rwg , to random
@rwg@aoir.social avatar

NYTimes reporting about an influence operation, using fake X accounts with -powered talking points, to influence US legislators, public opinion:

https://www.nytimes.com/2024/06/05/technology/israel-campaign-gaza-social-media.html

[sorry, it's paywalled]

@seanlawson and I are publishing articles about this exact sort of masspersonal right now. It's only going to get worse.

rwg OP ,
@rwg@aoir.social avatar

@seanlawson We have a short summary of our argument about /generative AI and its potential uses in political propaganda here:

https://theconversation.com/chatbots-can-be-used-to-create-manipulative-content-understanding-how-this-works-can-help-address-it-207187

Basically, we argue things won't be structurally or procedurally different than past -- but they will be much more intense.

2/3

appassionato , to bookstodon group
@appassionato@mastodon.social avatar

Social Engineering in Cybersecurity; Threats and Defenses by Gururaj H L & Janhavi V & Ambika V, 2024

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks.

@bookstodon



ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    The Language of Deception: Weaponizing Next Generation AI by Justin Hutchens

    A penetrating look at the dark side of emerging AI technologies
    In The Language of Deception: Weaponizing Next Generation AI , artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes.

    @bookstodon





    ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing by Roger R. Grime serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.

    @bookstodon



    ALT
  • Reply
  • Loading...
  • pluralistic , to random
    @pluralistic@mamot.fr avatar

    I wuz robbed.

    More specifically, I was tricked by a phone-phisher pretending to be from my bank, and he convinced me to hand over my credit-card number, then did $8,000+ worth of fraud with it before I figured out what happened. And then he tried to do it again, a week later!

    --

    If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

    https://pluralistic.net/2024/02/05/cyber-dunning-kruger/#swiss-cheese-security

    1/

    18+ pluralistic OP ,
    @pluralistic@mamot.fr avatar

    And most summers, I go to @defcon, and I always go to the competitions where an audience listens as a hacker in a soundproof booth cold-calls merchants (with the owner's permission) and tries to con whoever answers the phone into giving up important information.

    But I'd been conned.

    Now look, I knew I could be conned. I'd been conned before, 13 years ago, by a Twitter worm that successfully phished out of my password via DM:

    https://locusmag.com/2010/05/cory-doctorow-persistence-pays-parasites/

    13/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines