Cybersecurity: AI attacks and hijacking
● AI and generative AI systems can be easily hijacked to generate malicious code, even when designed to reject such requests.
● Other types of attacks, known as "model evasion attacks," exploit modified inputs to cause unexpected behaviours in AIs, such as making a self-driving car misinterpret traffic signs.
● Poisoned data can introduce backdoors into AI models, leading to unintended behaviours, which is concerning due to the lack of control engineers have over their data sources.
Watch the video
● Other types of attacks, known as "model evasion attacks," exploit modified inputs to cause unexpected behaviours in AIs, such as making a self-driving car misinterpret traffic signs.
● Poisoned data can introduce backdoors into AI models, leading to unintended behaviours, which is concerning due to the lack of control engineers have over their data sources.
![](https://hellofuture.orange.com/app/uploads/2024/06/ATTAQUE-IA-_-19201080-ENG-750x422.png)
![](https://hellofuture.orange.com/app/uploads/2024/05/Quantum_Team_DATA-IA-960x620-1-420x236.jpg)
Achieving quantum communications via existing fiber infrastructures
Read the article![](https://hellofuture.orange.com/app/uploads/2024/03/nist_960-420x236.jpg)
Attacks on AI: data cleaning becomes a cybersecurity issue
Read the article![](https://hellofuture.orange.com/app/uploads/2024/03/quarks-960-420x236.jpg)
Quarks: decentralized and blockchain-secured instant messaging
Read the article![](https://hellofuture.orange.com/app/uploads/2023/11/GettyImages-cybersecurity-TrustSystem-960x620-1-420x236.jpg)
The Trust System Cybersecurity Challenge: Protection without Impacting User Experience
Read the article![](https://hellofuture.orange.com/app/uploads/2023/03/GettyImages-Blog-IoT-safety-960x620-1-420x236.jpg)
Monitoring the Security of Connected Personal Equipment in Real Time: How Could It Work?
Read the article![](https://hellofuture.orange.com/app/uploads/2022/12/crypto-legere-HELLO-FUTURE-960x620-1-420x236.png)