Google Gemini is a Hacker’s Dream

Hackernews   article Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites The money quote: “The vulnerability, Miggo Security’s Head of Research, Liad Eliyahu, said, made it possible to circumvent Google Calendar’s privacy controls by hiding a dormant malicious payload within a standard calendar invite.”   How is it done? The starting point … Read more

If We Do Use AI How Should Small Business do that?

Why should a small business (or any business) need AI to run xyz function? Let’s say you want to create proposals and have older proposals and current products and other info at hand. I.e. how long does it take to create a proposal without AI? Let’s say you have some institutional knowledge and it takes … Read more

Create Guardrails for Company AI usage

Everyone wants to use AI – but what about the negative effects? Like losing data to the public – or “leaking data”? So how can AI be boxed in? Hallucinate less or not at all? how to create guard rails for AI to be used for company specific data Here’s a practical, battle-tested framework to … Read more

AI browsers Security Called Into Question – Make it secure after breach?

Futurism.com has a story on how Perplexity AI browser is not very good with security concerns: The vulnerability, known as an indirect prompt injection attack, is terrifyingly simple. “The vulnerability we’re discussing in this post lies in how Comet processes webpage content,” the blog reads. “When users ask it to ‘Summarize this webpage,’ Comet feeds … Read more

Q-Day the Encryption Breaking Armagaddon

Posed a question to Grok about the Q-day timeline – and it came back with this: The question is designed for small business and using the DEFCON presentation mentioned below. Possible Quantum Day (Q-Day) Timelines “Quantum Day” or Q-Day refers to the point when quantum computers become capable of breaking widely used classical encryption algorithms … Read more