A simple technique to defend ChatGPT against jailbreak attacks

Using antineutrinos to surveil nuclear reactors

The proposed approach is promising for the prevention ofuncontrollable nuclear proliferation. Credit: Tokyo Tech Nuclear power constitutes an essential source of energy in many countries worldwide, including France, U.S., China,…

Cybersecurity expert weighs in on AI benefits and risks

Credit: Pixabay/CC0 Public Domain Artificial intelligence has been taking the world by storm as the powers of tools such as ChatGPT and others have become available to the public. A…

Researchers use AI chatbots against themselves to ‘jailbreak’ each other

NTU Ph.D. student Mr. Liu Yi, who co-authored the paper, shows a database of successful jailbreaking prompts which managed to compromise AI chatbots, causing them to produce information that their…

Fraud is a problem so big we need to start teaching children how to spot it in schools

Credit: Pixabay/CC0 Public Domain Have you or someone you know been a victim of fraud? If so, that’s not unusual. The UK’s Office for National Statistics (ONS) reported a rise…

A suspected cyberattack paralyzes the majority of gas stations across Iran

Credit: CC0 Public Domain Nearly 70% of Iran’s gas stations went out of service on Monday following possible sabotage—a reference to cyberattacks, Iranian state TV reported. The report said a…

Researchers reveal hidden fortunes and surprising underestimations in cybercrime revenue

Credit: CC0 Public Domain To what extent methodological limitations and incomplete data impact the revenue estimations of cybercriminal groups using the Bitcoin blockchain was largely unknown. A new study, conducted…

What is Storm-1152, alleged top creator of fake Microsoft accounts?

Microsoft has seized the websites of Storm-1152, a Vietnam-based group it says is responsible for creating hundreds of millions of fake accounts. Microsoft has seized the websites of a Vietnam-based…

Guidance on evaluating a privacy protection technique for the AI era

Evaluating any claim to differential protection requires examining every component of the differential privacy pyramid. Its top level contains the most direct measures of privacy guarantees, including epsilon, which is…

Are we witnessing the death of the password?

Credit: CC0 Public Domain Once considered a near iron-clad weapon of defense against cyber criminals, the password has begun to fall from grace. Effective passwords often require human efforts that…