NYTimes reporting about an #Israel influence operation, using fake X accounts with #ChatGPT-powered talking points, to influence US legislators, public opinion:
@seanlawson I think the best mitigation for us on the #fediverse is to remain small -- that is, have many, many small instances where people are more likely to know one another, with application-style registration rather than open registration.
This is a good argument against federating with large, open, for-profit platforms (I'm looking at you, #Threads).
Social Engineering in Cybersecurity; Threats and Defenses by Gururaj H L & Janhavi V & Ambika V, 2024
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks.
The Language of Deception: Weaponizing Next Generation AI by Justin Hutchens
A penetrating look at the dark side of emerging AI technologies
In The Language of Deception: Weaponizing Next Generation AI , artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes.
Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing by Roger R. Grime serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.