Category: Blog
-
Computational Errors in SSH Connections Expose Private Keys
⋅
As one of the most widely deployed protocols for remote access and secure administration, SSH needs little introduction. For the first time, researchers demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic is vulnerable and were able to calculate the private portion of almost 200 unique SSH keys…
-
Researchers Reveal Vulnerabilities in AI System
⋅
The AI threat landscape is rapidly evolving. Natural Language Processing (NLP) enables seamless interaction with AI systems through conversational interfaces. However, as we increasingly rely on AI for productivity, new risks emerge. Recent research from the University of Sheffield has shown that NLP models like ChatGPT can be misused to produce harmful malware code, posing…
-
New Insights from IEEE: Gender Pay Gap Narrows, Ethnic Disparities Grow
⋅
Given the growing emphasis on achieving gender parity, you might find the IEEE article [*] insightful and relevant, bearing in mind that the data it presents is based on U.S. salary statistics. In 2022, the gender pay gap, decreased by $7,100, but men still earned substantially more than women, with an average difference of $26,800. Conversely,…
-
ChatGPT’s Oscillating Accuracy A Reminder User Oversight Necessary
⋅
I wanted to share a recent study demonstrating ChatGPT’s accuracy has diminished for some key tasks, contrary to the prevalent assumption that training over time should increase accuracy. This reminds us of the vital need for human oversight in any use of AI technologies. Researchers from Stanford University and the University of California at…