Agregátor RSS

Aktualizujte prohlížeč Chrome na desktopu i mobilu, ve starší verzi je vážná bezpečnostní díra

Živě.cz - 4 Listopad, 2020 - 16:47
Pokud na počítači nebo mobilním telefonu s Androidem používáte webový prohlížeč Chrome, doporučujeme neprodleně zkontrolovat dostupné aktualizace! Starší verze totiž obsahuje vážnou bezpečnostní chybu, umožňující provedení vzdáleného útoku. Samotná chyba se nachází v kódu, který má na starost ...
Kategorie: IT News

Aktualizujte prohlížeč Chrome na desktopu i mobilu, ve starší verzi je vážná bezpečnostní díra

Zive.cz - bezpečnost - 4 Listopad, 2020 - 16:47
Pokud na počítači nebo mobilním telefonu s Androidem používáte webový prohlížeč Chrome, doporučujeme neprodleně zkontrolovat dostupné aktualizace! Starší verze totiž obsahuje vážnou bezpečnostní chybu, umožňující provedení vzdáleného útoku. Samotná chyba se nachází v kódu, který má na starost ...
Kategorie: Hacking & Security

Georgia State Researchers Developing Platform To Protect Privacy in Large-Scale Brain Imaging …

Home AI - 4 Listopad, 2020 - 16:45

“Now, because of the demand for deep learning, we need to enhance the security to allow for the sharing of a greater volume of data without …


Link to Full Article: Read Here

Kategorie: Transhumanismus

LERU Virtual Townhall Meeting on Artificial Intelligence

Home AI - 4 Listopad, 2020 - 16:33

On Friday 30 October 2020, the League of European Research Universities (LERU) organised its first Townhall Meeting about Artificial Intelligence …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Using artificial intelligence can improve pregnant women’s health

Home AI - 4 Listopad, 2020 - 16:22

Using artificial intelligence can improve pregnant women's health. AI technology can help to diagnose birth defects, gestational diabetes and preterm …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Using artificial intelligence to identify sick livestock

Home AI - 4 Listopad, 2020 - 16:22

Livestock welfare could be improved, thanks to a new research project that will combine the use of novel artificial intelligence methods with behavioral …


Link to Full Article: Read Here

Kategorie: Transhumanismus

3.2 Billion Images and 720,000 Hours of Video Are Shared Online Daily. Can You Sort Real from Fake?

Singularity HUB - 4 Listopad, 2020 - 16:00

Twitter over the weekend “tagged” as manipulated a video showing US Democratic presidential candidate Joe Biden supposedly forgetting which state he’s in while addressing a crowd.

Biden’s “hello Minnesota” greeting contrasted with prominent signage reading “Tampa, Florida” and “Text FL to 30330.”

The Associated Press’s fact check confirmed the signs were added digitally and the original footage was indeed from a Minnesota rally. But by the time the misleading video was removed it already had more than one million views, The Guardian reports.

A FALSE video claiming Biden forgot what state he was in was viewed more than 1 million times on Twitter in the past 24 hours

In the video, Biden says "Hello, Minnesota."

The event did indeed happen in MN — signs on stage read MN

But false video edited signs to read Florida pic.twitter.com/LdHQVaky8v

— Donie O'Sullivan (@donie) November 1, 2020

If you use social media, the chances are you see (and forward) some of the more than 3.2 billion images and 720,000 hours of video shared daily. When faced with such a glut of content, how can we know what’s real and what’s not?

While one part of the solution is an increased use of content verification tools, it’s equally important we all boost our digital media literacy. Ultimately, one of the best lines of defense—and the only one you can control—is you.

Seeing Shouldn’t Always Be Believing

Misinformation (when you accidentally share false content) and disinformation (when you intentionally share it) in any medium can erode trust in civil institutions such as news organizations, coalitions and social movements. However, fake photos and videos are often the most potent.

For those with a vested political interest, creating, sharing and/or editing false images can distract, confuse and manipulate viewers to sow discord and uncertainty (especially in already polarized environments). Posters and platforms can also make money from the sharing of fake, sensationalist content.

Only 11-25 percent of journalists globally use social media content verification tools, according to the International Centre for Journalists.

Could You Spot a Doctored Image?

Consider this photo of Martin Luther King Jr.

Dr. Martin Luther King Jr. Giving the middle finger #DopeHistoricPics pic.twitter.com/5W38DRaLHr

— Dope Historic Pics (@dopehistoricpic) December 20, 2013

This altered image clones part of the background over King Jr’s finger, so it looks like he’s flipping off the camera. It has been shared as genuine on Twitter, Reddit, and white supremacist websites.

In the original 1964 photo, King flashed the “V for victory” sign after learning the US Senate had passed the civil rights bill.

“Those who love peace must learn to organize as effectively as those who love war.”
Dr. Martin Luther King Jr.

This photo was taken on June 19th, 1964, showing Dr King giving a peace sign after hearing that the civil rights bill had passed the senate. @snopes pic.twitter.com/LXHmwMYZS5

— Willie's Reserve (@WilliesReserve) January 21, 2019

Beyond adding or removing elements, there’s a whole category of photo manipulation in which images are fused together.

Earlier this year, a photo of an armed man was photoshopped by Fox News, which overlaid the man onto other scenes without disclosing the edits, the Seattle Times reported.

You mean this guy who’s been photoshopped into three separate photos released by Fox News? pic.twitter.com/fAXpIKu77a

— Zander Yates ザンダーイェーツ (@ZanderYates) June 13, 2020

Similarly, the image below was shared thousands of times on social media in January, during Australia’s Black Summer bushfires. The AFP’s fact check confirmed it is not authentic and is actually a combination of several separate photos.

Image is more powerful than screams of Greta. A silent girl is holding a koala. She looks straight at you from the waters of the ocean where they found a refuge. She is wearing a breathing mask. A wall of fire is behind them. I do not know the name of the photographer #Australia pic.twitter.com/CrTX3lltdh

— EVC Music (@EVCMusicUK) January 6, 2020

Fully and Partially Synthetic Content

Online, you’ll also find sophisticated “deepfake” videos showing (usually famous) people saying or doing things they never did. Less advanced versions can be created using apps such as Zao and Reface.

Or, if you don’t want to use your photo for a profile picture, you can default to one of several websites offering hundreds of thousands of AI-generated, photorealistic images of people.

These people don’t exist, they’re just images generated by artificial intelligence. Generated Photos, CC BY Editing Pixel Values and the (not so) Simple Crop

Cropping can greatly alter the context of a photo, too.

We saw this in 2017, when a US government employee edited official pictures of Donald Trump’s inauguration to make the crowd appear bigger, according to The Guardian. The staffer cropped out the empty space “where the crowd ended” for a set of pictures for Trump.

Views of the crowds at the inaugurations of former US President Barack Obama in 2009 (left) and President Donald Trump in 2017 (right). AP

But what about edits that only alter pixel values such as color, saturation, or contrast?

One historical example illustrates the consequences of this. In 1994, Time magazine’s cover of OJ Simpson considerably “darkened” Simpson in his police mugshot. This added fuel to a case already plagued by racial tension, to which the magazine responded, “No racial implication was intended, by Time or by the artist.”

Tools for Debunking Digital Fakery

For those of us who don’t want to be duped by visual mis/disinformation, there are tools available—although each comes with its own limitations (something we discuss in our recent paper).

Invisible digital watermarking has been proposed as a solution. However, it isn’t widespread and requires buy-in from both content publishers and distributors.

Reverse image search (such as Google’s) is often free and can be helpful for identifying earlier, potentially more authentic copies of images online. That said, it’s not foolproof because it:

  • Relies on unedited copies of the media already being online.
  • Doesn’t search the entire web.
  • Doesn’t always allow filtering by publication time. Some reverse image search services such as TinEye support this function, but Google’s doesn’t.
  • Returns only exact matches or near-matches, so it’s not thorough. For instance, editing an image and then flipping its orientation can fool Google into thinking it’s an entirely different one.
Most Reliable Tools Are Sophisticated

Meanwhile, manual forensic detection methods for visual mis/disinformation focus mostly on edits visible to the naked eye, or rely on examining features that aren’t included in every image (such as shadows). They’re also time-consuming, expensive, and need specialized expertise.

Still, you can access work in this field by visiting sites such as Snopes.com—which has a growing repository of “fauxtography.”

Computer vision and machine learning also offer relatively advanced detection capabilities for images and videos. But they too require technical expertise to operate and understand.

Moreover, improving them involves using large volumes of “training data,” but the image repositories used for this usually don’t contain the real-world images seen in the news.

If you use an image verification tool such as the REVEAL project’s image verification assistant, you might need an expert to help interpret the results.

The good news, however, is that before turning to any of the above tools, there are some simple questions you can ask yourself to potentially figure out whether a photo or video on social media is fake. Think:

  • Was it originally made for social media?
  • How widely and for how long was it circulated?
  • What responses did it receive?
  • Who were the intended audiences?

Quite often, the logical conclusions drawn from the answers will be enough to weed out inauthentic visuals. You can access the full list of questions, put together by Manchester Metropolitan University experts, here.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Image Credit: Simon Steinberger from Pixabay

Kategorie: Transhumanismus

New Artificial Intelligence Tool Improves Breast Cancer Detection on Mammography

Home AI - 4 Listopad, 2020 - 16:00

Artificial intelligence (AI) can enhance the performance of radiologists in reading breast cancer screening mammograms, according to a study …


Link to Full Article: Read Here

Kategorie: Transhumanismus

The UPC’s BIOCOM-SC Group explores the use of artificial intelligence to forecast the evolution of …

Home AI - 4 Listopad, 2020 - 15:57

The UPC's Computational Biology and Complex Systems Group (BIOCOM-SC) partners with Facebook Artificial Intelligence to train, test and calibrate …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Mikroskopická loď Voyager a ikonická 3DBenchy budou jednou možná dopravovat léky v těle

Živě.cz - 4 Listopad, 2020 - 15:45
Skupina fyziků z nizozemské univerzity v Leidenu provedla experiment, který dojme každého majitele 3D tiskárny, který kdy vytisknul lodičku 3DBenchy. Ta jejich totiž skutečně plavala a ke všemu sama. Abychom si to vysvětlili, 3DBenchy je jedním z nejznámějších modelů pro 3D tiskárny, který ...
Kategorie: IT News

Removing space junk using Artificial Intelligence

Home AI - 4 Listopad, 2020 - 15:35

Removing space junk using Artificial Intelligence … Federale de Lausanne(EPFL) is developing an Artificial Intelligence (AI)-based technology.


Link to Full Article: Read Here

Kategorie: Transhumanismus

Code42 Incydr Series: Why Most Companies Can’t Stop Departing Employee Data Theft

Threatpost - 4 Listopad, 2020 - 15:00
According to Code42’s Data Exposure Report, 63% of employees say they brought data with them from their previous employer to their current employer.
Kategorie: Hacking & Security

Code42 Incydr Series: Why Most Companies Can’t Stop Departing Employee Data Theft

VirusList.com - 4 Listopad, 2020 - 15:00
According to Code42’s Data Exposure Report, 63% of employees say they brought data with them from their previous employer to their current employer.
Kategorie: Viry a Červi

Qi má sourozence. Bude bezdrátově nabíjet vrtačky a napájet kuchyňské spotřebiče

Živě.cz - 4 Listopad, 2020 - 14:45
Wireless Power Consortium (WPC) vyvíjející standard Qi chce bezdrátové nabíjení dostat i do mnohem náročnější elektroniky, než jsou mobily, hodinky nebo sluchátka. Pracuje na technologiích, které uživí třeba i mixér. Qi umí standardně dodávat energii o výkonu jen 5 wattů, pomocí nových ...
Kategorie: IT News

Police to Livestream Ring Camera Footage of Mississippi Residents

Threatpost - 4 Listopad, 2020 - 14:42
A Mississippi pilot program that allows police to livestream private camera footage sparks privacy fears from the ACLU.
Kategorie: Hacking & Security

Police to Livestream Ring Camera Footage of Mississippi Residents

VirusList.com - 4 Listopad, 2020 - 14:42
A Mississippi pilot program that allows police to livestream private camera footage sparks privacy fears from the ACLU.
Kategorie: Viry a Červi

Podpora GPU Arm Mali s architekturou Bifrost již v Mesa 20.3

AbcLinuxu [zprávičky] - 4 Listopad, 2020 - 14:07
Alyssa Rosenzweig se v příspěvku na blogu společnosti Collabora věnuje vývoji open source ovladače Panfrost pro GPU Arm Mali s architekturou Midgard a Bifrost. Podpora architektury Bifrost bude začleněna již do Mesa 20.3.
Kategorie: GNU/Linux & BSD

Linux Mint introduces its own take on the Chromium web browser>

LinuxSecurity.com - 4 Listopad, 2020 - 14:06
Linux Mint developers - with some new hardware - have tackled the challenge of compiling and releasing Mint's own version of the open-source Chromium web browser.
Kategorie: Hacking & Security

Use Static Analysis to Secure Open Source>

LinuxSecurity.com - 4 Listopad, 2020 - 14:01
Open Source lends itself to a new way of certifying software: Continuous Assurance. In this approach, automated tools and processes ensure that, as code changes, it continually satisfies compliance, quality, and security requirements. "Continuous Assurance integrates directly into development and benefits from the always-up-to-date nature of cloud services, making it a perfect match for Open Source."
Kategorie: Hacking & Security

WireGuard Brings Speed and Simplicity to VPN Technology>

LinuxSecurity.com - 4 Listopad, 2020 - 14:00
VPN technology has become a critical part of our digital lives, serving a variety of purposes including securing wireless connections, resolving geographical limitations, reaching prohibited websites and protecting the privacy of sensitive data. However, the unfortunate reality is that many of the VPN protocols on the market today are comlex, slow, unstable and insecure. Luckily, the new, innovative Wireguard protocol has demonstrated significant promise in all of these areas - and has earned a place in the mainline Linux kernel as a result. This article will briefly explore VPN protocols and potential concerns when implementing a VPN, and will dive deeper into the unique benefits that Wireguard offers users.
Kategorie: Hacking & Security
Syndikovat obsah