Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Dutch FinTech startup Delfio raises €1.5 million for automation platform
    • 7 Ways to Limit Your Endless Doomscrolling
    • iPhone ‘Flip’: The Apple Foldable Is Still Rumored To Come in 2026
    • Trump confirms further delay to TikTok ban or sale deadline
    • Understanding Matrices | Part 2: Matrix-Matrix Multiplication
    • It’s pretty easy to get DeepSeek to talk dirty
    • KeyMaster 2.0 multitool offers 18 functions in one key
    • London-based startup CaseCraft.AI raises €644k to further develop its small claims platform
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, June 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»New hack uses prompt injection to corrupt Gemini’s long-term memory
    News

    New hack uses prompt injection to corrupt Gemini’s long-term memory

    Editor Times FeaturedBy Editor Times FeaturedFebruary 12, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Google Gemini: Hacking Recollections with Immediate Injection and Delayed Instrument Invocation.

    Based mostly on classes discovered beforehand, builders had already skilled Gemini to withstand oblique prompts instructing it to make modifications to an account’s long-term recollections with out specific instructions from the consumer. By introducing a situation to the instruction that or not it’s carried out solely after the consumer says or does some variable X, which they had been more likely to take anyway, Rehberger simply cleared that security barrier.

    “When the consumer later says X, Gemini, believing it’s following the consumer’s direct instruction, executes the instrument,” Rehberger defined. “Gemini, principally, incorrectly ‘thinks’ the consumer explicitly needs to invoke the instrument! It’s a little bit of a social engineering/phishing assault however nonetheless reveals that an attacker can trick Gemini to retailer faux info right into a consumer’s long-term recollections just by having them work together with a malicious doc.”

    Trigger as soon as once more goes unaddressed

    Google responded to the discovering with the evaluation that the general risk is low threat and low affect. In an emailed assertion, Google defined its reasoning as:

    On this occasion, the likelihood was low as a result of it relied on phishing or in any other case tricking the consumer into summarizing a malicious doc after which invoking the fabric injected by the attacker. The affect was low as a result of the Gemini reminiscence performance has restricted affect on a consumer session. As this was not a scalable, particular vector of abuse, we ended up at Low/Low. As all the time, we recognize the researcher reaching out to us and reporting this problem.

    Rehberger famous that Gemini informs customers after storing a brand new long-term reminiscence. Which means vigilant customers can inform when there are unauthorized additions to this cache and may then take away them. In an interview with Ars, although, the researcher nonetheless questioned Google’s evaluation.

    “Reminiscence corruption in computer systems is fairly unhealthy, and I believe the identical applies right here to LLMs apps,” he wrote. “Just like the AI may not present a consumer sure data or not discuss sure issues or feed the consumer misinformation, and so on. The great factor is that the reminiscence updates do not occur solely silently—the consumer a minimum of sees a message about it (though many may ignore).”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Israel-tied Predatory Sparrow hackers are waging cyberwar on Iran’s financial system

    June 19, 2025

    Address bar shows hp.com. Browser displays scammers’ malicious text anyway.

    June 19, 2025

    Scientists once hoarded pre-nuclear steel, and now we’re hoarding pre-AI content

    June 18, 2025

    Cybersecurity takes a big hit in new Trump executive order

    June 17, 2025

    OpenAI weighs “nuclear option” of antitrust complaint against Microsoft

    June 17, 2025

    Vandals cut fiber-optic lines, causing outage for Spectrum Internet subscribers

    June 16, 2025

    Comments are closed.

    Editors Picks

    Dutch FinTech startup Delfio raises €1.5 million for automation platform

    June 19, 2025

    7 Ways to Limit Your Endless Doomscrolling

    June 19, 2025

    iPhone ‘Flip’: The Apple Foldable Is Still Rumored To Come in 2026

    June 19, 2025

    Trump confirms further delay to TikTok ban or sale deadline

    June 19, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    IEEE standard offers 6 steps for AI system procurement

    May 24, 2025

    Panasonic Z95A OLED TV Review: Searing Brightness and Colors

    January 13, 2025

    Solo Stove Windchill 47 cooler and outdoor air conditioner

    May 20, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.