Tag: technews

  • New COSMICENERGY Malware Uses ICS Protocol to Sabotage

    by

    in

    New COSMICENERGY Malware Uses ICS Protocol to Sabotage The new threat intelligence firm Mandiant has discovered a new type of malware that uses remote commands to control the physical state of power lines and circuit breakers. The company calls the malware COSMICENERGY, and it was first spotted in December 2021 by a submitter in Russia.…

  • 5 Benefits of 5G Network Security and Its Cloud Benefits

    by

    in

    5 Benefits of 5G Network Security and Its Cloud Benefits The 5G eSIM platform from the global cloud and CDN provider Gcore demonstrates a powerful example of a collaborative 5G and cloud solution.5G Benefits Cloud-Native Companies With its low latency, higher bandwidth, and extensive security measures, 5G strengthens the security of cloud connectivity. Gcore’s 5g…

  • Android spyware: Researchers uncover new data theft capabilities in Predator

    by

    in

    Android spyware: Researchers uncover new data theft capabilities in Predator Intellexa’s latest spyware, Predator, was first discovered by Google’s Threat Analysis Group in May 2022 as part of an attack leveraging five different zero-day flaws in the Chrome web browser and Android. Security researchers have shared a deep dive into the commercial Android spyware called…

  • HOSNeRF: an AI model that can generate dynamic neural radiance fields from

    by

    in

    HOSNeRF: an AI model that can generate dynamic neural radiance fields from This paper describes a new approach to view synthesis based on neural radiance fields, previously used in radar and optoelectrics. The goal of the paper is to create a framework that enables 360° freeviewpoint high-fidelity novel view synthesis for dynamic scenes with human-environment…

  • The Security Hole That Lets Hackers Steal Your Login Credentials from ChatGPT

    by

    in

    The Security Hole That Lets Hackers Steal Your Login Credentials from ChatGPT The incident highlights the dangers of directly prompt-injection attacks, rather than criminal hackers abusing LLMs . In other words, people who want to trick an AI system into doing something they don’t intend can infect it with malicious code. A number of examples…

  • Waluigi, Carl Jung, and the Case for Moral AI: A Philosophical

    by

    in

    Waluigi, Carl Jung, and the Case for Moral AI: A Philosophical Luigi plays by the rules; Waluigi cheats and causes chaos. Since deep-learning-based general AI systems are complex adaptive systems, attempts to control these systems using rules often backfire. An example of this type of approach would be a hypothetical program designed to prove mathematical…

  • How Memory Ends and Generative AI Begins

    by

    in

    How Memory Ends and Generative AI Begins In late March, an artificial intelligence startup called Runway hosted what it said was the first ever AI film festival at the Alamo Drafthouse theater in San Francisco. The startup, known for its Stable Diffusion, is best known for cocreating Stable diffusion, the standout text-to-image AI tool that…

  • How to Regulate AI: Everyone Wants to, but No One Can Agree

    by

    in

    How to Regulate AI: Everyone Wants to, but No One Can Agree In October 2022, just a month before the scheduled release of ChatGPT, the Trump administration issued a paper called the Blueprint for an AI Bill of Rights. This document lays out in detail what AI regulation might look like and what kinds of…

  • The FDA will apparently let Elon Musk put a computer in a human brain to help treat

    by

    in

    The FDA will apparently let Elon Musk put a computer in a human brain to help treat Elon Musk’s brain-computer interface company Neuralink gets FDA approval to launch its first human clinical study. This means actual humans could soon be getting implants in their heads. The company previously received approval for a European trial in…

  • Negative Prompts and Stable Diffusion for unveiling image potential

    by

    in

    Negative Prompts and Stable Diffusion for unveiling image potential This paper describes a new type of artificial intelligence algorithm called Perp-Neg. It uses the geometry of the score space to address the shortcomings of the current negative prompts algorithm. The name comes from the concept of using the perpendicular score estimated by the denoiser for…