Category: Blog

  • “Streamjacking” is the Newest Evolution of an Old Threat

    You are very much aware of ways in which physical devices, networks, and platform accounts can be hijacked and exploited for nefarious purposes. The latest addition to the list is “streamjacking,” which refers to the takeover of streaming platform accounts, such as those on YouTube [1]. The classic example of hijacked systems many of you…

  • Strings of Nonsense Convince AI Chatbots to Abandon Ethical Rules

    Continuing previous coverage of development in AI systems, I wanted to share a study and demo from Carnegie Mellon University in Pittsburgh, Pennsylvania and the Center for AI Safety in San Francisco, California revealing a new spin on how chatbot safeguards are susceptible to attacks. AI chatbots like OpenAI’s ChatGPT, Google’s Bard, and Anthropic’s Claude don’t have…

  • Privacy bug in Windows 11’s snipping tool

    Windows 11 built-in snipping tool allows users to take screenshots and perform basic image editing tasks, such as cropping, annotating, and highlighting. It also includes a redaction feature that enables users to remove sensitive information from an image before saving or sharing it. Despite being a useful tool, it has a vulnerability that could have…

  • AI Image Generators Replicate Training Data, Pose Privacy Concerns

    If you’ve been following the news, you’ve heard AI image generators have captured the public imagination. While concerns about “digital forgery” and copyright infringement have gotten much attention given the technology’s ability to mimic artist styles and subjects, concerns about privacy are also being raised. Training images are pulled from publicly available internet sources regardless…