cyber security

A robot hands out money. Illustration: Dr.Roey Tsezana

The artificial intelligence that gave away $50,000 of its own accord

Autonomous Agent Experiment Leads to Sophisticated Hacking, Reveals Safety and Control Challenges in Artificial Intelligence
External influence on election results. Illustration: depositphotos.com

An Iranian attempt to influence election systems in the world through ChatGPT was stopped

Artificial intelligence in the service of influence operations: how OpenAI and the cyber people were able to uncover and prevent a secret Iranian operation that tried to shape American public opinion
Autonomous orientations are linked to each other. Illustration: depositphotos.com

The new technology that makes cars easier to steal or crash by criminals

The automotive industry is talking about the "Internet of Vehicles" (IoV), a network that can help vehicles detect roadblocks, traffic jams and pedestrians. She can help with the location of the vehicle on the road
The image was produced using Artssy AI software. Defining the keywords artificial intelligence, Autonomous weapons, Surveillance, cyber threats, Unemployment, Threat to democracy

Elon Musk, Steve Wozniak and many others in an open letter: Strong artificial intelligence is dangerous for democracy

The signatories of the letter call for a six-month pause in the development of systems more powerful than OpenAI's new GPT-4. "Strong AI systems should only be developed once we are sure that their effects will be positive and their risks
Two cubesat-based nanosatellites are launched from the International Space Station. 2016. Photo: NASA

Hackers can disable satellites - or turn them into weapons

Cyber. Illustration: shutterstock

biomimicry and cyber

Illustration. A good algorithm is such that the amount of memory it uses is significantly smaller than the size of the database itself, so the calculation can be fast and efficient. Source: DARPA.

Similar but simpler

Illustration: pixabay.

Your email password will never be safe

Smart coffee machine with touch screen. Photo: shutterstock

"Anything connected to the Internet can be hacked"