Blog

November 25, 2024
Car hacking — how does it happen?

We analyze how the car cybersecurity research has evolved using the example of attacks targeting Chevy Impala in 2010, Jeep Cherokee in 2015 and Kia in 2024, as well as how the speed of automakers’ response to discovered vulnerabilities has changed over the years.

November 25, 2024
Battle for survival: AI companies versus right holders

How copyright lawsuits can change the AI-industry and the Internet as we know it

October 7, 2024
What is the Risk-Based Vulnerability Management?

In this post we explain the basic principles and features of Risk-Based Vulnerability Management, and also how the CICADA8 platform helps in implementing this approach to prioritizing vulnerabilities.

October 7, 2024
Dialogue Neural Networks: How Chatbots Become Companions in Everyday Life

What are the areas of application of “humanized” chatbots and what impact do they have on the lives of the people who interact with them.

August 12, 2024
The Ways Different Countries Label AI Content

August 12, 2024
Are All Free VPNs Unsafe?

An independent test of the 100 most popular free VPN apps on Android found not a single app fully delivering on its privacy promises.

July 9, 2024
Face Recognition: How Biometric Systems Are Deceived

Facial recognition biometrics is used to unlock smartphones, access offices, pay a fare and for purchases, for remote connection to bank services. Biometric system saves time for both those who are verified and those who verify, that is why they ask you more and more often to “smile for a camera”. Yet, such verification should not be relied on completely, it can be deceived in different ways - from paper masks to AI deepfakes.

July 4, 2024
Digital Avatars are the Future of Video Marketing

What is a digital avatar, how do they work, who and why may need them - we explain based on the example of four projects that offer services of AI avatar creation.

June 20, 2024
Kids in the Cage: Why Parental Control Systems Should Consider the Child’s Needs

What parental control applications do, how effective they are, and how they may evolve.

June 13, 2024
Lie to Me, AI

The Way Deepfakes Are Used for Fraud, Hooliganism and Revenge

Leave us a message

Would you like to be one of our first customers?