Category: Blog

  • Face Photo Morphing: The Identity Fraud Threat That Could Let Two People Share One Passport

    A sophisticated new form of identity fraud is quietly eroding security systems worldwide, and most organizations are unprepared. Known as face photo morphing, it digitally blends two or more individuals’ faces into a single image,  These morphs can be easily produced using mobile apps, desktop graphics software, or advanced machine learning tools, posing a serious threat…

  • AI Social Engineering: How Researchers Psychologically Manipulated GPT-5 

    Only a day after OpenAI launched GPT-5, security researchers bypassed its safety features. This rapid bypass highlighted an important issue: as AI systems like GPT-5 become more sophisticated, their expanded capabilities and complexity can introduce new forms of vulnerability and risk, often outpacing current safety defenses.  Quick Breach of “Safer” AI  On August 7, 2025,…

  • GPT-5 and the High School Math Problem: A Reality Check on AI Intelligence

    In the bustling technological hub of Shibuya, where innovation is a constant presence, we often hear impressive claims about the latest AI models. GPT-5, in particular, has been praised by OpenAI’s CEO for demonstrating PhD-level intelligence across creative writing, coding, and complex reasoning. However, a simple experiment I recently conducted provides a more grounded perspective…

  • The Silent Revolution: How AI Has Quietly Transformed Scientific Writing

    A groundbreaking study reveals that one-fifth of computer science papers may now include AI-generated content, marking a fundamental shift in how scientific knowledge is created and communicated. In the hallowed halls of academia, where rigorous peer review and meticulous methodology have long been the gold standards, a quiet revolution is taking place. A systematic analysis…