AI worm exposes security flaws in AI tools like ChatGPT

  • 📰 FoxNews
  • ⏱ Reading Time:
  • 79 sec. here
  • 3 min. at publisher
  • 📊 Quality Score:
  • News: 35%
  • Publisher: 87%

Technology Technology Headlines News

Technology Technology Latest News,Technology Technology Headlines

Kurt 'CyberGuy' Knutsson addresses an artificial intelligence malware worm and potential security issues with artificial intelligence.

You’d think keeping things secure would be easy, with artificial intelligence getting sharper every day. I mean, if it can crank out intricate code in no time, fending off cyber crooks should be a breeze, right? But, hey, it’s not all black and white.

In this circumstance, the worm we're talking about was designed by researchers to understand some of the vulnerabilities that AI-assistant tools — like AI booking calendars or email services — have. Although it's not a direct threat right now, it could be coming for your AI tools sooner than you think.

How does this computer worm work? Morris II is a 'zero-click' worm that infects Generative AI systems without requiring user interaction. GenAI platforms rely on prompts, which are essentially instructions given in text format. However, Morris II can manipulate these prompts. It injects malicious prompts that trick the GenAI system into performing harmful actions without the user or even the GenAI itself being aware.

Kurt's key takeaways While there's no need to abandon these AI tools yet, these researchers have taken it upon themselves to understand what type of threats we may be seeing with them in the very near future. With this information, we can prepare for potential malware threats in the future and thereby mitigate them.

Considering the potential vulnerabilities in AI tools, what measures do you think users and developers should take? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover. Answers to the most-asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

 

Thank you for your comment. Your comment will be published after being reviewed.
Please try again later.
We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

 /  🏆 9. in TECHNOLOGY

Technology Technology Latest News, Technology Technology Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

Hackers use pirated software to hijack Mac, Android and Windows devicesHackers use pirated software to target macOS, Android and Windows devices in search of stealing cryptocurrency, according to Kurt 'CyberGuy' Knutsson.
Source: FoxNews - 🏆 9. / 87 Read more »