Applications

Applications

image provided by pixabay

Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by pixabay

Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
images provided by pixabay

Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
image provided by pixabay

The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Hardware. image by pixabay

A major new report calls for the regulation of the hardware that underpins all AI ("compute") to help prevent artificial intelligence misuse and disasters. Several...
image provided by pixabay

Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed? AI Safety...
images provided by Pixabay and VieRally

Social media is an unprecedented landscape of opportunities and hazards for brands. One Tweet can make your brand soar to the heights of popularity...
image provided by pixabay

Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
image provided by pixabay

The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

OpenAI declared it is going to introduce new tools meant to combat disinformation, just in time for the many elections that will be held...
image provided by pixabay

A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems. AI...
image provided by pixabay

Written by Or Shalom OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
image provided by pixabay

Bluetooth trackers are useful for finding your phone, your keys, or your luggage. They do so by emitting a Bluetooth signal (that varies from...
image provided by pixabay

Using OpenAI's products? Turns out your personal data is not as safe as you believed- Google researchers recently released a study in which they...
image provided by pixabay

In our increasingly digital society, privacy is getting more and more important, and according to the European General Data Protection Regulation there is a...
image provided by pixabay

Do you think you can notice when a picture is machine or man-made? Don’t be so sure- A recent study led by experts at...
Password, image by pixabay

44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...
image provided by pixabay

Our homes and home appliances are constantly getting smarter, getting upgraded, connecting to your WiFi, and using apps on your mobile phone. However, according...
image provided by pixabay

Taking a more in-depth look into cookies online- why allow them, why not, and why does it matter? First of all, what are cookies? According...
image provided by pixabay

Researchers from the University of Waterloo's Faculty of Engineering are developing a first-of-its-kind innovative system against fake news that relies on blockchain. Their goal?...