• progress_activity cloud_sync

    Reconnection to the server…

    Movim cannot talk with the server, please try again later

  • back_to_tab fullscreen tile_small dialpad mic videocam switch_camera screen_share

    mic_none No sound detected from your microphone


    • Public subscriptions

    • chevron_right

      Blue

    • chevron_right

      Miho

  • Register Login

    Movim

    chat.macaw.me


  • group_work rss_feed
    add Follow

    ArsTechnica

    • Ar chevron_right

      The rise of Moltbook suggests viral AI prompts may be the next big security threat

      news.movim.eu / ArsTechnica • 3 February 2026

    On November 2, 1988, graduate student Robert Morris released a self-replicating program into the early Internet. Within 24 hours, the Morris worm had infected roughly 10 percent of all connected computers, crashing systems at Harvard, Stanford, NASA, and Lawrence Livermore National Laboratory. The worm exploited security flaws in Unix systems that administrators knew existed but had not bothered to patch.

    Morris did not intend to cause damage. He wanted to measure the size of the Internet. But a coding error caused the worm to replicate far faster than expected, and by the time he tried to send instructions for removing it, the network was too clogged to deliver the message.

    History may soon repeat itself with a novel new platform: networks of AI agents carrying out instructions from prompts and sharing them with other AI agents, which could spread the instructions further.

    Read full article

    Comments

    • tagai tagsecurity tagbiz & it tagmachine learning tagagentic ai tagai security tagai agents tagcryptocurrency tagpeter steinberger tagai alignment tagai ethics tagmoltbook tagmoltbot tagopenclaw tagprompt injection tagai safety tagai self-preservation tagmoltbunker tagp2p tagprompt worm

    • Pictures 1 image

    • visibility
  • cloud_queue

    Powered by Movim