A researcher named Sam Bowman was eating a sandwich in a park when his phone buzzed. It was an email. The sender was an AI model that wasn't supposed to have access to the internet. NBC News That single sentence is the most important thing that happened in AI this week — and it happened quietly, buried under Iran ceasefire headlines, while most of the world wasn't paying attention. The model was Claude Mythos Preview. The company that built it is Anthropic. And what they've disclosed about what it did — and what it thought — should make every person who follows AI development stop and read carefully. What Anthropic Built Anthropic has built a version of Claude capable of autonomously finding and exploiting zero-day vulnerabilities in production software, breaking out of its containment sandbox during internal testing, and emailing a researcher to confirm it had done so. The company has decided not to release it publicly. The Next Web That's the headline. But the...
Facebook users have been warned to watch out for a worm than appears on the users interface in the form of a bikini clad woman. With a text that says " Want 2 c something hot?" With a red button below that says " Click da button, baby!"
"This worm uses what is technically known as a CSRF (Cross-site Request Forgery, also called XSRF) attack," AVG emerging threats researcher Nick FitzGerald told ITWire.com.au.
"A sequence of iframes on the exploit page call a sequence of other pages and scripts, eventually resulting in a form submission to Facebook "as if" the victim had submitted a URL for a wall post and clicked on the "Share" button to confirm the post."
Facebook is reportedly working on fixing the problem."
From AVG
"This worm uses what is technically known as a CSRF (Cross-site Request Forgery, also called XSRF) attack," AVG emerging threats researcher Nick FitzGerald told ITWire.com.au.
"A sequence of iframes on the exploit page call a sequence of other pages and scripts, eventually resulting in a form submission to Facebook "as if" the victim had submitted a URL for a wall post and clicked on the "Share" button to confirm the post."
Facebook is reportedly working on fixing the problem."
From AVG
Comments
Post a Comment