By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR
News

Security Researchers Hacked Google Calendar Using AI And Hidden Text In Images – BGR

News Room
Last updated: 2025/08/26 at 9:16 PM
News Room Published 26 August 2025
Share
SHARE






Kenneth Cheung/Getty Images

AI is an impressive tool, and companies like Google and OpenAI continue to improve and expand upon what their models can do. At the same time, generative AI chatbots are also becoming bigger targets for bad actors, and now security researchers have found a way to hack someone’s Google Calendar using text hidden inside of high-resolution images.

Security researchers from The Trail of Bits Blog claim that they were able to harness the image scaling systems that AI like Gemini uses to process images added to its prompts. This allowed the group to send a set of hidden instructions to the AI, which was then able to retrieve information from a Google Calendar account and email it to themselves — all without alerting the user.

Image scaling attacks like this used to be more common, and the researchers note that they “were used for model backdoors, evasion, and poisoning primarily against older computer vision systems that enforced a fixed image size.” This attack has become less common, but it seems a similar approach can be taken to send hidden instructions to a large language model like Google’s Gemini, which raises concerns over AI safety as Gemini and other AI move into our homes and AI potentially advances beyond our comprehension.

How the AI-powered attack works

An exploit such as this works because LLMs like GPT-5 and Gemini automatically downscale high-resolution images to process them more quickly and efficiently. However, this downscaling is how the researchers were able to take advantage of the AI and send hidden instructions to the chatbot. While the exact process may change based on the system — as each system has a different image resampling algorithm — they all provide what the researchers describe as “aliasing artifacts” that can allow for patterns to be hidden within an image. These patterns then only appear when the image is downscaled, as they become more visible thanks to the artifacting.

In the example that the researchers provided, the image uploaded to Gemini has sections of a black background that turn red during the resampling process. This causes hidden text with instructions to appear when the image is rescaled, which the chatbot will see and follow. In this case, the instructions told the chatbot to check the user’s calendar and email any upcoming events to the researcher’s email address.

This might not become a mainstream attack vector for hackers, but considering they have already found ways to use infected calendar invites to take control of a smart home, any possible threat needs to be analyzed in order to find solutions that protect users from falling prey to bad actors. That’s especially true as hackers continue to use AI to break AI in terrifying new ways.



Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Dead Reckoning Meets Radar Odometry | HackerNoon
Next Article Reducing Drift in GNSS-Denied Environments with Radar Odometry | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Parallels Desktop 26 Arrives for Better Windows Virtualization on Mac
News
AI CRM firm Attio raises £40m in Google Ventures-led Series B – UKTN
News
Google Translate Rolls Out Live Translation And Practice Features On iOS, Android: How To Use Them
Mobile
ViewSonic XG275D-4K Review: Two Gaming Modes in One Excellent Monitor
News

You Might also Like

News

Parallels Desktop 26 Arrives for Better Windows Virtualization on Mac

4 Min Read
News

AI CRM firm Attio raises £40m in Google Ventures-led Series B – UKTN

2 Min Read
News

ViewSonic XG275D-4K Review: Two Gaming Modes in One Excellent Monitor

3 Min Read
News

Anthropic launches Claude Chrome extension: How to try it

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?