article thumbnail

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

The Last Watchdog

This online epidemic involves the blackmail of a victim by the perpetrator via material gained against them, typically in the form of nude photos and videos. Exploitation drivers From the case of Hegestratos committing insurance fraud by sinking a ship in 300 B.C., The advancement of fraud has materialized parallel to that of currency.

article thumbnail

Generative AI use cases for the enterprise

IBM Big Data Hub

Tools such as Midjourney and ChatGPT are gaining attention for their capabilities in generating realistic images, video and sophisticated, human-like text, extending the limits of AI’s creative potential. Generative adversarial networks (GANs) or variational autoencoders (VAEs) are used for images, videos, 3D models and music.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

O’Hara denied the plaintiff’s motion for sanctions based on the defendant’s alleged spoliation of a surveillance video that shows an altercation between the plaintiff and her supervisor, stating that “plaintiff has failed to meet the requirements of Fed. Brykan Legends, LLC, No. 17-2412-JWL (D. 7, 2019) , Kansas Magistrate Judge James P.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

His news analysis columns, podcasts, and videos are crafted to foster a useful understanding of complex privacy and cybersecurity developments for company decision-makers and individual citizens — for the greater good. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Running on neural networks , computer vision enables systems to extract meaningful information from digital images, videos and other visual inputs. Education In education and training , AI can tailor educational materials to each individual student’s needs.

article thumbnail

Catches of the Month: Phishing Scams for April 2023

IT Governance

The revenue comes through advertising, with YouTube inserting commercials in their videos. The message contains the subject line “Changes in YouTube rules and policies | Check the description”, and includes a video that has been shared with the user.

Phishing 114
article thumbnail

11 cyber security predictions for 2020

IT Governance

Cyber insurance has in some regions encouraged victims to pay as it is cheaper than remediation in some cases. With better audio and video simulations, phishing will move on from email and text to things like Facebook videos. Education is also becoming increasingly important when protecting organisations.