The Way Deepfakes Are Used for Fraud, Hooliganism and Revenge
What parental control applications do, how effective they are, and how they may evolve.
What is a digital avatar, how do they work, who and why may need them - we explain based on the example of four projects that offer services of AI avatar creation.
Facial recognition biometrics is used to unlock smartphones, access offices, pay a fare and for purchases, for remote connection to bank services. Biometric system saves time for both those who are verified and those who verify, that is why they ask you more and more often to “smile for a camera”. Yet, such verification should not be relied on completely, it can be deceived in different ways - from paper masks to AI deepfakes.
An independent test of the 100 most popular free VPN apps on Android found not a single app fully delivering on its privacy promises.
What are the areas of application of “humanized” chatbots and what impact do they have on the lives of the people who interact with them.
In this post we explain the basic principles and features of Risk-Based Vulnerability Management, and also how the CICADA8 platform helps in implementing this approach to prioritizing vulnerabilities.