Tag: misuse

  • The Register: Even modest makeup can thwart facial recognition

    Source URL: https://www.theregister.com/2025/01/15/make_up_thwart_facial_recognition/ Source: The Register Title: Even modest makeup can thwart facial recognition Feedly Summary: You may not need to go full Juggalo for the sake of privacy Researchers at cyber-defense contractor PeopleTec have found that facial recognition algorithms’ focus on specific areas of the face opens the door to subtler surveillance avoidance strategies.……

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • The Register: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI

    Source URL: https://www.theregister.com/2025/01/13/microsoft_sues_foreignbased_crims_seizes/ Source: The Register Title: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI Feedly Summary: Crooks stole API keys, then started a hacking-as-a-service biz Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful…

  • Hacker News: WH Executive Order Affecting Chips and AI Models

    Source URL: https://www.whitehouse.gov/briefing-room/statements-releases/2025/01/13/fact-sheet-ensuring-u-s-security-and-economic-strength-in-the-age-of-artificial-intelligence/ Source: Hacker News Title: WH Executive Order Affecting Chips and AI Models Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines a proactive strategy by the U.S. government to bolster its leadership in artificial intelligence technology while enhancing national security. An Interim Final Rule on Artificial Intelligence Diffusion aims…

  • Schneier on Security: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

    Source URL: https://www.schneier.com/blog/archives/2025/01/microsoft-takes-legal-action-against-ai-hacking-as-a-service-scheme.html Source: Schneier on Security Title: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme Feedly Summary: Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit…

  • New York Times – Artificial Intelligence : Biden Administration Adopts Rules to Guide A.I.’s Global Spread

    Source URL: https://www.nytimes.com/2025/01/13/us/politics/biden-administration-rules-artificial-intelligence.html Source: New York Times – Artificial Intelligence Title: Biden Administration Adopts Rules to Guide A.I.’s Global Spread Feedly Summary: New rules aim to keep advanced technology out of China and to ensure that cutting-edge artificial intelligence is developed by the United States and its allies. AI Summary and Description: Yes Summary: The…

  • Hacker News: Hobbyist Builds AI-Assisted Rifle Robot Using ChatGPT

    Source URL: https://www.zmescience.com/science/news-science/hobbyist-builds-ai-assisted-rifle/ Source: Hacker News Title: Hobbyist Builds AI-Assisted Rifle Robot Using ChatGPT Feedly Summary: Comments AI Summary and Description: Yes Summary: The text examines the unsettling implications of a hobbyist engineer utilizing AI technology, specifically OpenAI’s ChatGPT, to create an autonomous rifle system. This incident highlights the dual-edged nature of accessible AI, its…

  • Hacker News: How outdated information hides in LLM token generation probabilities

    Source URL: https://blog.anj.ai/2025/01/llm-token-generation-probabilities.html Source: Hacker News Title: How outdated information hides in LLM token generation probabilities Feedly Summary: Comments AI Summary and Description: Yes ### Summary: The text provides a deep examination of how large language models (LLMs), such as ChatGPT, process and generate responses based on conflicting and outdated information sourced from the internet.…