security question
Assessment of LLM Responses to End-user Security Questions
Prakash, Vijay, Lee, Kevin, Bhattacharya, Arkaprabha, Huang, Danny Yuxing, Staddon, Jessica
Answering end user security questions is challenging. While large language models (LLMs) like GPT, LLAMA, and Gemini are far from error-free, they have shown promise in answering a variety of questions outside of security. We studied LLM performance in the area of end user security by qualitatively evaluating 3 popular LLMs on 900 systematically collected end user security questions. While LLMs demonstrate broad generalist ``knowledge'' of end user security information, there are patterns of errors and limitations across LLMs consisting of stale and inaccurate answers, and indirect or unresponsive communication styles, all of which impacts the quality of information received. Based on these patterns, we suggest directions for model improvement and recommend user strategies for interacting with LLMs when seeking assistance with security.
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > Massachusetts > Suffolk County > Boston (0.04)
- North America > United States > Maryland > Baltimore (0.04)
- (6 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.46)
Self-Recognition in Language Models
Davidson, Tim R., Surkov, Viacheslav, Veselovsky, Veniamin, Russo, Giuseppe, West, Robert, Gulcehre, Caglar
A rapidly growing number of applications rely on a small set of closed-source language models (LMs). This dependency might introduce novel security risks if LMs develop self-recognition capabilities. Inspired by human identity verification methods, we propose a novel approach for assessing self-recognition in LMs using model-generated "security questions". Our test can be externally administered to keep track of frontier models as it does not require access to internal model parameters or output probabilities. We use our test to examine self-recognition in ten of the most capable open- and closed-source LMs currently publicly available. Our extensive experiments found no empirical evidence of general or consistent self-recognition in any examined LM. Instead, our results suggest that given a set of alternatives, LMs seek to pick the "best" answer, regardless of its origin. Moreover, we find indications that preferences about which models produce the best answers are consistent across LMs. We additionally uncover novel insights on position bias considerations for LMs in multiple-choice settings.
Company that launched 2FA is pioneering AI for digital identity
Joe Burton, CEO of digital identity authentication company Telesign, spoke with TechRepublic about how the "fuzzy" realm between statistical analysis and artificial intelligence can fuel global, fast and accurate identity management. Telesign may have been instrumental in the development of two-factor authentication, but it has a marginal share of a market dominated by companies like Persona, OpenID, Okta, Duo Security and LastPass. Burton said the company is looking forward, with big plans to use new technologies and services powered by AI to set itself apart from competitors. A key approach since 2019 has been evolving its Communications Platform-as-a-Service leadership, dispensing with passwords and focusing on mobile numbers for identity verification, data modeling and customized communications. SEE: 1Password's Steve Won: Passwords will soon be past tense.
Is Artificial Intelligence The Future Of Client Verification & Authentication?
Artificial Intelligence used to be a fancy word in the past, a system that was going to change the world overnight. Well, it is everywhere these days but the pace for that proposed change is rather evolutionary, slowly taking over manual operations and processes. The biggest playground of AI is in Data Science, including data extraction and processing. But, it is less about diddling fancy terms and more about the result; the urge to reach meaningful conclusions in the least possible time. The advent and maturation of digital services, such as banking, shopping, etc, called for better processes to ensure the identity of users both during onboarding and during the completion of a transaction.
Breaking up or getting divorced? How to remove your ex from your digital life
You get married or move in together, and your lives are tied in countless ways: a mortgage, the power bill, and your relationship status on social media sites. Then it ends, and you're left with a lot of heartaches and a lot of work. It's bad enough thinking about everything strangers know about you. Tap or click for the steps to do a thorough background check on yourself, so you know what others can dig up. Someone who knows you well has access to so much more info.
- Information Technology > Communications > Social Media (0.94)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.50)
Breaking up or getting divorced? How to remove your ex from your digital life
Fox News Flash top headlines are here. Check out what's clicking on Foxnews.com. You get married or move in together, and your lives are tied in countless ways: a mortgage, the power bill, and your relationship status on social media sites. Then it ends, and you're left with a lot of heartache and a lot of work. It's bad enough thinking about everything strangers know about you.
- Leisure & Entertainment (0.97)
- Information Technology > Security & Privacy (0.72)
- Media > Radio (0.71)
- Information Technology > Communications > Social Media (0.93)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.31)
Mum and Dad are our biggest security risk! - IoT global network
Your mother's maiden name – the name of your first pet – the city you were born in. What do these all have in common? Not only are they popular security questions for online authentication but given the culture and our tendency to overshare on social media, they are no longer the most "secure" security questions. With sites like Facebook growing in popularity with the over 55s, are our loving parents actually the weakest line of defence in protecting our digital identities? If they insist on posting personal information on our behalf, says Callsign CMO and go-to-market strategy head Sarah Whipp, have we exposed ourselves more than we realise?
That royal wedding quiz filling your Facebook could put you at risk for identity theft
We tested Alexa, Siri and Google Home to see which digital assistant knows most about the Royal Wedding. SAN FRANCISCO -- A funny as Lord Carpenter Rover of Sunnyside might sound, please don't reply to a Facebook prompt asking you to create your royal wedding guest name using details from your past. Facebook is always awash in sharable quizzes and prompts (remember'Tell us your first 10 rock concerts' last year?) But it also puts you in real danger of identity theft. Much as other, more adult, prompts have asked users to create and forward along their "porn star" name, this one helps you craft an aristocratic title from seemingly innocuous items from your family and your past.
- Information Technology > Security & Privacy (1.00)
- Leisure & Entertainment > Social Events (0.93)
What is the future of artificial intelligence?
In 2017, the predictive ability of artificial intelligence (AI) powered many new tools and platforms. So what does 2018 have in store for AI? I asked some marketers to find out. Gregg Johnson, CEO of Invoca, a call tracking and analytics service, says that 2018 will be "the year the voice trend becomes undeniable." "As people increasingly trade typing for talking, we'll see more companies invest in developing for voice interfaces," Johnson said.
Context for connections: improving security with behavioral biometrics
This is a guest post by Ethan Ayer, CEO of Resilient Network Systems. With faceprints, voiceprints and iris scans beginning to replace passwords in everything from police work to amusement park admission, behavioral biometrics is becoming one of IT security's hottest trends. With promising contenders in Scandinavia to stateside biometrics companies being snapped up by the likes of MasterCard and others, the security race is on as organizations move to understand--and adopt--behavioral biometrics technology. IT security is a central concern for organizations as they seek to keep intellectual property and customer information secure. In today's threat climate, passwords and security questions are no longer enough to dissuade hackers.
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Vision (0.35)