More stories

  • in

    Break into a cybersecurity career with 75% off a certification course subscription

    <!–> Study cybersecurity with this course subscription from InfoSec4TC. StackSocial The cybersecurity industry is booming and, as the demand for secure and protected digital technology grows across every industry from banking to healthcare, it’s only getting bigger. The cybersecurity market is projected to grow from a nearly $172 billion industry in 2023 to a nearly […] More

  • in

    Real-time deepfake detection: How Intel Labs uses AI to fight misinformation

    [embedded content]A few years ago, deepfakes seemed like a novel technology whose makers relied on serious computing power. Today, deepfakes are ubiquitous and have the potential to be misused for misinformation, hacking, and other nefarious purposes. Intel Labs has developed real-time deepfake detection technology to counteract this growing problem. Ilke Demir, a senior research scientist at Intel, explains the technology behind deepfakes, Intel’s detection methods, and the ethical considerations involved in developing and implementing such tools.Also: Today’s AI boom will amplify social problems if we don’t act now, says AI ethicistDeepfakes are videos, speech, or images where the actor or action is not real but created by artificial intelligence (AI). Deepfakes use complex deep-learning architectures, such as generative adversarial networks, variational auto-encoders, and other AI models, to create highly realistic and believable content. These models can generate synthetic personalities, lip-sync videos, and even text-to-image conversions, making it challenging to distinguish between real and fake content. More

  • in

    Train AI models with your own data to mitigate risks

    <!–> Vithun Khamsong/Getty Images Organizations that want to harness generative artificial intelligence (AI) more effectively should use their own data to train AI systems, using foundation models as a starting point.  Doing so can provide more relevant context and allay concerns about the potential risks, such as inaccuracy and intellectual property infringements.  Also: How to use […] More

  • in

    Razer investigates potential breach involving its digital wallet

    The hackers are looking to offload the entire set of data for $100,000 in Monero cryptocurrency. Razer/ZDNET Razer says it is still investigating an alleged breach involving its virtual gaming credits platform, Razer Gold, after hackers claim to have stolen source codes and encryption keys, among others.  The gaming peripheral maker had conducted a “thorough […] More

  • in

    Human coding error identified as cause of digital bank service outage

    <!–> fotograzia/Getty Images Human error has been identified as the cause of DBS Bank’s hours-long service outage in May this year but unrelated to a previous disruption in March.  In the May 5 incident, the Singapore bank’s customers were unable to access their online and mobile banking services, including DBS’ mobile wallet PayLah. ATM (automated […] More