Advertisements


AI-powered Bing Chat spills its secrets via prompt injection attack

By asking "Sydney" to ignore previous instructions, it reveals its original directives. Enlarge / With the right suggestions, researchers can "trick" a language model to spill its secrets. (credit: Aurich Lawson | Getty Images).....»»

Category: topSource:  arstechnicaFeb 10th, 2023

Browser backdoors: Securing the new frontline of shadow IT

Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger attack su.....»»

Category: securitySource:  netsecurityRelated NewsAug 13th, 2024

A major Sonos exploit was explained at Black Hat — but you needn’t worry

Researchers from NCC Group showed how a Sonos One could fall victim to an attack that would let someone listen in on the microphones......»»

Category: topSource:  digitaltrendsRelated NewsAug 12th, 2024

I tried Dead by Daylight’s scary new spinoff and I’m already dying to dive back in

After playing through the bloody prologue of The Casting of Frank Stone, we can't wait to uncover the secrets of Dead by Daylight's promising spinoff......»»

Category: topSource:  digitaltrendsRelated NewsAug 12th, 2024

Google"s DeepMind AI can now play table tennis to a competitive level

A bot powered by AI blasted away beginner opponents but struggled against faster human players......»»

Category: topSource:  marketingvoxRelated NewsAug 10th, 2024

Unlocking the genetic secrets of strawberries for superior fruit quality

Strawberries, treasured for their flavor and health benefits, have been at the forefront of breeding programs targeting enhanced sensory and nutritional profiles. Despite advances, the intricate genetic makeup of these fruits has complicated efforts.....»»

Category: topSource:  theglobeandmailRelated NewsAug 9th, 2024

Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)

Two vulnerabilities (CVE-2024-42219, CVE-2024-42218) affecting the macOS version of the popular 1Password password manager could allow malware to steal secrets stored in the software’s vaults and obtain the account unlock key, AgileBits has con.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

Watch Google DeepMind’s robotic ping-pong player take on humans

Researchers at Google DeepMind have created an AI-powered robot capable of sustaining a rally against ping-pong players of varying abilities......»»

Category: topSource:  digitaltrendsRelated NewsAug 9th, 2024

Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"

Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»

Category: topSource:  marketingvoxRelated NewsAug 9th, 2024

Watch Google DeepMind’s robot ping pong player take on humans

Researchers at Google DeepMind have created an AI-powered robot capable of sustaining a rally against ping pong players of varying abilities......»»

Category: topSource:  digitaltrendsRelated NewsAug 9th, 2024

New infosec products of the week: August 9, 2024

Here’s a look at the most interesting products from the past week, featuring releases from: Rapid7, AppOmni, Contrast Security, Elastic, Cequence Security, Veza, ArmorCode, and EndorLabs. Rapid7 releases Command Platform, unified attack defense and.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

A critical security issue in 1Password for Mac left credentials vulnerable to attack

1Password has disclosed a now patched critical security flaw in its software that could give attackers access to users' unlock keys and credentials. Here's what to do to keep your data safe.1Password has disclosed a critical security flaw present in.....»»

Category: appleSource:  appleinsiderRelated NewsAug 9th, 2024

Man vs. machine: DeepMind’s new robot serves up a table tennis triumph

Human-beating ping-pong AI learned to play in a simulated environment. Enlarge (credit: Benj Edwards / Google DeepMind) On Wednesday, researchers at Google DeepMind revealed the first AI-powered robotic table tennis play.....»»

Category: topSource:  arstechnicaRelated NewsAug 8th, 2024

Genetic study uncovers onion bulb shape, size secrets

A new study by the Department of Plant and Agroecosystem Sciences, University of Wisconsin details the genetic mechanisms influencing the shape and volume of onion bulbs, along with the effects of daylength on the bulbing process. This research provi.....»»

Category: topSource:  physorgRelated NewsAug 8th, 2024

Multiple goals, multiple solutions, plenty of second-guessing and revising—here"s how science really works

A man in a lab coat bends under a dim light, his strained eyes riveted onto a microscope. He's powered only by caffeine and anticipation......»»

Category: topSource:  physorgRelated NewsAug 8th, 2024

Recovery of rocks that originated in Earth"s mantle could reveal secrets of planet"s history

Scientists have recovered the first long section of rocks that originated in the Earth's mantle, the layer below the crust and the planet's largest component......»»

Category: topSource:  physorgRelated NewsAug 8th, 2024

Prompt injection attack on Apple Intelligence reveals a flaw, but is easy to fix

A prompt injection attack on Apple Intelligence reveals that it is fairly well protected from misuse, but the current beta version does have one security flaw which can be exploited. However, the issue would be very easy for the company to fix, so.....»»

Category: gadgetSource:  9to5macRelated NewsAug 8th, 2024

Securonix and Cribl partner to enhance threat detection with advanced data integration

Securonix and Cribl announced a strategic partnership focused on providing customers with enhanced threat detection, based on a broader range of enterprise data being analyzed for AI-powered attacks. Securonix recently announced Securonix EON with a.....»»

Category: securitySource:  netsecurityRelated NewsAug 8th, 2024

“Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days

A researcher has developed a downgrade attack that can make Windows machines covertly, persistently and irreversibly vulnerable, even if they were fully patched before that. A downgrade attack exploiting the Windows Update process The direction of Sa.....»»

Category: securitySource:  netsecurityRelated NewsAug 8th, 2024

Unlocking the secrets of salt stress tolerance in wild tomatoes

As our climate changes and soil salinity increases in many agricultural areas, finding crops that can thrive in these challenging conditions is crucial. Cultivated tomatoes, while delicious, often struggle in salty soils. Their wild cousins, however,.....»»

Category: topSource:  physorgRelated NewsAug 8th, 2024

Austria finds chemicals in house of suspected Taylor Swift concert attack plotter

Austria finds chemicals in house of suspected Taylor Swift concert attack plotter.....»»

Category: topSource:  theglobeandmailRelated NewsAug 8th, 2024