisher tool, urging recipients to open PDF files that, when clicked, prompts them to update their Adobe Acrobat Reader to obtain a malicious MSIX installer that contains SectopRAT or DarkGate payloads.

Microsoft described Storm-1113 as an entity that also dabbles in "as-a-service," providing malicious installers and landing page frameworks mimicking well-known software to other threat actors such as Sangria Tempest and Storm-1674.

In October 2023, Elastic Security Labs detailed another campaign in which spurious MSIX Windows app package files for Google Chrome, Microsoft Edge, Brave, Grammarly, and Cisco Webex were used to distribute a malware loader dubbed GHOSTPULSE.

This is not the first time Microsoft has disabled the MSIX ms-appinstaller protocol handler in Windows. In February 2022, the tech giant took the same step to prevent threat actors from weaponizing it to deliver Emotet, TrickBot, and Bazaloader.

"Threat actors have likely chosen the ms-appinstaller protocol handler vector because it can bypass mechanisms designed to help keep users safe from malware, such as Microsoft Defender SmartScreen and built-in browser warnings for downloads of executable file formats," Microsoft said.


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
Thu, 28 Dec 2023 15:16:00 -0600 en text/html https://thehackernews.com/2023/12/microsoft-disables-msix-app-installer.html
Ads Arriving to Amazon Prime Video; New York Times Sues OpenAI & Microsoft; Google Settles $5bn Lawsuit

On today’s ExchangeWire digest: Ads Arriving to Amazon Prime Video; New York Times Sues OpenAI & Microsoft; Google Settles $5bn Lawsuit…

As we welcome in the New Year, changes are afoot. Last week, Amazon announced it will be introducing ads to its Prime Video service. Ads will be arriving soonest to users in the US and Canada from later this month, on 29th January. Users in the UK and Germany will see ads from 5th February. Throughout the year, Amazon plans to implement the change to Prime in France, Italy, Spain, Mexico, and Australia. To avoid seeing ads, UK customers will have to pay £2.99 per month. Meanwhile, German customers will have to pay €2.99 (£2.60), and US customers $2.99 (£2.35). 

Looking back to 2023, its final days saw some big legal action. The New York Times filed a lawsuit against OpenAI and Microsoft for copyright infringement, over the companies’ use of its content to train generative AI and large-language model systems. The New York Times claims that its content was given “particular emphasis”, and that OpenAI sought “to free-ride” on the publication’s large investment into its journalism by building products without permission or payment. The lawsuit calls on the companies to destroy any chatbot models and training data which use copyrighted material from the Times. It does not contain a monetary claim, but states that both parties should be held responsible for “billions of dollars in statutory and actual damages”. 

Unsurprisingly, Google’s legal battles also made headlines – this time for its agreement to settle a USD $5bn class-action privacy lawsuit filed in 2020, which alleged that it spied on “incognito” Chrome users. It claimed that Google continued to catalog details of users’ activity and send it back to its servers, despite private browsing mode being in use. When the suit was filed, it sought USD $5bn on behalf of users; now a final settlement agreement is expected by 24th February.  

New on ExchangeWire 

Predictions 2024: Open Web 

Predictions 2024: Economy 

MadTech Podcast: ExchangeWire's 2024 Predictions Special

New on PressBox 

Adelaide Releases Attention Leaderboard Showcasing Excellence in Media Quality 

Index Exchange & FreeWheel Announce Direct Integration for Efficient Streaming TV Buying

LoopMe Secures Two Patents for its AI-Powered Intelligent Marketplace 

Tue, 02 Jan 2024 18:00:00 -0600 Aimee Newell Tarín en-GB text/html https://www.exchangewire.com/blog/2024/01/03/ads-arriving-to-amazon-prime-video-new-york-times-sues-openai-microsoft-google-settles-5bn-lawsuit/
Implementing Microsoft Copilot securely

Mike Bellido at CSI Ltd explains how to make sure your data is not at risk when using Microsoft Copilot

The business community is understandably hyped with the launch of the long-awaited Microsoft Copilot.

Microsoft Copilot is a powerful AI-powered productivity tool that uses Large Language Models (LLMs) to help enhance creative and collaborative projects, whilst honing skills and focus. As the name infers, ‘Co-Pilot’ works alongside you in Microsoft 365 applications, including every favourite, Word, Excel, PowerPoint, and Outlook.

Microsoft’s new AI tool supports efficient project management by undertaking tasks such as drafting documents, summarising text, and finding information on the user’s behalf. It can perform tasks such as language translation and even ‘write’ creative content such as company updates or client facing blogs.   

Amongst all the excitement around its capabilities, there are important considerations around data protection. Onboarding any new AI resource requires a business to take precautions in protecting data from unauthorised access, use, or disclosure.  

It is therefore critical that businesses keep in mind what data is being used. Copilot will utilise Office 365 data, extracting from sources such as SharePoint, OneDrive, and your email. With potentially sensitive, private, or confidential data spread across your O365 suite, there’s a costly risk that even with the best intentions AI could expose protected information. 

So, how does your business ensure that its data remains secure while taking advantage of this innovative technology? 

Understanding how sensitive your data is 

If you are to safely protect your data, you first need to identify what kind of data you have and how sensitive it is. This is where Azure Information Protection becomes key in understanding your types of data. AIP is a cloud-based solution that helps you discover, classify, label, and protect your data across different locations and devices. 

By using AIP, a business can ensure that its data is properly labelled and protected, helping to comply with various regulations such as HIPAA (Health Insurance Portability and Accountability Act, 1996) and GDPR (General Data Protection Regulation). 

As a key example, a business could use AIP to classify customer data as “confidential” and then apply a set of security controls to that data set, such as requiring users to enter a password before they can access it. These technical controls create a kind of security baseline, controlling the ebb and flow of your O365 data and supporting confidentiality, privacy and all-round guarding data that requires strict levels of compliance. 

Manage the risks with a data governance policy 

Data governance is a set of policies and processes that ensure the effective and efficient use of information in your organisation. It covers aspects such as data quality, data security, data privacy, and data lifecycle.

By implementing data governance in your organisation, you can manage the risks associated with data, such as breaches, leaks, errors, or misuse. It also helps you optimise the value of data by enabling better decision-making, innovation, and performance.

For example, administrators can create a data governance policy that requires all employees to use Microsoft Copilot in a secure fashion. This policy could include requirements such as using strong passwords, not sharing Copilot-generated content with unauthorised users, and deleting Copilot-generated content when it is no longer needed. 

Enforce DLP rules and actions 

Data loss prevention (DLP) is a technology that helps you prevent your data from being leaked, stolen, or misused by unauthorised parties. DLP can help you detect and block sensitive data from leaving your organisation, alert users, or administrators when a potential data breach occurs, and enforce remediation actions such as deleting, quarantining, or encrypting the data.

For example, you can create a DLP rule that prevents users from exporting confidential customer data from Microsoft Copilot. This rule would be triggered if a user tries to export a document that is classified as “confidential” to a USB drive or email. 

Detect data threats by monitoring anomalies 

Monitoring and auditing your data activities is crucial to data security. It helps you detect and respond to any anomalies or threats that may compromise your data, investigate, and resolve any data breaches or incidents that may occur, and identify and address any gaps or weaknesses in your data security posture.

For example, you can enable logging and auditing for your Microsoft 365 environment to track all user activity in Copilot. This will allow you to see who is using Copilot, what they are doing with it, and when they are doing it. 

By following these steps, you can ensure that your data is secure while using Microsoft Copilot. With a little planning and effort, you can harness the power of AI without compromising your data security. 

Bringing AI capabilities into your business 

Microsoft Copilot is an exciting, powerful use of artificial intelligence that can meaningfully and beneficially Improve an organisation’s ability to collaborate, create and manage its O365 workflows.  Copilot is not just a content engine, it is a smart assistant that can help employees regain better focus and tackle time-sensitive, demanding workloads.

However, as with any AI tool or resource, it is important to take precautions in protecting business data so your business isn’t exposed or people using sensitive data inappropriately.   


Mike Bellido is a Solution Architect at CSI Ltd  

Main image courtesy of iStockPhoto.com

Wed, 06 Dec 2023 10:00:00 -0600 En text/html https://www.business-reporter.co.uk/ai--automation/implementing-microsoft-copilot-securely
Best ERP Systems Of 2024

To determine the best ERP systems in the market, Forbes Advisor considered over 20 of the leading providers in the space and narrowed it down to the top 16 providers. These were then analyzed across five primary categories for a total of 25 different metrics. We then weighted each of the overarching categories based on what matters most to businesses.

Here are the metrics we used to evaluate the top ERP systems:

Pricing – 10%

The best ERP systems are affordable and offer a high value for the price. So we considered pricing, as well as contract lengths, scalability, and the availability of free trials and money-back guarantees.

Key Features – 30%

We placed an emphasis on the key features that matter most to businesses seeking an ERP system. For example, we considered whether the systems are cloud-based for accessibility, on-premises ERP, warehouse management, accounting, real-time updates, reporting and analytics and software integrations for maximum flexibility.

Unique Features – 20%

In addition to the key, must-have features, we also considered the unique offerings of each of the best ERP systems. This includes factors such as automation, budgeting and financial management, customer relationship management (CRM) features, forecasting, human resources functionalities, supply chain management and features designed to meet the needs of manufacturers.

Third-party Ratings and Reviews – 10%

To get a deeper understanding of what real users think of the systems, we looked at third-party user reviews and ratings. This metric considers not only the average ratings across numerous rating sites but also the number of reviews each provider has to ensure the rating is reflective of a broad user base.

Expert Score – 30%

Our final metric considers our own first-hand experience and expertise. This factors in qualitative metrics such as value for the price, ease of use, support quality and popularity.

Sat, 16 Dec 2023 00:45:00 -0600 Anna Baluch en-US text/html https://www.forbes.com/advisor/business/software/best-erp-systems/
United in action for persons with disabilities

Persons with disabilities represent a diverse and valuable segment of our global community. The International Day of Persons with Disabilities, observed annually on December 3rd since 1992, serves as a reminder to acknowledge, support, and empower individuals facing various disabilities. The theme for 2023, ‘United in action to rescue and achieve the SDGs for, with, and by persons with disabilities’ underscores the collective effort required to address the challenges faced by this community.

The campaign emphasises five key elements of the Sustainable Development Goals (SDGs), including gender equality, climate action, development spending, peace agendas, and multilateralism. It recognises that the intersection of gender and disability creates unique vulnerabilities, particularly affecting the rights and dignities of women and girls with disabilities. In Pakistan, statistics indicate that approximately 65 per cent of people with disabilities are women and girls, emphasising the need for targeted efforts to address their specific challenges.

To foster inclusivity, it is essential to formulate and implement action plans that promote the active participation of persons with disabilities in all aspects of society. This includes not only addressing physical accessibility but also combatting the deeply rooted stigma and discrimination they often face. By fostering understanding, breaking down barriers, and championing equal opportunities, we can create a more inclusive world where everyone, regardless of ability, can contribute and thrive. You! takes a look…

A lifelong commitment

Women and girls with disabilities confront a multitude of challenges arising from the intersectionality of gender and disability. The compounding effects of double discrimination often result in their marginalisation and exclusion from various aspects of life.

Access to quality education is a persistent hurdle, with barriers such as inaccessible facilities and societal attitudes that underestimate their potential. Additionally, healthcare disparities, limited employment opportunities, and economic disempowerment contribute to the challenges they face. Inaccessible environments, both physical and societal, restrict their mobility and independence. Highlighting how girls and women with disabilities face a multitude of challenges, Dr Khalid Niazi, rehabilitation specialist (Rtd.) Mayo Hospital, shared his experience of seeing girls who never went to school because of mobility disabilities. He also stressed an issue that particularly plagues young girls and women from rural areas and that was related to fodder cutting machines. These high-speed electric machines lead to many accidents where girls as young as 12 years of age come to his centre where their hands and arms have been chopped off. As they are putting the fodder through the machine, if they get distracted even for a second, their limbs are stolen by the machine.

Sometimes, just a few days before marriage, girls are brought to him for replacing a missing finger. Perhaps a finger sounds like a small thing but Dr Suhail Niazi, Assistant Professor of Orthopaedics and Consultant Orthopaedic & Trauma Surgeon, King Edward Medical University/Mayo Hospital, recalled a patient who was in depression and almost suicidal. Another young girl whose arm had to be amputated to save her life from cancer and her first question was, what is the point of living without an arm? Thankfully, with psychological counselling, she is doing well now. Dr Khalid shared that one working lady insisted that she wanted to be able to wear heels with her assisted device and they imported a suitable one from the USA. This brought forth the important issue of self-image as well as the society’s role in fighting stigma and discrimination associated with disabilities.

In most parts of the world there are deep and persistent negative stereotypes and prejudices against persons with certain conditions and differences. These attitudes themselves also shape who is considered to be a person with a disability in each society as well as have contributed to a negative image of persons with disabilities. Sometimes, fighting fear and stigma associated with disabilities can prove life-saving. I remember parents of a child who chose to keep the child’s leg despite the fact it meant cancer spreading. There are patients of diabetes who do not stay vigilant about foot injuries and delay treatment that goes from amputation of a toe to a leg and then even worse.

Different prosthetic technology means varying costs and the need is determined based on both physical and mental health aspects. Dr Suhail pointed out that there is a difference between ‘want’ and ‘need’, and as professionals, we guide our patients through the process. If you are dealing with a child with growing limb sizes, or an adult with long life expectancy, or a student who is expected to be physically active or someone who needs to drive or climb stairs; all these factors help determine the need. Then a specialist needs to know the right material and bio-mechanics to make the most suitable prosthetics. A lot of science is involved in the process. Therefore, it is important that to Improve quality of life, patients seek professional support and in a timely manner. Dr Suhail pointed out that providing prosthetics is not a one-time intervention. It is a life-long commitment because it requires maintenance after some time. The difference made, he says, is important; it is the difference between dependence and independence. An independent person can acquire education and can work to support his or her family financially. He or she can play an active role in becoming a productive member of society.

Journeys of resilience

Millions of people worldwide face challenges due to disabilities. Although some disabilities pose greater hurdles than others, there are remarkable stories of individuals who refused to let their limitations hinder their achievements. Hearing about extraordinary accomplishments despite obstacles is always inspiring.

Mahzaib , a 7-year-old young girl from Gujranwala, who survived Ewing’s sarcoma, a type of cancer of bones/soft-tissues, and recently completed treatment. In her case, this meant amputation of one of her legs. I asked her mother, “How do you explain to a little girl about amputation?” She replied, “We told her that you’ve got a bad leg and we’re going to supply you a good one.” Thanks to that ‘good’ leg, Mahzaib is able to go to school now and her mother proudly told me that Mahzaib actively participates in different school competitions. I saw Mahzaib’s video where she was learning to take her first steps, learning to walk again, using her new leg. Then a few months later, I also saw her video where she was talking to an audience as a young aspiring vlogger. Her journey represents the huge impact of collaborations in transforming lives. This was made possible because of a partnership between Shaukat Khanum Memorial Cancer Hospital and Research Centre, a cancer hospital, and HOPE (House of Orthotic & Prosthetic Excellence) which is a rehabilitation centre.

Mahzaib’s experience inspired me to visit the people who are helping to run the incredible institution. Dr Khalid mentioned to me four main types of disabilities: mental disabilities, visual impairments, hearing or speech losses, and physical mobility related disabilities. Our discussion focused on mobility related issues caused by defects at birth, accidents, or diseases such as polio, cancer, diabetes, etc. He explained to me that orthotics are devices that provide support while prosthetics are artificial replacement of limbs, for example, legs, arms, fingers, eyes, etc. Since opening of his institution in 1989, he has introduced the latest artificial limb technology in Pakistan, and importantly, in an equitable manner, where the very deserving is provided these services free of charge. In addition to technology, his institution has developed an in-house workshop and is training professionals in the field.

Bushra Awan, a play therapist, shared with me her experience of working with children who have lost their limbs after amputation. She said that art can help these children to heal and can help children to express their inner feelings. She showed me a child’s drawing where a dark image was used to depict self which indicated deteriorating sense of control. This is understandable in a hospital setting where children are told what they can and cannot do. Collage work can help restore that sense of control when children can choose to form a whole from bits and pieces that do not mean much in isolation. Each artwork produced by these children is significant because it embodies unique stories of healing.

Another girl, 16-year-old Taqwa Muhammad, who was recently appointed as UNICEF’s first ever Youth Advocate in Pakistan. Despite a spinal condition that requires wheelchair assistance, Taqwa became a karate champion.

She says that stigma in the society motivates her to focus on staying positive and overcoming challenges. Through her story, Taqwa hopes to show the world that physical limitation cannot limit the true potential of an individual and she is committed to help build a more inclusive and equitable Pakistan.

Rehabilitation for a brighter tomorrow

Aligned with the World Health Organization’s estimate that 15 per cent of the global population comprises persons with disabilities, a similar situation exists in Pakistan as well. This group, often the most economically disadvantaged, is among those severely affected by social, attitudinal, and physical barriers and discrimination. To address this challenging scenario, efforts are directed towards vocational education, rehabilitation, the provision of assistive technology, the development of life skills, and early training. These initiatives aim to empower persons with disabilities, enabling them to become active contributors to the developmental process.

Often, rehabilitation is not even included in medical cover, especially in our country. It is considered enough that a person is alive. What if the person is just confined to his house and is unable to reach his or her full potential? What if the person loses his or her will to live? This is where the role of rehabilitation comes and we should acknowledge it. The employers, the government, and the insurance companies, everyone should realise that saving a life alone is not enough and they should ensure that persons with disabilities receive the support that they deserve.

After amputation, ancillary services need to be provided in the process of healing that include pain management, psychological consultation, physiotherapy, and artificial limb solutions. Work places need to be accessible and also inclusive. Organisations should play a role in fulfilling quotas of including persons with disabilities in their workforce and especially help women with disabilities to become self-reliant. I believe the government already has the data for persons with disabilities which is recorded during CNIC registration but the state shies away from taking full responsibility to develop a system of intervention to fully assist and support persons with disabilities proactively.

The Government of Pakistan issued the Disabled Persons (Employment and Rehabilitation) Ordinance issued in 1981 and under this Ordinance National Council for Rehabilitation of Disabled Persons was constituted along with its auxiliary councils working in all provinces to oversee and execute the policy made for employment, rehabilitation and welfare of the persons with disabilities.

 After 18th amendment Disabled Persons (Employment and Rehabilitation) Ordinance 1981 promulgated as Disabled Persons (Employment and Rehabilitation) Amendment Act 2012.

I would like to point out and appreciate our First Lady Begum Samina Arif Alvi for taking special interest in promoting the cause of persons with disabilities. She says that it is the responsibility of civilised societies to support persons with disabilities and help their assimilation in the mainstream society. She also reminds us that the reserved quota for differently abled persons in public and private organisations needs to be fully implemented in our country. With such patronage from the top, we can hope that women with disabilities will be involved in decision-making processes and their experiences will be considered and given due attention when developing policies. We also need to raise our voices for making infrastructure and assistive technologies accessible.

The writer is a LUMS alumna and a community social worker with special interest in public health, philosophy, and human rights. She can be reached at mariamk27@hotmail.com.

Her X (former Twitter) handle is @mariamibkhan

Mon, 04 Dec 2023 11:26:00 -0600 en text/html https://www.thenews.com.pk/magazine/you/1134472-united-in-action-for-persons-with-disabilities
Austin sued over delays in implementing voter-approved police oversight measure

The Police Oversight Act was approved by voters in May as Proposition A.

AUSTIN, Texas — Equity Action, a nonprofit pushing for police accountability, filed a lawsuit last week against the City of Austin and multiple leaders for not fully implementing the voter-approved Proposition A, also known as the "Police Oversight Act."

It's been seven months since Austinites overwhelmingly approved Prop A, which would supply the Office of Police Oversight access to police records to conduct its own officer misconduct investigations separate from police. 

There have been some delays in the City's implementation.

"We'd love to see our democracy in action," said Alicia Castillio with Equity Action.

The lawsuit names Interim City Manager Jesús Garza, Interim Chief of Police Robin Henderson and Director of the Office of Police Oversight Gail McCant. 

In September, the Austin City Council passed a resolution to get city leaders to move faster on implementing Prop A.

"There's a number of things that have caused some delay," McCant said during a Public Safety Commission meeting last week.

McCant said technology delays, hiring and coordinating with the various City departments are a few reasons the process is delayed. She said despite that, they've implemented 82% of the proposition – but Equity Action said that's not true.

"Things like failure to maintain their own records that are independent from the police in order for them to do a more independent investigation, and then, most importantly, the failure to discontinue maintenance of the notorious G file," Castillo said.

The G file has historically been a confidential Austin police personnel file with officer complaints. Prop A was supposed to dismantle it and make it public, but the City said there needs to be more clarity about whether state law prevents them from legally sharing that information.

"It's important to know about the file that most police departments in Texas do not have one," Castillo said. "Our own Travis County sheriff's department does not have one."

Michael Bullock, the incoming Austin police union president, said, "Other departments do have similar protections." 

"It may not be G file, but it's other layers of protection that they are provided," he said.

Bullock said the department wants to keep these files sealed because of Austin's political climate, not to protect bad apples.

"We're not trying to hide misconduct," Bullock said. "Officers need to be held accountable where appropriate, but there is a reason that that information is kept confidential, and it's primarily because it's something that can be abused. Anybody can make a false accusation against an officer. Anybody can lie and anyone can say, you know, that an officer did something that didn't happen." 

In a statement, Garza said: 

"City employees, especially in the Office of Police Oversight, have been working diligently to implement all aspects of the new law. I am proud of their work, and while I always wish we moved faster to implement changes, the OPO staff are working hard to meet all new mandates of the Austin Police Oversight Act. The outstanding question – regarding whether the historically confidential APD personnel files should be made public – is an important and delicate one. For that reason, we welcome the lawsuit. It will allow the courts to weigh in on this important issue." 

Castillo said the goal of the Police Oversight Act is to increase transparency and deter police misconduct by ensuring there's discipline, consequences and accountability when it does occur. 

"The police can't police themselves," Castillo said. "It's not the policing system that's going to offer us relief from police misconduct. So it's really important that community oversight can be brought to fruition in a really meaningful way so that, yeah, the police aren't just policing themselves.

 A court date hasn't been scheduled yet. 

Daranesha Herron on social media: Facebook | Twitter | Instagram

KVUE on social media: Facebook | Twitter | Instagram | YouTube

Mon, 11 Dec 2023 00:52:00 -0600 en-US text/html https://www.kvue.com/article/news/politics/equity-action-austin-lawsuit-police-oversight-act/269-cfc02fde-6aa7-4b4e-93b5-8fbe5c6d51c6
Report: FDA needs to do more to implement new law expanding authority over cosmetic safety

WASHINGTON D.C. — Many people may think of makeup when they hear about cosmetics, but it also includes other everyday products like shampoo, toothpaste and body wash.

>>> STREAM ACTION NEWS JAX LIVE <<<

Some items contain preservatives that can help stop the growth of bacteria, but they may also be linked to endocrine problems.

[DOWNLOAD: Free Action News Jax app for alerts as news breaks]

Some products may have asbestos contamination, which could be linked to health problems like cancer.

“Many cosmetics products do contain ingredients that research has shown might have potential harmful health effects and I say might and potential because it’s actually very difficult to make some of those links,” said Karen Howard, a Director of Science and Technology Assessment for the U.S. Government Accountability Office (GAO). “Scientifically, it’s very hard to prove causation when someone uses multiple products like this every day over the course of many years. It can be difficult to pinpoint which exposure they might have had that led to some of the negative health effects.”

That’s why there is government oversight to make sure the products consumers use are safe.

Read: FDA: Ecuador plant that made lead-tainted applesauce pouches is being inspected

A law passed last year known as the Modernization of Cosmetics Regulation Act (MoCRA) of 2022 significantly expanded the regulatory authority of the U.S. Food and Drug Administration (FDA) when it comes to cosmetic safety.

But a new GAO report reveals the FDA hasn’t taken all the necessary steps to fully implement the new law.

“FDA has taken important steps to implement MoCRA, such as designating its Chief Scientist to lead FDA’s implementation efforts,” the report said. “However, FDA has not fully addressed leading practices that help ensure the success of agency reforms—in this case, the organizational changes necessary to implement the law.”

That includes not yet developing a strategic workforce plan.

Read: Mosie Baby gets FDA clearance for first at-home artificial insemination kit

This is all meant to ensure the FDA is able to make sure cosmetic products are safe even with certain ingredients.

“It’s difficult to know whether the risk and benefit are worthwhile in some cases and that’s part of FDA’s job is to make those determinations,” said Howard.

[SIGN UP: Action News Jax Daily Headlines Newsletter]

In response, the FDA said it agrees with GAOs recommendations calling for the agency to complete the implementation steps.

Click here to obtain the free Action News Jax news and weather apps, click here to obtain the Action News Jax Now app for your smart TV and click here to stream Action News Jax live.

Thu, 07 Dec 2023 06:21:00 -0600 en text/html https://www.actionnewsjax.com/news/local/report-fda-needs-do-more-implement-new-law-expanding-authority-over-cosmetic-safety/BCNMIIQPTZBVTIWCPEUFNJMKRQ/




AI-102 thinking | AI-102 study | AI-102 download | AI-102 Free PDF | AI-102 teaching | AI-102 Practice Test | AI-102 information | AI-102 study help | AI-102 study tips | AI-102 mission |


Killexams test Simulator
Killexams Questions and Answers
Killexams Exams List
Search Exams
AI-102 exam dump and training guide direct download
Training Exams List