rwg , to random
@rwg@aoir.social avatar

NYTimes reporting about an influence operation, using fake X accounts with -powered talking points, to influence US legislators, public opinion:

https://www.nytimes.com/2024/06/05/technology/israel-campaign-gaza-social-media.html

[sorry, it's paywalled]

@seanlawson and I are publishing articles about this exact sort of masspersonal right now. It's only going to get worse.

rwg OP ,
@rwg@aoir.social avatar

@seanlawson We have a short summary of our argument about /generative AI and its potential uses in political propaganda here:

https://theconversation.com/chatbots-can-be-used-to-create-manipulative-content-understanding-how-this-works-can-help-address-it-207187

Basically, we argue things won't be structurally or procedurally different than past -- but they will be much more intense.

2/3

rwg OP ,
@rwg@aoir.social avatar

@seanlawson I think the best mitigation for us on the is to remain small -- that is, have many, many small instances where people are more likely to know one another, with application-style registration rather than open registration.

This is a good argument against federating with large, open, for-profit platforms (I'm looking at you, ).

3/3

appassionato , to bookstodon group
@appassionato@mastodon.social avatar

Social Engineering in Cybersecurity; Threats and Defenses by Gururaj H L & Janhavi V & Ambika V, 2024

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks.

@bookstodon



ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    The Language of Deception: Weaponizing Next Generation AI by Justin Hutchens

    A penetrating look at the dark side of emerging AI technologies
    In The Language of Deception: Weaponizing Next Generation AI , artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes.

    @bookstodon





    ALT
  • Reply
  • Loading...
  • appassionato , to bookstodon group
    @appassionato@mastodon.social avatar

    Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing by Roger R. Grime serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.

    @bookstodon



    ALT
  • Reply
  • Loading...
  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines