The Information Highway

The Information Highway

FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022

Globe_map

In collaboration with CISA, the NSA, and the FBI, Five Eyes cybersecurity authorities have issued today a list of the 12 most exploited vulnerabilities throughout 2022.

Continue reading
  846 Hits

AI Swipes Data By Listening to Keyboard Keystrokes with 95% Accuracy

GFz7Cb2gFsTPdcus5KvAaJ-1200-80.jpg

A team of researchers from Cornell, specifically Joshua Harrison, Ehsan Toreini and Maryam Mehrnezhad, have published a paper detailing their work in training AI to interpret keyboard input from audio alone. By recording keystrokes to train the model, they were able to predict what was typed on the keyboard with up to 95% accuracy. This accuracy only dropped to 93% when using Zoom to train the system. 

Continue reading
  835 Hits

How does ChatGPT actually work?

person-holding-a-phone-with-chatgpt-open

 Google, Wolfram Alpha, and ChatGPT all interact with users via a single-line text entry field and provide text results. Google returns search results, a list of web pages and articles that will (hopefully) provide information related to the search queries. Wolfram Alpha generally provides answers that are mathematical and data analysis-related.

Continue reading
  765 Hits

Hackers steal Signal, WhatsApp user data with fake Android chat app

Android_malware

Hackers are using a fake Android app named 'SafeChat' to infect devices with spyware malware that steals call logs, texts, and GPS locations from phones. 

Continue reading
  957 Hits

Cybercriminals train AI chatbots for phishing, malware attacks

ai-cybersecurity-hacker

In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called FraudGPT has emerged, and at least another one is under development that is allegedly based on Google's AI experiment, Bard. 

Continue reading
  875 Hits