threats

395 articles

Protecting LLM chats from the eavesdropping Whisper Leak attack

How to eavesdrop on a neural network

The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.

How scammers have mastered AI: deepfakes, fake websites, and phishing emails

How phishers and scammers use AI

Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.

What are money mules, and how to avoid accidentally becoming one

How to avoid becoming a money mule

This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.