{"version":"1.0","provider_name":"SnT FR","provider_url":"https:\/\/www.uni.lu\/snt-fr","author_name":"SnT FR","author_url":"https:\/\/www.uni.lu\/snt-fr","title":"AI: A Double-Edged Sword in Cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yGooFTpC9K\"><a href=\"https:\/\/www.uni.lu\/snt-fr\/news\/ai-a-double-edged-sword-in-cybersecurity\/\">AI: A Double-Edged Sword in Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.uni.lu\/snt-fr\/news\/ai-a-double-edged-sword-in-cybersecurity\/embed\/#?secret=yGooFTpC9K\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0AI: A Double-Edged Sword in Cybersecurity\u00a0\u00bb &#8212; SnT FR\" data-secret=\"yGooFTpC9K\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/11\/ai_a_double_edged_sword_in_cybersecurity.jpg","thumbnail_width":800,"thumbnail_height":600,"description":"In recent decades, corporations and researchers have been developing artificial intelligence tools with the aim to streamline processes and boost efficiency. The sophisticated technologies have revolutionist countless industries, with software that can mimic human intelligence. But as the desire for automated tools in our society grows, the need for strong cybersecurity practices becomes all the more important."}