您现在的位置是:WormGPT: What to know about ChatGPT's malicious cousin >>正文

WormGPT: What to know about ChatGPT's malicious cousin

后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden6653人已围观

简介cihatatceken/Getty ImagesWhen ChatGPT was made available to the public in 2022, the AI chatbot took ...

cihatatceken/Getty Images

When ChatGPT was made available to the public in 2022, the AI chatbot took the world by storm. 

The software is developed by OpenAI, an AI and research company. ChatGPT is a natural language processing tool that is able to answer queries and provide information gleaned from datasets. It has become a valued tool for on-the-fly information gathering, analysis, and writing tasks for millions of users worldwide. 

cybersecurity-sf-custom-thumb-2023

Cybersecurity Best Practices for Protecting your Digital Assets

Face it: Your personal and business data is under threat 24/7 -- and protecting those digital assets while you shop, bank, and play online remains job one. Here's the good news: More security-focused tools and strategies are available than ever. ZDNET's most up-to-date cybersecurity guides deliver practical tips to stay safe and productive today amid the ever-evolving threat landscape tomorrow.

Read now

The first publicly available version of ChatGPT had a significant limitation: It could not access the internet. However, paying subscribers can now use browser plugins to allow the chatbot to access the web in real time and it will provide links to the sources used for its responses. 

While some experts believe the technology could reach an internet level of disruption, others note that ChatGPT demonstrates 'confident inaccuracy.' Students in droves have been caught plagiarizing coursework by way of the tool. Unless datasets are verified, ChatGPT and other large language models (LLMs) could become unwitting spreaders of misinformation and propaganda. 

Also: The best AI chatbots

Indeed, now the chatbot can access the web, it will be interesting to see the long-term impact on the validity of its results and responses. 

gettyimages-1377539241.jpg8 habits of highly secure remote workers spy-big-brother-digital-surveillance-istock.jpgHow to find and remove spyware from your phone Best VPN serviceThe best VPN services: How do the top 5 compare? data breachHow to find out if you are involved in a data breach -- and what to do next gettyimages-1377539241.jpg8 habits of highly secure remote workers
  • spy-big-brother-digital-surveillance-istock.jpgHow to find and remove spyware from your phone
  • Best VPN serviceThe best VPN services: How do the top 5 compare?
  • data breachHow to find out if you are involved in a data breach -- and what to do next

  • Editorial standards Show Comments

    Tags:

    相关文章

    

    友情链接