-
Privacy-Invasive Inference Capabilities of Large Language Models Uncovered
LLMs (Large Language Models), like ChatGPT, are like word association champs, using massive data to guess what words come next. Interestingly, according to a recent study, they can also make…
-
“Streamjacking” is the Newest Evolution of an Old Threat
You are very much aware of ways in which physical devices, networks, and platform accounts can be hijacked and exploited for nefarious purposes. The latest addition to the list is…
-
Strings of Nonsense Convince AI Chatbots to Abandon Ethical Rules
Continuing previous coverage of development in AI systems, I wanted to share a study and demo from Carnegie Mellon University in Pittsburgh, Pennsylvania and the Center for AI Safety in San Francisco,…
-
Privacy bug in Windows 11’s snipping tool
Windows 11 built-in snipping tool allows users to take screenshots and perform basic image editing tasks, such as cropping, annotating, and highlighting. It also includes a redaction feature that enables…
-
AI Image Generators Replicate Training Data, Pose Privacy Concerns
If you’ve been following the news, you’ve heard AI image generators have captured the public imagination. While concerns about “digital forgery” and copyright infringement have gotten much attention given the…
-
MFA is good, but not good enough
Hackers attempt to log in to our online accounts daily by the hundreds. The extra protection layer provided by MFA to the sign-in process dramatically reduces the number of successful…
-
Online Ads cause privacy concerns
Researchers discovered a new form of attack by exploiting ad networks’ data collection mechanisms, https://news.gatech.edu/news/2022/11/10/new-research-gives-users-another-reason-hate-unwanted-ads. Online advertising uses data points such as location and behavioral patterns to provide personalized banners. Thirdy-party…
-
Digital currency / digital wallet Ukraine use case
When ICT is to impact external users, the digital transformation journey is very different. How can technology help when humanitarian cash-based interventions are needed, such as providing financial assistance to…
-
LastPass Breach Underscores Password Fragility and Value of MFA
LastPass, a password manager, has suffered the latest in a series of successful breaches. Password managers like LastPass, which attempt to create unique, complex passwords for many different accounts, which are then…
-
NIST Post-Quantum Encryption Candidate Foiled by Classical Computing
Many are familiar with the progress being made towards the next generation of computing: quantum computing. While quantum computing promises to revolutionize the entire world and provide a wealth of…