Cybernetics

Design Sem Nome 2025 10 21T115006.823

What is AI Poisoning? A Computer Scientist’s Explanation

Poisoning is a term commonly linked to the human body and the natural world. However, it’s becoming an increasing concern in the realm of artificial intelligence (AI), especially for large language models like ChatGPT and Claude. A recent study by the UK AI Security Institute, the Alan Turing Institute, and Anthropic, published earlier this month, […]

What is AI Poisoning? A Computer Scientist’s Explanation Read More »

Design Sem Nome 87

Georgia Court Takes Down International Malware Network

The messages appeared harmless, even routine. One, from someone claiming to be a potential guest, asked a hotel about an alleged comment on Booking.com. Another, seemingly from the booking site itself, requested a review of negative guest feedback. The emails were fraudulent—phishing scams designed to trick recipients into downloading malware that would steal financial data

Georgia Court Takes Down International Malware Network Read More »

SCITKE 11

Data Privacy: Who’s Watching Your Digital Life?

The Data We Share From Fitbit steps to Facebook likes, we spill data daily. Every search, click, and purchase feeds into vast databases. Companies like Acxiom build detailed consumer profiles for targeted advertising, sometimes knowing more about your habits than you realize. Social media platforms, streaming services, and online retailers track user behavior to refine

Data Privacy: Who’s Watching Your Digital Life? Read More »

Journal Of Functional Foods. 22

Phone Light Sensor: A Potential Tool for Unauthorized Surveillance

In increasingly mobile-dependent lives, people entrust their smartphones with various sensitive tasks, from financial transactions to work-related activities and even documenting personal musings through apps like Notes. However, a recent study conducted by MIT researchers sheds light on a potential privacy threat associated with the unassuming ambient light sensor in most phones. The Vulnerability of

Phone Light Sensor: A Potential Tool for Unauthorized Surveillance Read More »

Design Sem Nome 2023 09 13T222927.459

Password Theft Occurs Through the Interception of Keystrokes by the Exploit

“Incorporate an additional hazard into the roster of dangers you expose yourself to when utilizing your phone for business transactions at the neighborhood coffee shop.” Researchers from Chinese and Singaporean universities have identified a security vulnerability that enables malicious individuals to capture your passwords by monitoring your keystrokes. This innovative cyberattack, known as Wiki-Eve, is

Password Theft Occurs Through the Interception of Keystrokes by the Exploit Read More »

Untitled Design 63

Neuralink, Mind Control or Advanced Technology

“I am so secure about Neuralink that I can implant it in my kids”. Elon Musk Technology has come way too far, isn’t it? Today we more often hear about a Neuralink´s coin size device capable of making humans control several devices just with their thought. Well, this has also implications for important fields such

Neuralink, Mind Control or Advanced Technology Read More »

KeePass 800x600 1

KeePass Exploit Enables Attackers to Recuperate Master Passwords from Memory

A proof-of-concept (PoC) has been provided for a security flaw affecting the KeePass password manager that could be exploited to recover a victim’s master password in cleartext under certain situations. The problem, tracked as CVE-2023-32784, impacts KeePass versions 2.x for Windows, Linux, and macOS and is presumed to be patched in version 2.54, which is

KeePass Exploit Enables Attackers to Recuperate Master Passwords from Memory Read More »

Design Sem Nome 39

ChatGPT and The Dark Web, Yet, A Hushed Talk in The Tech World

The use of ChatGPT provides benefits for businesses, including automation and the potential for increased profits. However, this technology also presents certain risks. One such risk is the possibility of hackers using ChatGPT to manipulate victims, resulting in more advanced and difficult-to-detect cyber attacks. A recent study by NordVPN has shown an increase in ChatGPT-related

ChatGPT and The Dark Web, Yet, A Hushed Talk in The Tech World Read More »

Design Sem Nome 36

Hackers Install Malware Instead of Promised AI

On Wednesday, the social media giant Meta, which is the parent company of popular platforms such as Facebook, Instagram, and WhatsApp, warned that hackers exploit the popularity and potential of generative artificial intelligence tools like ChatGPT to lure people into installing malware on their devices. Guy Rosen, Meta’s chief information security officer, revealed that the

Hackers Install Malware Instead of Promised AI Read More »

Untitled Design 2

A Look on Data Mining and Machine Learning

Data mining is the process of finding out patterns, trends, and insights from big datasets. It uses statistical and machine learning techniques to extract knowledge from data, and to solve problems across various industries. The step of data mining process The process of data mining typically involves the following steps: Data collection: Info is collected 

A Look on Data Mining and Machine Learning Read More »

Scroll to Top