Blog
We analyze how the car cybersecurity research has evolved using the example of attacks targeting Chevy Impala in 2010, Jeep Cherokee in 2015 and Kia in 2024, as well as how the speed of automakers’ response to discovered vulnerabilities has changed over the years.
How copyright lawsuits can change the AI-industry and the Internet as we know it
In this post we explain the basic principles and features of Risk-Based Vulnerability Management, and also how the CICADA8 platform helps in implementing this approach to prioritizing vulnerabilities.
What are the areas of application of “humanized” chatbots and what impact do they have on the lives of the people who interact with them.
An independent test of the 100 most popular free VPN apps on Android found not a single app fully delivering on its privacy promises.
Facial recognition biometrics is used to unlock smartphones, access offices, pay a fare and for purchases, for remote connection to bank services. Biometric system saves time for both those who are verified and those who verify, that is why they ask you more and more often to “smile for a camera”. Yet, such verification should not be relied on completely, it can be deceived in different ways - from paper masks to AI deepfakes.
What is a digital avatar, how do they work, who and why may need them - we explain based on the example of four projects that offer services of AI avatar creation.
What parental control applications do, how effective they are, and how they may evolve.
The Way Deepfakes Are Used for Fraud, Hooliganism and Revenge