Tag: assessments
- 
		
		
		AlgorithmWatch: Border Surveillance on the Move to Enforce Restrictive MeasuresSource URL: https://algorithmwatch.org/en/border-surveillance-on-the-move/ Source: AlgorithmWatch Title: Border Surveillance on the Move to Enforce Restrictive Measures Feedly Summary: In two recent Horizon Europe research projects, adaptable and mobile AI-based surveillance assemblages are developed to secure both the external and internal borders of the European Union. AlgorithmWatch looked into project material that revealed a lopsided fixation on… 
- 
		
		
		Slashdot: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User AccountsSource URL: https://it.slashdot.org/story/25/08/25/1654220/perplexitys-ai-browser-comet-vulnerable-to-prompt-injection-attacks-that-hijack-user-accounts?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant vulnerabilities in Perplexity’s Comet browser linked to its AI summarization functionalities. These vulnerabilities allow attackers to hijack user accounts and execute malicious commands, posing… 
- 
		
		
		The Register: Search-capable AI agents may cheat on benchmark testsSource URL: https://www.theregister.com/2025/08/23/searchcapable_ai_agents_may_cheat/ Source: The Register Title: Search-capable AI agents may cheat on benchmark tests Feedly Summary: Data contamination can make models seem more capable than they really are Researchers with Scale AI have found that search-based AI models may cheat on benchmark tests by fetching the answers directly from online sources rather than deriving… 
- 
		
		
		The Register: Criminal background checker APCS faces data breachSource URL: https://www.theregister.com/2025/08/22/apcs_breach/ Source: The Register Title: Criminal background checker APCS faces data breach Feedly Summary: The attack first affected an upstream provider of bespoke software Exclusive A leading UK provider of criminal record checks for employers is handling a data breach stemming from a third-party development company.… AI Summary and Description: Yes Summary: The… 
- 
		
		
		Cloud Blog: How much energy does Google’s AI use? We did the mathSource URL: https://cloud.google.com/blog/products/infrastructure/measuring-the-environmental-impact-of-ai-inference/ Source: Cloud Blog Title: How much energy does Google’s AI use? We did the math Feedly Summary: AI is unlocking scientific breakthroughs, improving healthcare and education, and could add trillions to the global economy. Understanding AI’s footprint is crucial, yet thorough data on the energy and environmental impact of AI inference —… 
- 
		
		
		The Register: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructureSource URL: https://www.theregister.com/2025/08/20/russian_fsb_cyberspies_exploiting_cisco_bug/ Source: The Register Title: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure Feedly Summary: Snarfing up config files for ‘thousands’ of devices…just for giggles, we’re sure The FBI and security researchers today warned that Russian government spies exploited a seven-year-old bug in end-of-life Cisco networking devices…