Spam and phishing emails are an annoying everyday occurrence that everyone is probably familiar with and finds annoying. These intrusive messages often clog up your inbox and require tedious deletion or filtering. Worse still, those who are act carelessly run the risk of falling victim to scammers. But, as strange as it may sound, spam emails can actually be useful to the potential victims scammers are targeting, which is why you shouldn’t delete them. All major mail providers are starting to rely on complex and adaptive spam filters that are getting better and better at distinguishing between wanted and unwanted e-mails. An important prerequisite for this learning effect: The software must be able to practice and this is exactly what spam mails are useful for. Instead of deleting spam mails, we recommend you proceed as follows: If you use an email client such as Outlook or Thunderbird: Manually mark relevant messages as spam (or as “junk”) if your email program hasn’t already done it itself. This will train the software’s spam filter and you will (hopefully) have to deal with annoying spam mails less and less in future because the automatic filter will improve. If you retrieve emails with a browser: Depending on which provider you use, you can mark the annoying messages as spam in different ways. Of course, you only need to make this effort if the junk emails are displayed as normal emails in your inbox and haven’t already ended up in the spam folder. You can mark such messages in the inbox (tick the box) and send them directly to the spam folder using the “Spam” or “Junk” command in the menu bar. This also works with individual (open) emails, where the path to the spam bin is sometimes via a “Move” button above the message text. Both privately and professionally, these procedures promise less rubbish mail in the long term. The senders of such messages are also blacklisted more quickly. If you use a shared mail server in the office, you may be doing your colleagues a great service by preventing them from having to deal with the same scam messages that you’ve already marked as spam and sorted out yourself. Many providers and email clients now offer an easy way to unsubscribe from unwanted advertising emails, newsletters, and the like with a quick click directly in your inbox. This function is useful if you do not want to delete yourself from mailing lists by hand or aren’t interested in the advertising it contains. However, the well-intentioned function also harbors a danger, at least in the case of fraudulent messages. This is because you inadvertently inform the sender that your own e-mail address actually exists and is actively managed. Spam crooks send millions of emails every day, sometimes indiscriminately to randomly generated recipient addresses. They are often unaware of whether the accounts they write to really exist or whether messages are read there–until users click on the unsubscribe button. The scammers then receive a request to stop writing to the email address in question, whereupon, of course, they do exactly the opposite. Spammers and scammers are becoming more and more sophisticated. Even experienced users can be taken in by the brazen crooks. If you want to protect yourself better, you can turn to professional software, it makes life difficult for the scoundrels on the net. Learn useful tips to protect yourself by visiting OUR FORUM. Not long ago, AI seemed like a futuristic idea. Now, it's in everything. What happened? This AI thing has taken off really fast, hasn't it? It's almost like we mined some crashed alien spacecraft for advanced technology, and this is what we got. I know, I've been watching too much *Stargate*. But the hyper-speed crossing the chasm effects of generative AI are real. Generative AI, with tools like ChatGPT, hit the world hard in early 2023. All of a sudden, many vendors are incorporating AI features into their products, and our workflow patterns have changed considerably. How did this happen so quickly, essentially transforming the entire information technology industry overnight? What made this possible, and why is it moving so quickly? In this article, I look at ten key factors that contributed to the overwhelmingly rapid advancement of generative AI and its adoption into our technology stacks and workday practices. As I see it, the rapid rise of AI tools like ChatGPT and their widespread integration came in two main phases. Let's start with Phase I. Researchers have been working with AI for decades. I did one of my thesis projects on AI more than 20 years ago, launched AI products in the 1990s, and have worked with AI languages for as long as I've been coding. But while all of that was AI, it was incredibly limited compared to what ChatGPT can do. As much as I've worked with AI throughout my educational and professional career, I was rocked back on my heels by ChatGPT and its brethren. While AI has been researched and used for decades, for most of that time, it had some profound limitations. Most AIs had to be pre-trained with specific materials to create expertise. In the early 1990s, for example, I shipped an expert system-based product called *House Plant Clinic* that had been specifically trained on house plant maladies and remedies. It was very helpful as long as the plant and its related malady were in the training data. Any situation that fell outside that data was a blank to the system. The transformer approach gave researchers a way to train AIs on broad collections of information and determine context from the information itself. That meant that AIs could scale to train on almost anything, which enabled models like OpenAI's GPT-3.5 and GPT-4 to operate with knowledge bases that encompassed virtually the entire Internet and vast collections of printed books and materials. By the early 2020s, a number of companies and research teams developed software systems based on the transformer model and world-scale training datasets. But all of those sentence-wide transformation calculations required enormous computing capability. It wasn't just the need to be able to perform massively parallel and matrix operations at high speed, it was also the need to do so while keeping power and cooling costs at a vaguely practical level. Early on, it turned out that NVIDIA's gaming GPUs were capable of the matrix operations needed by AI (gaming rendering is also heavily matrix-based). But then, NVIDIA developed its Ampere and Hopper series chips, which substantially improved both performance and power utilization. Likewise, Google developed its TPUs (Tensor Processing Units), which were specifically designed to handle AI workflows. Microsoft and Amazon also developed custom chips (Maia and Graviton) to help them build out their AI data centers. And then came ChatGPT. It's a funny name and took a while for most of us to learn it. ChatGPT literally means a chat program that's generative, pre-trained, and uses transformer technology. But despite a name that only a geek could love, in early 2023, ChatGPT became the fastest-growing app of all time. OpenAI made ChatGPT free for everyone to use. Sure, there were usage limitations in the free version. It was also as easy (or easier) to use than a Google search. All you had to do was open the site and type in your prompt. That's it. And because of the three innovations we discussed earlier, ChatGPT's quality of response was breathtaking. Everyone who tried it suddenly realized they were touching the future. Further details are posted on OUR FORUM. Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to this cybersecurity expert. In the last decade, spyware tools have been repeatedly found on the phones of journalists, activists, and politicians, including US officials, raising concerns over the unprecedented proliferation of spyware technologies and, subsequently, the lack of protections within the tech space amid growing threats. Last Friday, Meta's WhatsApp revealed that it had discovered a hacking campaign targeting about 90 users, mostly journalists and civil society members across two dozen countries. According to a WhatsApp spokesperson, the Israeli spyware company Paragon Solutions -- now acquired by Florida-based private equity firm AE Industrial Partners -- was behind the attack Graphite, Paragon's spyware, was found to have infiltrated WhatsApp groups by simply sending users a malicious PDF attachment. Without users' knowledge, it can access and read messages on encrypted applications like WhatsApp and Signal. This is also known as a zero-click attack, which means that targets do not have to take any actions for their devices to become compromised. In contrast, phishing or one-click attacks require user interaction with a malicious link or attachment. Once a phone is infected with a zero-click capability, the operator of the attack can secretly gain total access to the phone by exploiting a security vulnerability. In an interview with ZDNET, Rocky Cole, co-founder of mobile threat protection company iVerify, said that "in the case of graphite, via WhatsApp, some kind of payload, like a PDF or an image, [was sent to the victims' devices] and the underlying processes that receive and handle those packages have vulnerabilities that the attackers exploit [to] infect the phone." While public reporting does not specify "whether graphite can engage in privilege escalation [vulnerability] and operate outside WhatsApp or even move into the iOS kernel itself, we do know from our own detections and other work with customers, that privilege escalation via WhatsApp in order to gain kernel access is indeed possible," Cole said. iVerify has uncovered instances where "a number of WhatsApp crashes on [mobile] devices [they're] monitoring with iVerify" have appeared to be malicious in nature, leading the iVerify team to believe that the malicious attacks are "potentially more widespread" than just the 90 people reported to have been infected by graphite. While the WhatsApp attack was predominantly launched against members of civil society, mobile spyware is an emerging threat against everyone because mobile exploitation is more widespread than one might think, Cole said. Moreover, "the result is an emerging ecosystem around mobile spyware development and an increasing number of VC-backed mobile spyware companies are 'under pressure to become profitable enterprises,'" he said. This ultimately "creates marketing competition" for spyware merchants and "lowers barriers" that would deter these mobile exploitation attacks. Just a month ago, WhatsApp won a lawsuit against NSO after a federal judge in California found that NSO was exploiting a security vulnerability within the messaging app to deliver Pegasus. The infamous NSO Group -- known for infecting the phones of journalists, activists, and Palestinian rights organizations -- has used similar zero-click capabilities through their Israeli-made Pegasus spyware, a commercial spyware and phone hacking tool. Historically, the NSO Group has avoided selling to US-based clients and has also been banned by the US Commerce Department under the Biden administration for allegedly supplying spyware to authoritarian governments. However, "shifting political dynamics [under the Trump administration] raises the possibility that spyware may become more prevalent in the United States" -- exacerbating mobile exploitation. Visit OUR FORUM for further updates as they become available. |
Latest Articles
|