More stories

  • in

    Google is cutting off internet access for some employees. Here’s why

    <!–> VCG/Contributor/Getty Images Has your job ever restricted your work computer’s access to specific websites? Perhaps your company blocks certain websites because they aren’t conducive to productivity, or visiting those websites is inappropriate at work. Also: WormGPT: Beware ChatGPT’s malicious cousin Well, Google restricted some of its employees from accessing the internet unless, of course, the […] More

  • in

    What is the new Enhanced Safe Browsing for Gmail (and should you enable it)?

    Essentially, phishing is when someone (or a group of people) sends you an email that looks as if it’s from a legitimate company. For example, I regularly get hit by phishing attempts that look like emails from the Geek Squad and contain what appear to be invoices for products or services. Now, I know I’ve not used Geek Squad for over a decade, so it’s quite obvious to me that these emails are not really from that company.There are also other tell-tale signs, such as misspellings, blurry images, and –the most obvious — links that have nothing to do with Geek Squad).Also: What is phishing? Everything you need to know to protect yourself from scammersThe hope (on the part of the sender) is that I’ll click on that Geek Squad email, which will then (most likely) install malicious software on my computer or get me to reveal sensitive information about myself (such as my address, bank account information, passwords, etc). My rule of thumb is that I don’t click on links that weren’t sent by someone I actually know. I take that one step further and verify a link is legit before clicking on it.To sum it up: Phishing is an attempt to get you to click on a malicious link that could have severe ramifications. In other words, don’t do it.But Google knows that phishing attacks continue to get smarter and harder to spot. Because of this, it has added an additional layer of protection to Gmail, in the form of Enhanced Safe Browsing. More

  • in

    Break into a cybersecurity career with 75% off a certification course subscription

    <!–> Study cybersecurity with this course subscription from InfoSec4TC. StackSocial The cybersecurity industry is booming and, as the demand for secure and protected digital technology grows across every industry from banking to healthcare, it’s only getting bigger. The cybersecurity market is projected to grow from a nearly $172 billion industry in 2023 to a nearly […] More

  • in

    Real-time deepfake detection: How Intel Labs uses AI to fight misinformation

    [embedded content]A few years ago, deepfakes seemed like a novel technology whose makers relied on serious computing power. Today, deepfakes are ubiquitous and have the potential to be misused for misinformation, hacking, and other nefarious purposes. Intel Labs has developed real-time deepfake detection technology to counteract this growing problem. Ilke Demir, a senior research scientist at Intel, explains the technology behind deepfakes, Intel’s detection methods, and the ethical considerations involved in developing and implementing such tools.Also: Today’s AI boom will amplify social problems if we don’t act now, says AI ethicistDeepfakes are videos, speech, or images where the actor or action is not real but created by artificial intelligence (AI). Deepfakes use complex deep-learning architectures, such as generative adversarial networks, variational auto-encoders, and other AI models, to create highly realistic and believable content. These models can generate synthetic personalities, lip-sync videos, and even text-to-image conversions, making it challenging to distinguish between real and fake content. More

  • in

    Train AI models with your own data to mitigate risks

    <!–> Vithun Khamsong/Getty Images Organizations that want to harness generative artificial intelligence (AI) more effectively should use their own data to train AI systems, using foundation models as a starting point.  Doing so can provide more relevant context and allay concerns about the potential risks, such as inaccuracy and intellectual property infringements.  Also: How to use […] More