DEV Community

HelixCipher profile picture

HelixCipher

Data scientist specialized in AI & Machine Learning with a passion for Cybersecurity.

When light becomes a weapon: laser-based command injection attacks on voice assistants

When light becomes a weapon: laser-based command injection attacks on voice assistants

1
Comments
2 min read
How to Train Your Antivirus: RL to harden malware detectors

How to Train Your Antivirus: RL to harden malware detectors

Comments
1 min read
DeepLocker — when AI hides the trigger inside malware (demo from IBM Research)

DeepLocker — when AI hides the trigger inside malware (demo from IBM Research)

Comments
2 min read
LANTENNA — exfiltrating data from air-gapped systems via Ethernet cables

LANTENNA — exfiltrating data from air-gapped systems via Ethernet cables

Comments
1 min read
Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants

Comments
2 min read
When browser extensions become live surveillance

When browser extensions become live surveillance

1
Comments
1 min read
What If Privacy Is a Habit, Not a Tool?

What If Privacy Is a Habit, Not a Tool?

Comments
2 min read
Who’s Really Controlling Your Hiring Algorithm?

Who’s Really Controlling Your Hiring Algorithm?

1
Comments
2 min read
Do You Know What Your Model Is Doing Right Now?

Do You Know What Your Model Is Doing Right Now?

Comments
2 min read
Security Starts Earlier Than Some Might Think

Security Starts Earlier Than Some Might Think

Comments
2 min read
Exploring Emoji-Based Prompt Manipulation in LLMs

Exploring Emoji-Based Prompt Manipulation in LLMs

Comments
1 min read
When AI Remembers Too Much — security, the right to be forgotten and architecture

When AI Remembers Too Much — security, the right to be forgotten and architecture

Comments 1
1 min read
The Interview Looked Real — The Candidate Wasn’t

The Interview Looked Real — The Candidate Wasn’t

1
Comments
2 min read
Zero-Day Exploit in the Wild

Zero-Day Exploit in the Wild

Comments
1 min read
Who Designs the Future of AI When AI Designs Itself?

Who Designs the Future of AI When AI Designs Itself?

Comments 1
1 min read
When Your Mouse Becomes a Microphone

When Your Mouse Becomes a Microphone

Comments
1 min read
The CAPTCHA Lie: How “Human Checks” Are Being Weaponized

The CAPTCHA Lie: How “Human Checks” Are Being Weaponized

Comments
1 min read
One Click Is All It Takes: Inside Copilot’s “Reprompt” Vulnerability

One Click Is All It Takes: Inside Copilot’s “Reprompt” Vulnerability

1
Comments
1 min read
When AI Tries to contact the FBI

When AI Tries to contact the FBI

Comments
2 min read
Goodbye, Price Tags. Hello, Dynamic Pricing

Goodbye, Price Tags. Hello, Dynamic Pricing

Comments
2 min read
When AI Finishes Your Thoughts: The Rise of Generative Brain Implants

When AI Finishes Your Thoughts: The Rise of Generative Brain Implants

Comments
1 min read
Public restrooms requiring ad views for toilet paper

Public restrooms requiring ad views for toilet paper

Comments
1 min read
Bluetooth On, Boundaries Off? The Hidden Security Cost of Convenience

Bluetooth On, Boundaries Off? The Hidden Security Cost of Convenience

Comments
1 min read
What Your Bluetooth Accessories Can Reveal Without You Knowing

What Your Bluetooth Accessories Can Reveal Without You Knowing

1
Comments
1 min read
U.S. Defense Agencies Turn to AI for Cyber Capabilities

U.S. Defense Agencies Turn to AI for Cyber Capabilities

Comments
2 min read
Seeing Humans in 3D Through Wi‑Fi: A Approach to Body Mesh Reconstruction

Seeing Humans in 3D Through Wi‑Fi: A Approach to Body Mesh Reconstruction

Comments
1 min read
Burning Zero-Days to Stay Alive: Inside the Predator Spyware Playbook

Burning Zero-Days to Stay Alive: Inside the Predator Spyware Playbook

Comments
1 min read
When Phishing Learns to Think: AI-Powered Kits and the Next Wave of Account Takeovers

When Phishing Learns to Think: AI-Powered Kits and the Next Wave of Account Takeovers

Comments
1 min read
Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience

Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience

Comments
2 min read
Russian artificial intelligence

Russian artificial intelligence

Comments
1 min read
When Brain Signals Become Stories: Reconstructing Dreams with AI

When Brain Signals Become Stories: Reconstructing Dreams with AI

Comments
1 min read
Models that deliberately withhold or distort information despite knowing the truth.

Models that deliberately withhold or distort information despite knowing the truth.

Comments
2 min read
How AI Is Making Everything More Expensive

How AI Is Making Everything More Expensive

Comments
2 min read
When “End-to-End Encrypted” Meets the Bathroom: Why Precision in Privacy Claims Matters

When “End-to-End Encrypted” Meets the Bathroom: Why Precision in Privacy Claims Matters

1
Comments
1 min read
What Happens When Your Operating System Starts Acting on Your Behalf?

What Happens When Your Operating System Starts Acting on Your Behalf?

Comments
1 min read
Using AI to identify and fix critical software vulnerabilities

Using AI to identify and fix critical software vulnerabilities

Comments 1
1 min read
Security with AI

Security with AI

Comments
1 min read
Medivis SurgicalAR

Medivis SurgicalAR

Comments
1 min read
AlphaFold

AlphaFold

Comments
1 min read
How Much Does The Internet Weigh?

How Much Does The Internet Weigh?

Comments
1 min read
How China Is Using Artificial Intelligence in Classrooms | WSJ

How China Is Using Artificial Intelligence in Classrooms | WSJ

Comments
1 min read
The Prison Break | Think Like A Coder, Ep 1

The Prison Break | Think Like A Coder, Ep 1

Comments
1 min read
Teaching AI to Escape: The Power of Deep Reinforcement Learning

Teaching AI to Escape: The Power of Deep Reinforcement Learning

Comments
1 min read
Teaching AI to Play Tag: A Look into Deep Reinforcement Learning

Teaching AI to Play Tag: A Look into Deep Reinforcement Learning

Comments
1 min read
Discover the World of AI and Deep Reinforcement Learning

Discover the World of AI and Deep Reinforcement Learning

Comments
1 min read
Making data mean more through storytelling | Ben Wellington | TEDxBroadway

Making data mean more through storytelling | Ben Wellington | TEDxBroadway

Comments
2 min read
Turning Bad Charts into Compelling Data Stories | Dominic Bohan | TEDxYouth@Singapore

Turning Bad Charts into Compelling Data Stories | Dominic Bohan | TEDxYouth@Singapore

Comments
1 min read
How A.I. is helping doctors detect cancer

How A.I. is helping doctors detect cancer

Comments
1 min read
Live brain surgery: see how doctors are using A.I. in the O.R.

Live brain surgery: see how doctors are using A.I. in the O.R.

Comments
1 min read
loading...