#steganography-clickfix

[ follow ]
Artificial intelligence
fromThe Verge
4 days ago

Has Google's AI watermarking system been reverse-engineered?

A developer claims to have reverse-engineered Google's SynthID watermarking system, asserting that AI watermarks can be stripped from images.
#deepfake
Education
fromWIRED
3 days ago

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

AI-generated deepfake nude images are impacting nearly 90 schools and over 600 students globally, causing severe emotional distress among victims.
Education
fromWIRED
3 days ago

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

AI-generated deepfake nude images are impacting nearly 90 schools and over 600 students globally, causing severe emotional distress among victims.
#cybersecurity
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
3 weeks ago

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

TeamPCP compromised the telnyx Python package with malicious versions to steal sensitive data, prompting users to downgrade immediately.
Apple
fromTheregister
1 week ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Digital life
fromBGR
2 weeks ago

6 Clear Signs A Video Is AI Generated - BGR

AI-generated videos are increasingly common and can mislead public opinion, making it crucial to identify their authenticity.
World news
fromThe Cipher Brief
3 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
#deepfakes
Digital life
fromTruthout
3 weeks ago

Deepfakes and AI Misinformation Reshape How War Is Seen Online

Deepfakes and AI-generated misinformation are increasingly prevalent, necessitating Critical Artificial Intelligence Literacy to navigate modern conflicts and information environments.
fromWIRED
2 months ago
Artificial intelligence

Deepfake 'Nudify' Technology Is Getting Darker-and More Dangerous

Digital life
fromTruthout
3 weeks ago

Deepfakes and AI Misinformation Reshape How War Is Seen Online

Deepfakes and AI-generated misinformation are increasingly prevalent, necessitating Critical Artificial Intelligence Literacy to navigate modern conflicts and information environments.
fromWIRED
2 months ago
Artificial intelligence

Deepfake 'Nudify' Technology Is Getting Darker-and More Dangerous

Privacy technologies
fromWIRED
4 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
Media industry
fromwww.mediaite.com
1 month ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
Photography
fromwww.dw.com
1 month ago

Long before AI, fake photos were already popular

Image manipulation predates modern technology by nearly two centuries, with photography's invention in 1837 immediately followed by techniques to alter and fake images for political, commercial, and entertainment purposes.
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy technologies
fromenglish.elpais.com
1 month ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Information security
fromTheregister
1 month ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
Information security
fromThe Hacker News
1 month ago

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

AI-generated malware Slopoly enables threat actors to develop malware frameworks significantly faster, demonstrating the weaponization of AI for cybercriminal purposes.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
fromElectronic Frontier Foundation
2 months ago

Beware: Government Using Image Manipulation for Propaganda

A short while later, the White House posted the same photo - except that version had been digitally altered to darken Armstrong's skin and rearrange her facial features to make it appear she was sobbing or distraught. The Guardian one of many media outlets to report on this image manipulation, created a handy slider graphic to help viewers see clearly how the photo had been changed.
US politics
#shadow-ai
Gadgets
fromThe Verge
2 months ago

Ring can verify videos now, but that might not help you with most AI fakes

Ring Verify attaches a digital security seal to Ring cloud downloads and confirms a video is unmodified since download; any edit causes verification to fail.
Miscellaneous
fromenglish.elpais.com
2 months ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
Media industry
fromEurasia Review
2 months ago

'Anti-Social Media': The Changing Tech Of Terror - Analysis

Engagement-driven social media algorithms amplify incendiary content, making hate and misinformation profitable while undermining public safety and complicating regulation.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Information security
fromwww.bbc.com
1 month ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
Artificial intelligence
fromFast Company
2 months ago

AI can now fake the videos we trust most. How to tell the difference-and how newsrooms can respond

AI-generated videos now convincingly mimic trusted eyewitness formats, making fake footage indistinguishable from real and undermining information reliability.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromTechCrunch
2 months ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
fromThe Hacker News
2 months ago

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [artificial intelligence] agents," Hudson Rock said. Alon Gal, CTO of Hudson Rock, told The Hacker News that the stealer was likely a variant of Vidar based on the infection details.
Information security
fromZDNET
2 months ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
Information security
fromTheregister
2 months ago

Posting AI caricatures on social media is bad for security

Posting AI-generated work caricatures publicly can expose personal and employer information, increasing risk of social engineering, LLM account takeovers, and sensitive data theft.
Information security
fromThe Hacker News
2 months ago

Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations

A cross-site scripting vulnerability in StealC's web control panel allowed extraction of system fingerprints, session monitoring, and cookie theft from the malware's infrastructure.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
[ Load more ]