image provided by pixabay

Using AI to Conceal Confidential Information in Images

0
Researchers from Japan, China, and Finland created a system that replaces confidential parts of images with visually similar alternatives using GenAI. The researchers created...
image provided by pixabay

Bank Data Stealing Malware Is Back Despite Arrests

0
Investigation shows that despite a recent crackdown on the Grandoreiro banking trojan malware, it is back and has been actively targeting 1500 banks globally. The...
Image provided by pixabay

Large Language Models Are Dangerously Easy to Manipulate into Giving Harmful...

0
Most large language models can be easily tricked into revealing dangerous or unethical information, according to a paper by researchers from AWS AI Labs,...
image provided by pixabay

Studies Warn That AI Has Learned to Deceive Humans

0
A significant number of artificial intelligence systems were revealed to have developed the ability to deceive humans, a troubling pattern that raises serious concerns...
image provided by pixabay

Microsoft Launched Chatbot for Intelligence Agencies

0
Tech giant Microsoft recognized the need for a fully secure AI system for handling sensitive intelligence data and created a “chatbot for spies” that...
image provided by pixabay

Careful Where You Upload – New Ransomware Threat

0
While cybersecurity-savvy internet users know they should avoid clicking on links that may download unknown files onto their devices, a new emerging threat can...
image provided by pixabay

UK Passes Laws to Protect Consumers Against Cyberattacks

0
The UK enacts new laws to protect consumers against hacking and cyberattacks. The laws will enforce consumer protections and mandate that internet-connected smart devices...

The New Chip That Can Protect You from Data Theft

0
Researchers from the MIT-IBM Watson AI Lab developed new machine-learning accelerator chips that aim to enhance data security for health trackers, fitness apps, and...
image provided by pixabay

Have An Android Phone? You Might Be at A Higher Risk...

0
Android phones were exposed by experts as extremely vulnerable to cyberattacks, with almost 200,000 data tracking attempts made in just 30 days on a...
IoT. Image by pixabay

AI is Making Smart Devices Easier to Hack – What Can...

0
Our everyday routines are becoming increasingly flooded with AI-powered smart and ultra-connected devices (Internet of Things), and manufacturers are gathering incredible amounts of user...
image provided by pixabay

Cybergangs Are Using AI-Generated Code – What Are the Implications?

0
Cybercriminals impersonating legitimate German companies are attacking organizations across various industries in the country using AI, as was reported by cybersecurity company Proofpoint. The hackers,...
image provided by pixabay

AI in Wartime

0
Artificial intelligence is gaining use in modern warfare – what does it mean, and is it dangerous? AI, while faster than humans, is not...
Cyber intelligence. image by pixabay

Global Strategies to Accelerate AI in Science and Research

0
The International Science Council's Center for Science Futures published the report "Preparing National Research Ecosystems for AI: Strategies and Progress in 2024" to address...
image provided by pixabay

The Phishing Platform Automating Cybercrime

0
Darcula is a new Chinese-language phishing-as-a-service platform with more than 20,000 phishing domains that target organizations in over 100 countries. While the concept of an...
image provided by pixabay

North Korean Hackers use Nuclear Threat to Trick Victims

0
North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
image provided by pixabay

Microsoft’s New AI Hacker Tracker

0
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by pixabay

ChatGPT Plugins Vulnerable to Threat Actors

0
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
image provided by pixabay

New Approach Revolutionizes Quantum Computer Cybersecurity

0
Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
Images provided by pixabay

China is Boosting its Cyber Defenses in Fear of Cyberattacks and...

0
China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
images provided by pixabay

New Type of Cyberattack Uses Wireless Charger to Set Your Smartphone...

0
Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
image provided by pixabay

A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...

0
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Hardware. image by pixabay

Experts Claim AI Safety is Rooted in Hardware, Not Software

0
A major new report calls for the regulation of the hardware that underpins all AI ("compute") to help prevent artificial intelligence misuse and disasters. Several...

Latest