{"id":225846,"date":"2024-05-30T07:11:22","date_gmt":"2024-05-30T07:11:22","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/05\/30\/hackers-are-using-ai-to-find-software-bugs-but-there-is-a-downside\/"},"modified":"2025-06-25T17:18:27","modified_gmt":"2025-06-25T17:18:27","slug":"hackers-are-using-ai-to-find-software-bugs-but-there-is-a-downside","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/05\/30\/hackers-are-using-ai-to-find-software-bugs-but-there-is-a-downside\/","title":{"rendered":"Hackers are using AI to find software bugs &#8211; but there is a downside"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div id=\"\">\n<figure class=\"article-image-inline ArticleImage\" data-method=\"caption-shortcode\">\n<div class=\"ArticleImage__Wrapper\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=1200\" srcset=\"https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=100 100w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=200 200w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=249 249w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=300 300w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=400 400w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=500 500w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=600 600w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=700 700w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=800 800w, https:\/\/images.newscientist.com\/wp-content\/uploads\/2024\/05\/28144505\/SEI_205388489.jpg?width=900 900w\" class=\"image size-full wp-image-2433245 ReplaceImageLazyload\" sizes=\"(min-width: 1130px) 900px, (min-width: 1025px) 900, (min-width: 768px) calc(100vw - 30px), calc(100vw - 30px)\" alt=\"\" width=\"1350\" height=\"900\" data-credit=\"alengo\/Getty Images\" data-caption=\"Some bugs are easier to find than others\"\/><\/div><figcaption class=\"ArticleImageCaption\">\n<div class=\"ArticleImageCaption__CaptionWrapper\">\n<p class=\"ArticleImageCaption__Title\">Some bugs are easier to find than others<\/p>\n<p class=\"ArticleImageCaption__Credit\">alengo\/Getty Images<\/p>\n<\/div>\n<\/figcaption><\/figure>\n<\/p>\n<p>Ethical hackers are using artificial intelligence tools to find bugs in computer code and claim rewards worth thousands of dollars. However, others are using the same AI tools to generate realistic but nonsensical bug reports, making it hard to know which reports to trust.<\/p>\n<p>Bug <a href=\"https:\/\/www.newscientist.com\/article\/2353963-mathematical-trick-lets-hackers-shame-people-into-fixing-software-bugs\/\">bounty schemes<\/a> offer financial rewards for people who can find flaws in software. These schemes have been used in cybersecurity for decades to encourage people to report problems so programmers can shore up security, both in established\u2026<\/p>\n<\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.newscientist.com\/article\/2433247-hackers-are-using-ai-to-find-software-bugs-but-there-is-a-downside\/?utm_campaign=RSS%7CNSNS&#038;utm_source=NSNS&#038;utm_medium=RSS&#038;utm_content=home\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Some bugs are easier to find than others alengo\/Getty Images Ethical hackers are using artificial intelligence tools to find bugs in computer code and<\/p>\n","protected":false},"author":1,"featured_media":225847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[177],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/225846"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=225846"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/225846\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/225847"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=225846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=225846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=225846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}