Alleged Bypass of iPhone X's Face ID within a Week by Hackers
In an astonishing claim, hackers reportedly developed a £115 mask capable of tricking the Face ID security system on the iPhone X within a w...
Read moreEvidence-based Transparent For governance
In an astonishing claim, hackers reportedly developed a £115 mask capable of tricking the Face ID security system on the iPhone X within a w...
Read moreRecent findings reveal that the iPhone X's Face ID, touted as a cutting-edge security feature, can be deceived by a low-cost mask. This inci...
Read moreUnraveling the intricacies behind Apple's Face ID, a state-of-the-art biometric security feature on iPhone X. Understand its capabilities, l...
Read moreRecent demonstrations by a Vietnamese firm have raised concerns about the security of Apple's Face ID system, a key feature of the iPhone X....
Read moreRecent demonstrations have highlighted a concerning vulnerability in Apple's Face ID system. A mask costing just $200 was able to fool the f...
Read moreRecent claims suggest that hackers have successfully bypassed Apple's Face ID security using a low-cost mask. This incident highlights the u...
Read moreRecent research has successfully bypassed Apple's Face ID, raising concerns about the security of facial recognition technology. The method...
Read moreContrary to misconceptions, Face ID has not been hacked. However, it's crucial to understand its security measures for responsible AI usage....
Read moreRecent research has demonstrated that Apple's highly-regarded Face ID facial recognition technology can be outmaneuvered by hackers. By crea...
Read moreExploring the 1983 Soviet false alarm incident, we delve into the potential risks of AI misuse and the need for responsible AI governance. T...
Read moreExploring the potential risks of artificial intelligence in critical systems, we delve into three incidents where computer glitches led to f...
Read moreAn in-depth interview with Stanislav Petrov, the Soviet military officer who averted potential nuclear disaster by disobeying an AI system's...
Read moreData source
Incident data is from the AI Incident Database (AIID).
When citing the database as a whole, please use:
McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.
Pre-print on arXiv · Database snapshots & citation guide
We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.