Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

WTF-Beta

  1. Home
  2. Categories
  3. Off Key - General Discussion
  4. Like most any tool AI can be used for nefarious purposes

Like most any tool AI can be used for nefarious purposes

Scheduled Pinned Locked Moved Off Key - General Discussion
3 Posts 3 Posters 15 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • wtgW Offline
    wtgW Offline
    wtg
    wrote last edited by
    #1

    Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company’s previously unknown digital vulnerability, adding to heightened worries across government and private industry about AI’s risks for cybersecurity.

    Google shared limited information about the attackers and the target, but John Hultquist, chief analyst at the tech giant’s threat intelligence arm, said it represents a moment cybersecurity experts have warned about for years: malicious hackers arming themselves with AI to supercharge their ability to break into the world’s computers.

    “It’s here,” Hultquist said. “The era of AI-driven vulnerability and exploitation is already here.”

    https://apnews.com/article/google-ai-cybersecurity-exploitation-mythos-926aea7f7dc5e0e61adce3273c55c6d4

    1 Reply Last reply
    • D Offline
      D Offline
      Daniel
      wrote last edited by
      #2

      Can anyone translate this into English? Thanks in advance.

      'But as they said in one of the later Rocky movies, "Time...it's undefeated.".-- Mik

      1 Reply Last reply
      • RontunerR Offline
        RontunerR Offline
        Rontuner
        wrote last edited by
        #3

        Computer hacking is typically a slow process. Lots of things to test and check to find vulnerable ways to gain access to private areas. Guess what? Using AI to look for many more ways in - all in the blink of an eye... What could go wrong?

        1 Reply Last reply

        Hello! It looks like you're interested in this conversation, but you don't have an account yet.

        Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

        With your input, this post could be even better 💗

        Register Login
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        Powered by NodeBB | Contributors
        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • Users
        • Groups