Dwelling without Sunshine

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I’m going to read one more script before this court case. I mean the guys going to jail anyway so reading more it’s going to hurt.
Photo by Ketut Subiyanto, please support by following @pexel.com

So many times, in life when you think you have dealt with one problem, shortly after there comes another one creeping its way around the corner hopping in your pants to make its way up the place where the sun doesn’t shine.

For many of us, this comes in the form of bills, but for most of us, this comes in the form of finding out how easily someone can obtain our sensitive information, which in most cases they don’t have to be involved at all, they can just have collection be automated while sat on the porcelain stool passing the morning coffee and last night’s meal.

Android products and Google Play Store have been a playground for threat actors to release malware in an effort to collect from their victims. As usual, we’re going over what the attack is, who is using it, the functionality and effects upon release, and what are some ways to protect yourself from having a rat run rampant on your personal device.

Dear god, it’s making its way up!
Photo by Andrea Piacquadio, please support by following @pexel.com

The Attack

Speaking of having a rat in your personal device. Here’s a name you’re not ready for, IRATA. Yes, that’s an actual name of malware. IRATA stands for Iranian Remote Access Trojan.

Are you trying to figure out what the last “A” stands for? Simple, since it is Android specific, it stands for “Android”. Android users, feel proud, there’s another malware targeting you…yet again.

This is a program that has spyware and information-stealing capabilities. This was discovered via a smishing attack in Iran. Smishing for those who do not know, is the dark art of contacting a person through text or another SMS (Short Message Service) to lure them into a false sense of security to give information. In this case, IRATA brings users to a fake webpage urging them to download an app and pay a fee for the service.

Unlike how companies operate by offering a service and charging you for the service and then some, you can actually choose not to pay this one, so don’t pay it.

I’ve read Scriptingthewhy, I don’t think Z-daddy was talking about this kind of rat.
Photo by MART PRODUCTION, please support by following @pexel.com

Who Can It Be Now

So who are the culprits employing the use of IRATA? Well, and this seems to become the norm if you’re a subscribed reader, no one has been named for using this malware.

However, its origin stems from Iran since that’s where its activity is taking place. Just be aware, that if you have a trip coming up to Iran, pray for your Android device. Regardless, still safeguard your device, traveling or not.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Tim: You’re not going to believe this, a rat made off with my information.
Sarah: Are you sure it’s a RAT and not a rat?
Tim: What’s the diff?
Photo by Tirachard Kumtanom, please support by following @pexel.com

That Sinking Feeling

Why would this be something you need to worry about? Well, since you asked, you would have to worry about IRATA scurrying away with all the information about your personal device.

This would include information like the serial number, the device ID, battery status, network type, and many other things. This is like your blind date showing up and telling you everything they know about you without you uttering a word. It’s not creepy at all.

To make IRATA even more terrifying, IRATA can hide itself by disguising its icon and tampering with the phone’s sound settings, like putting the phone on vibrate or lowering the volume. Once IRATA is in, it can collect information and replicate software to further malicious attacks like phishing.

I did my research on you, I hope that’s not like creepy to you or anything.
Photo by Andrea Piacquadio, please support by following @pexel.com

The Prevention

Okay, so it’s clear that you don’t want to go on a creepy blind date where they know everything about you before you say anything, and neither do we want you to. So how would you protect yourself from something like this?

To keep this malware from two-stepping on your personal device, check the reviews of others who may have downloaded the software. Always read the permissions the application is requesting to have access to as some may request access to questionable things.

Like a camera app requesting access to cookies in the browser. It’s plausible that the camera application may have a valid reason for requesting access, however, if it raises a red flag to you then you should go with your “gut feeling”.

Do not download software from third parties as they may contain malware on par or worse than IRATA. Keep your system and anti-virus up to date and exercise caution when opening emails with attachments.

You might not be able to keep out every rat but you can at least lower your chances of falling for their traps.

Kim: You have protection, right?
Dave: You bet I do. I have anti-virus software and Scriptingthewhy.com and… that’s not what you meant by protection.
Photo by Josh Willink, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on IRATA? Script a comment below.

Securing Your Digital Passport: Tips to Prevent Data Breaches

I forgot the front door was unlocked, and now I no longer have a toaster.
Photo by Andrew Neel, please support by following @pexel.com

The Forget Me Nots

Data breaches are the digital equivalent of a forgetful pigeon leaving its passport on a park bench. Millions are affected, with consequences more troublesome than a lost migration map. Back in the pre-digital days, a data breach was like a curious squirrel peeking at your paper files (think: neighbor borrowing a cup of sugar… and peeking at your bills). Today, with the internet and digital storage, it’s like leaving your social security number and passwords plastered on a giant billboard in Times Square!

Our faces when our data is leaked.
Photo by JJ Jordan, please support by following @pexel.com

The biggest recorded breach? Yahoo in 2013, where all three billion user accounts were exposed. Imagine an entire city waking up to find their front doors wide open! Yikes!

So, what cracks open these digital vaults? Weak passwords are like flimsy locks on a cardboard box – a determined raccoon (hacker) can break in with ease. Malware? That’s like leaving a Trojan Horse full of viruses on your computer, just waiting to unleash digital chaos. And social engineering? Think of a smooth-talking fox who tricks you into handing over your passport (data) without realizing it.

The consequences? It’s a digital disaster zone. Financial losses snowball faster than a runaway train on a rollercoaster. Businesses can get shut down quicker than a restaurant forgets your order. And your reputation can take a bigger hit than a dropped birthday cake (seriously, frosting everywhere!).

IT’S OUR DATA AND WE WANT IT BACK NOW!
Photo by Kelly, please support by following @pexel.com

But what can you, the individual, do?

  • Become a Digital Doorman: Use strong, unique passwords for every account (think: a password so complex it would baffle even the smartest squirrel!).
  • Embrace Multi-Factor Authentication: This is like a secret handshake for your data – an extra layer of security that keeps even the sneakiest foxes at bay.
  • Stay Informed: Keep yourself educated about the latest cyber threats – knowledge is power, after all!

Together, we can build a more secure digital world!

Data breaches are a threat we can overcome. Share your own data security tips and experiences in the comments below! Let’s create a community of informed citizens who keep their digital passports safe and sound. Remember, a little vigilance goes a long way in keeping the cyber-raccoons out!

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Deepfakes: Unveiling the Controversy and Opportunities

Key Takeaways

  • Deepfakes are AI-generated manipulated images, videos, or audio. They can be used to impersonate individuals or create entirely new content.
  • Deepfakes have a dark history. They first gained notoriety in 2017 when a Reddit user used them to create deepfake pornographic videos.
  • Deepfakes are created using deep learning models. These models require large amounts of data to learn a person’s features and patterns.
  • Deepfakes can be used for both malicious and beneficial purposes. They can be used to spread misinformation, harass individuals, and create fake news. However, they can also be used for training simulations, marketing, and creative expression.
  • Spotting deepfakes can be challenging but not impossible. Look for inconsistencies in facial movements, lighting, shadows, and audio. Trust your gut feeling.
  • Legal frameworks surrounding deepfakes are still evolving. While there are some state-level laws, a comprehensive federal law is still needed.
  • It’s important to be aware of the risks and benefits of deepfakes. As technology continues to advance, we need to develop effective detection methods and legal frameworks to mitigate their potential harms.
Bro, they have a video of you throwing something out of your window.
Photo by Mikhail Nilov, please support by following @pexel.com

Understanding Deepfakes: The Good, the Bad, and that’s not your Mom.

Over the years, the internet has been… well, the internet made with all interesting and mentally concerning individuals. Many of which may be right next door to you. As terms online pop-up, one is becoming more and more of a growing concern.

This growing issue deals with, yet again people, (we can’t seem to have anything nice) some of which you may know personally and others…not so much.

Give me that beautiful face!

It’s another day at the office, you’re online, your best work buddy called out, and you’re to fend for yourself. All great things when at work, we love this. While online, browsing through all the wonderful garbage the algorithm has to offer. (Let’s be honest doom-scrolling cute cat videos aren’t a thing anymore, we know) you find some photos and videos of your work buddy.

You think,” Is that? Nah, this can’t be them. They wouldn’t do something as crazy as hurling a basket of cute kittens out of a window.” In disbelief, you call your work buddy to verify if it’s indeed them. Countering disbelief with confusion and uttering that lovely phrase “What in the Sam Cooks hell are you talking about?”

You provide them with what you saw only to discover both surprises are mutual. Both of you wondering the what, when, and how could someone find the time and resources to impersonate anyone to perform such a sickening act. Welcome to the rise of the Deep Fakes.

AI is beginning to look like me more and more.
Photo by Irina Kaminskaya, please support by following @pexel.com

What are Deepfakes?

You may be asking yourself, “What are deep fakes? What makes them fake?” Deep fakes are images, videos, and even audio manipulated using artificial intelligence to appear real. Deep fake is a portmanteau- a combination of two words to make a new word- of “deep learning” and “fake”. Deep fakes can be created by replacing a person with another person or by creating new content altogether.

Backstory of Deepfakes

The idea showed up back in 2017 when a Reddit user named “deepfakes” began sharing altered pornographic videos (it’s always porn) using face-swapping technology. If you’re not familiar with face-swapping, this was the craze that led to users being able to swap faces with their pets, friends, and eventually led to being able to put themselves into movie moments.

You know it’s amazing to see how far one species can come in advanced technology and quickly resort to using it for primitive ends. It really shows where our heads are at.

Faking in the Making

How are deep fakes made? And are they all created equal? To answer that last question is ‘no’. Clearly, there’s a different process since everyone’s face tends to have additional features to make them look unique. The process for creating a deep fake consists of collecting large amounts of data containing images or videos of a person.

This could involve having images of every angle, expression, and feature to ensure the AI captures them properly. The “data” or better known in the data science community as the “dataset” is fed into a deep learning model, this could be either variational autoencoder (VAE) or generative adversarial network (GAN), from there the model learns how to create images mimicking the person the dataset is based on.

Just a side note, hundreds of images on an individual are required to generate new images. This means you can’t supply the model with four or five images of someone and expect it to create a video. Models work best when more information is available to them. A key thing to remember when dealing with AI is “the more in, the better out.”

They’re Faking it

You’re on a date, things are going well, and the connection “feels” real. However, this is done in an effort to conserve your feelings. After finding out your date was putting in a playtime shift and more likely wants to see other people, you venture to embarrass them by posting some “not so covered” photos of them online. This scenario is just an example of the use cases for deepfakes.

They can be something small as creating a funny picture for a good laugh, new meme, or it can be vicious as recreating their image in comprising positions. Positions that could lead to some hard times if reputations are tarnished and careers are lost. So, use it with caution.

AI may have everyone else fooled, but not me. Something looks a little off here.
Photo by Andrea Piacquadio, please support by following @pexel.com

Exercising caution, Spotting the Fakes

We humans have an eye for spotting something that- to us just doesn’t look right. Trying to spot a deepfake can be challenging depending on how well the image was generated. The obvious telltale signs are an extra limb, appendage, eyeball, or extra anything that typically wouldn’t be on a human.

A reason for this to happen is the model was fed information on a person but not fed the limitations that would make the image of a person normal. Confusing, we know but understand computers don’t think the same way humans do. We speak in a way we can understand what we “mean” or what we “meant” to say. Computers cannot compute abstract meanings.

Other signs include but are not limited to, awkward facial movements, displaced lighting and shadows, and audio that could appear mismatched or just off to how the person would sound. In short, go with your gut feeling. Most often you’ll be right.

Laws Against Deepfakes

The legal landscape surrounding deepfakes is still evolving. In the United States, there is no comprehensive federal legislation specifically addressing deepfakes, but several states have enacted laws to combat their misuse.

For example, Texas has banned deepfakes intended to influence elections, while California prohibits the creation of deepfake videos of politicians within 60 days of an election. At the federal level, the proposed DEFIANCE Act aims to allow victims to sue creators of non-consensual deepfake pornography.

The Benefits of Deepfakes

Despite their potential for harm, deepfakes also offer several benefits. In the healthcare industry, they can be used to create realistic training simulations for medical professionals.

In marketing, deepfakes can lower the cost of video campaigns and provide hyper-personalized experiences for customers. Additionally, deepfakes have creative applications in the arts, allowing for innovative storytelling and the preservation of cultural heritage.

Conclusion

Deepfakes represent a powerful and controversial technology with far-reaching implications. While they offer exciting possibilities for entertainment, education, and marketing, they also pose significant risks to privacy, security, and trust.

As deepfake technology continues to evolve, it is crucial to develop robust detection methods and legal frameworks to mitigate its potential harms while harnessing its benefits for positive use.

Again, it never ceases to surprise us how quickly people resort back to primitive needs when it comes to technology. We’re not shaming, the lizard brain is strong but as technology evolves, the idea is we evolve with it.

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly