Connect with us

Technology

OpenAI says its latest GPT-4o model is ‘medium’ risk

Published

on

OpenAI says its latest GPT-4o model is ‘medium’ risk

OpenAI has released its GPT-4o System Card, a research document that outlines the safety measures and risk evaluations the startup conducted before releasing its latest model.

GPT-4o was launched publicly in May of this year. Before its debut, OpenAI used an external group of red teamers, or security experts trying to find weaknesses in a system, to find key risks in the model (which is a fairly standard practice). They examined risks like the possibility that GPT-4o would create unauthorized clones of someone’s voice, erotic and violent content, or chunks of reproduced copyrighted audio. Now, the results are being released.

According to OpenAI’s own framework, the researchers found GPT-4o to be of “medium” risk. The overall risk level was taken from the highest risk rating of four overall categories: cybersecurity, biological threats, persuasion, and model autonomy. All of these were deemed low risk except persuasion, where the researchers found some writing samples from GPT-4o could be better at swaying readers’ opinions than human-written text — although the model’s samples weren’t more persuasive overall.

An OpenAI spokesperson, Lindsay McCallum Rémy, told The Verge that the system card includes preparedness evaluations created by an internal team, alongside external testers listed on OpenAI’s website as Model Evaluation and Threat Research (METR) and Apollo Research, both of which build evaluations for AI systems.

Moreover, the company is releasing a highly capable multimodal model just ahead of a US presidential election. There’s a clear potential risk of the model accidentally spreading misinformation or getting hijacked by malicious actors — even if OpenAI is hoping to highlight that the company is testing real-world scenarios to prevent misuse.

Advertisement

There have been plenty of calls for OpenAI to be more transparent, not just with the model’s training data (is it trained on YouTube?), but with its safety testing. In California, where OpenAI and many other leading AI labs are based, state Sen. Scott Wiener is working to pass a bill to regulate large language models, including restrictions that would hold companies legally accountable if their AI is used in harmful ways. If that bill is passed, OpenAI’s frontier models would have to comply with state-mandated risk assessments before making models available for public use. But the biggest takeaway from the GPT-4o System Card is that, despite the group of external red teamers and testers, a lot of this relies on OpenAI to evaluate itself.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Red Rooms makes online poker as thrilling as its serial killer

Published

on

Red Rooms makes online poker as thrilling as its serial killer

It’s rare for a movie to get technology right. And it’s even rarer for that movie to be a thriller or horror, where realism takes a backseat to scares and tension. But Red Rooms mostly gets it. Nothing takes me out of a film quicker than a tech MacGuffin that might as well be literal magic. Yes, the phrase “dark web” will always sound a bit silly, but at no point during its 118 minutes does the tech become a distraction.

It’s not the tech that makes Red Rooms great, though. It’s just something that could have easily tanked an otherwise excellent movie. What carries the film is the expert tension building by director Pascal Plante. The perfect slow-burn pacing. And the incredible performances by Juliette Gariépy as Kelly-Anne and Laurie Babin as Clementine.

The film centers mostly on Kelly-Anne, a model / hacker / professional gambler who attends the trial of serial killer Ludovic Chevalier. She befriends Clementine, a fan of Chevalier who insists that he is being framed.

Clementine neurotically and loudly defends Chevalier, calling into TV shows and shouting at reporters outside the courtroom. She makes a spectacle of herself. But Kelly-Anne remains more mysterious, her motives unclear. Even at the end of the film, there is ambiguity about what she was trying to accomplish and why.

The ambiguity is part of what makes Red Rooms so enthralling. The movie feels unpredictable. None of the characters seem trustworthy or relatable. The world they inhabit is familiar, yet uncanny.

Advertisement

The movie lingers in that discomfort for long periods of time, making you squirm. Giving you the opportunity to play through all the possible scenarios that could play out in your head. Is Chevalier really the killer? Is Kelly-Anne the killer? Was one of the victim’s mothers an accomplice? Is the prosecutor keeping a secret?

The movie inches along, drawing out a tale of kidnapping, live-streamed torture, and snuff films before erupting into a climax that unexpectedly mines online poker and Bitcoin for legitimate drama. It’s ultimately less about the murders themselves than it is about obsession, internet bubbles, and the media. It almost feels like a grimier companion piece to David Fincher’s Gone Girl.

Continue Reading

Technology

FBI email hack shows why you must lock down your tech

Published

on

FBI email hack shows why you must lock down your tech

NEWYou can now listen to Fox News articles!

Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.

Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.

No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.

FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY

Advertisement

Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)

Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

What happened in the FBI director’s email hack

Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.

The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.

The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.

Advertisement

A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.

The threat is real and it is getting more sophisticated

This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:

  • Donald Trump Jr.
  • Todd Blanche
  • Lindsey Halligan

These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.

Why your everyday tech is now part of the battlefield

Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.

Once hackers get in, they can:

  • Map out your life through old messages
  • Steal personal photos or financial details
  • Impersonate you in scams
  • Use your contacts to spread attacks

FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)

In simple terms, your digital life can be used against you or someone you know. 

Advertisement

IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD

What you need to do right now to lock down your tech

I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.

1) Turn on two-factor authentication everywhere

Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.

2) Stop reusing passwords

If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Clean out your “digital junk drawer”

Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.

Advertisement

4) Watch for highly targeted phishing

These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

5) Consider using a data removal service

Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.

 6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.

7) Separate your digital life

Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)

Advertisement

8) Use passkeys where available

Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.

Kurt’s key takeaways

The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.

What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2026 CyberGuy.com.  All rights reserved.  

Continue Reading

Technology

The best deals we’ve found from Amazon’s Big Spring Sale (so far)

Published

on

The best deals we’ve found from Amazon’s Big Spring Sale (so far)

Amazon loves to manufacture an event. March is historically a dry spell for deals; however, with Amazon’s third annual Big Spring Sale, which runs through March 31st, the retail behemoth is hoping to lure in would-be shoppers with the promise of steep(ish) savings and discounts on more seasonal, spring-centric items to hold folks over until Prime Day surfaces at the onset of summer.

The bulk of the deals we’re seeing right now aren’t quite on par with Black Friday or Prime Day, and, as with most shopping events, not everything on sale is worth picking up. That said, Amazon’s latest sale is one of the first big opportunities we’ve seen this year to save — and bypass some tariff-induced pain — especially since some of our favorite gadgets are currently matching their lowest prices to date, including headphones, robot vacuums, and a slew of charging accessories.

To help you sift through it all, we’re focusing squarely on the gadgets that are actually worth picking up, many of which we’ve tested and recommend even at full price. You’re not limited to Amazon, either. Retailers like Best Buy and Walmart are offering the same deals in a lot of cases, meaning you don’t necessarily need to succumb to shopping at the so-called “Everything Store” just to save a buck (or 50).

Headphone and earbud deals

Streaming and soundbar deals

Advertisement

Fitness tracker and smartwatch deals

Other Verge-approved deals

Update, March 28th: Adjusted to reflect current pricing / availability and several new deals, including those for Apple’s latest entry-level iPad, the Breville Barista Express, and JBL’s Flip 7 speaker.

Continue Reading
Advertisement

Trending