By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR
News

Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR

News Room
Last updated: 2025/08/26 at 9:16 PM
News Room Published 26 August 2025
Share
SHARE






Kenneth Cheung/Getty Images

AI is an impressive tool, and companies like Google and OpenAI continue to improve and expand upon what their models can do. At the same time, generative AI chatbots are also becoming bigger targets for bad actors, and now security researchers have found a way to hack someone’s Google Calendar using text hidden inside of high-resolution images.

Security researchers from The Trail of Bits Blog claim that they were able to harness the image scaling systems that AI like Gemini uses to process images added to its prompts. This allowed the group to send a set of hidden instructions to the AI, which was then able to retrieve information from a Google Calendar account and email it to themselves — all without alerting the user.

Image scaling attacks like this used to be more common, and the researchers note that they “were used for model backdoors, evasion, and poisoning primarily against older computer vision systems that enforced a fixed image size.” This attack has become less common, but it seems a similar approach can be taken to send hidden instructions to a large language model like Google’s Gemini, which raises concerns over AI safety as Gemini and other AI move into our homes and AI potentially advances beyond our comprehension.

How the AI-powered attack works

An exploit such as this works because LLMs like GPT-5 and Gemini automatically downscale high-resolution images to process them more quickly and efficiently. However, this downscaling is how the researchers were able to take advantage of the AI and send hidden instructions to the chatbot. While the exact process may change based on the system — as each system has a different image resampling algorithm — they all provide what the researchers describe as “aliasing artifacts” that can allow for patterns to be hidden within an image. These patterns then only appear when the image is downscaled, as they become more visible thanks to the artifacting.

In the example that the researchers provided, the image uploaded to Gemini has sections of a black background that turn red during the resampling process. This causes hidden text with instructions to appear when the image is rescaled, which the chatbot will see and follow. In this case, the instructions told the chatbot to check the user’s calendar and email any upcoming events to the researcher’s email address.

This might not become a mainstream attack vector for hackers, but considering they have already found ways to use infected calendar invites to take control of a smart home, any possible threat needs to be analyzed in order to find solutions that protect users from falling prey to bad actors. That’s especially true as hackers continue to use AI to break AI in terrifying new ways.



Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Dead Reckoning Meets Radar Odometry | HackerNoon
Next Article Reducing Drift in GNSS-Denied Environments with Radar Odometry | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Why Today’s Junior Engineers May Never Grow Up | HackerNoon
Computing
This Deal Means Business: Save 40% on HP EliteBook 840 G10 Laptop
News
Struggling with GDPR-Compliant AI? IPFed Delivers Accuracy and Privacy | HackerNoon
Computing
Samsung’s VR Headset Tipped To Cost Nearly $2k, Still Less Than The Apple Vision Pro
News

You Might also Like

News

This Deal Means Business: Save 40% on HP EliteBook 840 G10 Laptop

4 Min Read
News

Samsung’s VR Headset Tipped To Cost Nearly $2k, Still Less Than The Apple Vision Pro

4 Min Read
News

Sony’s budget-friendly WH-CH520 wireless headphones are nearly half price at Amazon

3 Min Read
News

Android Auto Could Soon Get A Powerful Gemini Upgrade – BGR

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?