How to View through Keynotes

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

It’s the first day on the job and there’s a new script! This is going to be the best day ever!
Photo by SHVETS production, please support by following @pexel.com

It’s your first day on the job. You walk in and sit down to mentally prepare yourself for the laundry list of tasks ahead. While seated at your keyboard, you notice there is a camera installed in the corner of the room pointing at you.

Feeling a little unsettled you look back at your computer keyboard and before you begin to type. You get this eerie feeling of something or someone watching you from all devices.

The camera, the webcam, and even the keyboard feels like they’re watching, and you are not too sure if what you are feeling is real. Let me script for you how this may be your reality.

Timmy: Z-Daddy says we’re being watched by the big boss.
Tom: We’re not interesting enough to spy on. He’s just trying to wig us out.
Photo by Fox, please support by following @pexel.com

Local Private Eyes

You understand how the camera and webcam could be the ones watching your every move. At some point or another, it’s been reported in the news, but to spout that your keyboard can be watching as well, now that might be a thing of nonsense.

You could say one is being unreasonably paranoid. Let me introduce you to a device called a “keylogger”. You may have heard it go by other names such as keystroke logger or keygrabber.

Keyloggers are tools used to capture all your interactions with the keyboard. This means everything you type is recorded and stored for later evaluation. This includes all the questionable websites you visited during the duration of your shift. We’re all looking at you nudemidgetcowgirlsfromouterspace.com.

Henry: See, I told you they were visiting Scriptingthewhy during working hours.
Shaw: well, it is a semi-informative site with some humor but you’re right they’re supposed to be working.
Photo by AlphaTradeZone, please support by following @pexel.com

For Good, Bad, and the Dark-net

The use of keyloggers has been used for both good intentions and malicious ones. For good intentions, this involves things like parents installing a keylogger to monitor their child’s screen time. Although I don’t know of any parents doing that nowadays since we’re just happy to not hear them crying about anything. A silent and preoccupied child makes a happy parent.

Another good intention, though questionable, is companies have been known to use keyloggers to monitor employee productivity, as you would have imagined, yes, the overlords may watch you to ensure that you are in fact working. And finally, IT (Information Technology) departments can use keyloggers for troubleshooting problems with a device.

So, with all of these “good intentions” (minus the company part depending on how you look at it), you may be wondering what the bad or malicious ones are. Unauthorized personnel will use keyloggers to, not only be like Sting from the Police watching every move you make but later sell your information on the dark web or hijack your life if they want.

Again, you’re a somebody and that means every person on the dark net doesn’t mind being you. Whether you choose to believe it or not your information has value.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Eric: You read the latest script? Nice, big boss wants to see you by the way. Don’t worry bro, your computer is safe with me.
Bob: I don’t think I should just leave it with you like that.
Eric: Nah bro, you can trust me.
Photo by Helena Lopes, please support by following @pexel.com

Connection via Co-worker

So how would something like this work? This is usually done by social engineering but you’re going to be highly disappointed to know that the installation of such a device is as simple as inserting a USB (Universal Serial Bus) thumb drive.

An example of this might be you’re in your office and Eric from accounting comes in to let you know that the big boss wants a word with you, so you head out to the big boss. If for some reason or other, you leave Eric in the office he can then go to your computer, hook up a device to the plugin slot for your keyboard, and connect your keyboard plugin to the keylogger device.

Photo of keygrabber device.
Photo by keelog,@https://www.keelog.com/usb-keylogger/

From there, all the information is ready to be recorded. There are other means outside of using this tactic. The use of web page scripts provides you with an infected link leading you to a malicious website where the software will download to your computer for the keylogger.

Phishing offers the same tactic, but it is delivered to your email instead, this could be where you see an email featuring the classic “click on the link if you want to marry your Russian princess” or prince. Just so you know, Z-Daddy doesn’t judge, love is love.

And finally, unidentified software is downloaded, this may also be known as “drive-by downloading”, again it’s not what you think, computer nerds aren’t driving around firing malicious code from the side of the car as they go by. This occurs when you visit a website like nudemidgetcowgirlsfromouterspace.com and a file is downloaded without your consent.

Sean: Watching out for people is tough.
Amber: Watching over people is tougher, it’s a good thing we have Z-Daddy.
Photo by KoolShooters, please support by following @pexel.com

Watching Overall

Now while keylogging has some good and bad use cases, let’s be honest, no one likes to be watched without their consent. There may be a niche few who don’t mind because they feel as though they have nothing to hide. However, having this knowledge is important in protecting or simply figuring out if “Big Brother” or another interested party is viewing what you do.

A few ways of confirming are; if your browser is operating sluggishly or slower than normal, if there is a lag in keystrokes or cursor movements, or if your cursor disappears randomly during movement.

Physically, you could inspect your plugins by unplugging them and checking if a questionable device is seated in any of the USB slots. For digital or online protection, avoid visiting or downloading software from unknown trusted sources, if you receive an email from Eric with an attachment saying, “Good times are to be had here, click and download for more,” keep a close eye for grammatical or spelling errors and crosscheck with Eric as that may not have been him.

Always keep an understanding that your personal information is extremely valuable to an attacker. If you have massive debt, it’s not a problem, they’ll get you more and if you have no debt, that’s also not a problem, they’ll find you some.

Julia: Ben, since we subscribed and stayed informed, look at how much we’ve avoided.
Photo by Mikhail Nilov, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed with keyloggers? Script a comment below.

Don’t Get Hacked: Finding the Security Sweet Spot (It’s Not Under Your Desk!)

Key Takeaways

  • Cybersecurity is important: Data breaches can be expensive and damaging.
  • Balance cost and risk: Understand your risk tolerance and prioritize security measures accordingly.
  • Use strong passwords and MFA: This makes it harder for hackers to steal your information.
  • Keep software updated: Updates often contain security patches that fix vulnerabilities.
  • Be cautious of phishing emails: Don’t click on suspicious links or attachments.
  • Do a cost-benefit analysis: Weigh the cost of security solutions against the potential benefits.
  • Stay informed: Keep up-to-date on the latest cybersecurity threats and best practices.
This can happen sometimes when you put money over security.
Photo by Mike Bird, please support by following @pexel.com

Let’s be real, “cybersecurity” can sound about as thrilling as watching dial-up load a webpage. But hold on! Skimping on security is like playing dodgeball with a digital wrecking ball – and trust us, you don’t want to be the one getting flattened.

Here’s the thing: protecting your data is a balancing act. You want ironclad defenses, but who wants to break the bank for them? This is where understanding your risk tolerance comes in. Imagine you run a small business. A data breach could mean lost customer records and credit card info, a huge blow. But for a personal computer, maybe it’s just some embarrassing childhood photos.

Security? More Like Sanity!

Think of strong cybersecurity as an insurance policy for your digital life. A single breach can unleash a financial nightmare worse than accidentally buying that “guaranteed muscle growth” protein powder (we’ve all been there). Data loss, hefty fines, and a damaged reputation are all on the menu.

We can’t get hacked. We have MONEY!!!
Photo by Gustavo Fring, please support by following @pexel.com

Counting the Cost of Catastrophe

Investing in security isn’t about throwing money at a problem. It’s about being proactive. Imagine your data as a family heirloom. Sure, you could leave it on the coffee table, hoping nobody swipes it, but wouldn’t you feel better with a locked cabinet (read: strong passwords) and maybe a security camera (read: antivirus software)?

The cost of a data breach can dwarf the cost of decent security. Studies show that the average breach can cost companies millions – enough to make even the most frugal accountant sweat.

But Wait, There’s More!

Balancing security with affordability is a personal journey. Every organization (or individual) has a unique risk tolerance. Think of it like your spice preference. Some folks can handle the heat of a habanero, while others stick to bell peppers. A risk assessment framework, like the NIST Cybersecurity Framework, can help you identify your critical data and prioritize your defenses accordingly.

Remember, security isn’t about buying the fanciest antivirus (though a good one is essential). It’s about layering your defenses like a well-dressed onion (because seriously, who wants a naked onion?). Here are some specific things you can do:

  • Strong Passwords & Multi-Factor Authentication (MFA): Use a unique, complex password for every account and enable MFA wherever possible. This adds an extra layer of security, making it much harder for hackers to break in.
  • Software Updates: Always keep your operating system, web browser, and other software updated. These updates often contain security patches that fix vulnerabilities hackers can exploit.
  • Beware of Phishing Emails: Don’t click on suspicious links or attachments in emails, even if they seem to come from a legitimate source. Phishing emails are a common way for hackers to steal your personal information.
This…is just impressive.
Photo by cottonbro studio, please support by following @pexel.com

Let’s Talk Turkey (or Should We Say, Talk Security?)

So, how do you find the security sweet spot? Here are a few tips:

  • Think Cost-Benefit Analysis: Not all security solutions are created equal. Weigh the cost of implementing a solution against the potential financial benefits of mitigating risks.
  • Measure Your Wins: Security isn’t just about avoiding disaster. Look for ways to quantify the value of your security investments using metrics like Return on Security Investment (ROSI).
  • Stay Informed: There’s no shame in admitting you’re not a cybersecurity guru. Check out industry reports on best practices and keep yourself updated on the latest threats.
  • Join the Conversation! We all have a role to play in keeping our digital world safe. Share your security strategies and experiences in the comments below. Remember, together, we can build a fortress so strong, that even the most determined cyber-crook will be left hacking away at their keyboards in frustration. Because let’s be honest, wouldn’t that be a sight to see?

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly

Deepfakes: Unveiling the Controversy and Opportunities

Key Takeaways

  • Deepfakes are AI-generated manipulated images, videos, or audio. They can be used to impersonate individuals or create entirely new content.
  • Deepfakes have a dark history. They first gained notoriety in 2017 when a Reddit user used them to create deepfake pornographic videos.
  • Deepfakes are created using deep learning models. These models require large amounts of data to learn a person’s features and patterns.
  • Deepfakes can be used for both malicious and beneficial purposes. They can be used to spread misinformation, harass individuals, and create fake news. However, they can also be used for training simulations, marketing, and creative expression.
  • Spotting deepfakes can be challenging but not impossible. Look for inconsistencies in facial movements, lighting, shadows, and audio. Trust your gut feeling.
  • Legal frameworks surrounding deepfakes are still evolving. While there are some state-level laws, a comprehensive federal law is still needed.
  • It’s important to be aware of the risks and benefits of deepfakes. As technology continues to advance, we need to develop effective detection methods and legal frameworks to mitigate their potential harms.
Bro, they have a video of you throwing something out of your window.
Photo by Mikhail Nilov, please support by following @pexel.com

Understanding Deepfakes: The Good, the Bad, and that’s not your Mom.

Over the years, the internet has been… well, the internet made with all interesting and mentally concerning individuals. Many of which may be right next door to you. As terms online pop-up, one is becoming more and more of a growing concern.

This growing issue deals with, yet again people, (we can’t seem to have anything nice) some of which you may know personally and others…not so much.

Give me that beautiful face!

It’s another day at the office, you’re online, your best work buddy called out, and you’re to fend for yourself. All great things when at work, we love this. While online, browsing through all the wonderful garbage the algorithm has to offer. (Let’s be honest doom-scrolling cute cat videos aren’t a thing anymore, we know) you find some photos and videos of your work buddy.

You think,” Is that? Nah, this can’t be them. They wouldn’t do something as crazy as hurling a basket of cute kittens out of a window.” In disbelief, you call your work buddy to verify if it’s indeed them. Countering disbelief with confusion and uttering that lovely phrase “What in the Sam Cooks hell are you talking about?”

You provide them with what you saw only to discover both surprises are mutual. Both of you wondering the what, when, and how could someone find the time and resources to impersonate anyone to perform such a sickening act. Welcome to the rise of the Deep Fakes.

AI is beginning to look like me more and more.
Photo by Irina Kaminskaya, please support by following @pexel.com

What are Deepfakes?

You may be asking yourself, “What are deep fakes? What makes them fake?” Deep fakes are images, videos, and even audio manipulated using artificial intelligence to appear real. Deep fake is a portmanteau- a combination of two words to make a new word- of “deep learning” and “fake”. Deep fakes can be created by replacing a person with another person or by creating new content altogether.

Backstory of Deepfakes

The idea showed up back in 2017 when a Reddit user named “deepfakes” began sharing altered pornographic videos (it’s always porn) using face-swapping technology. If you’re not familiar with face-swapping, this was the craze that led to users being able to swap faces with their pets, friends, and eventually led to being able to put themselves into movie moments.

You know it’s amazing to see how far one species can come in advanced technology and quickly resort to using it for primitive ends. It really shows where our heads are at.

Faking in the Making

How are deep fakes made? And are they all created equal? To answer that last question is ‘no’. Clearly, there’s a different process since everyone’s face tends to have additional features to make them look unique. The process for creating a deep fake consists of collecting large amounts of data containing images or videos of a person.

This could involve having images of every angle, expression, and feature to ensure the AI captures them properly. The “data” or better known in the data science community as the “dataset” is fed into a deep learning model, this could be either variational autoencoder (VAE) or generative adversarial network (GAN), from there the model learns how to create images mimicking the person the dataset is based on.

Just a side note, hundreds of images on an individual are required to generate new images. This means you can’t supply the model with four or five images of someone and expect it to create a video. Models work best when more information is available to them. A key thing to remember when dealing with AI is “the more in, the better out.”

They’re Faking it

You’re on a date, things are going well, and the connection “feels” real. However, this is done in an effort to conserve your feelings. After finding out your date was putting in a playtime shift and more likely wants to see other people, you venture to embarrass them by posting some “not so covered” photos of them online. This scenario is just an example of the use cases for deepfakes.

They can be something small as creating a funny picture for a good laugh, new meme, or it can be vicious as recreating their image in comprising positions. Positions that could lead to some hard times if reputations are tarnished and careers are lost. So, use it with caution.

AI may have everyone else fooled, but not me. Something looks a little off here.
Photo by Andrea Piacquadio, please support by following @pexel.com

Exercising caution, Spotting the Fakes

We humans have an eye for spotting something that- to us just doesn’t look right. Trying to spot a deepfake can be challenging depending on how well the image was generated. The obvious telltale signs are an extra limb, appendage, eyeball, or extra anything that typically wouldn’t be on a human.

A reason for this to happen is the model was fed information on a person but not fed the limitations that would make the image of a person normal. Confusing, we know but understand computers don’t think the same way humans do. We speak in a way we can understand what we “mean” or what we “meant” to say. Computers cannot compute abstract meanings.

Other signs include but are not limited to, awkward facial movements, displaced lighting and shadows, and audio that could appear mismatched or just off to how the person would sound. In short, go with your gut feeling. Most often you’ll be right.

Laws Against Deepfakes

The legal landscape surrounding deepfakes is still evolving. In the United States, there is no comprehensive federal legislation specifically addressing deepfakes, but several states have enacted laws to combat their misuse.

For example, Texas has banned deepfakes intended to influence elections, while California prohibits the creation of deepfake videos of politicians within 60 days of an election. At the federal level, the proposed DEFIANCE Act aims to allow victims to sue creators of non-consensual deepfake pornography.

The Benefits of Deepfakes

Despite their potential for harm, deepfakes also offer several benefits. In the healthcare industry, they can be used to create realistic training simulations for medical professionals.

In marketing, deepfakes can lower the cost of video campaigns and provide hyper-personalized experiences for customers. Additionally, deepfakes have creative applications in the arts, allowing for innovative storytelling and the preservation of cultural heritage.

Conclusion

Deepfakes represent a powerful and controversial technology with far-reaching implications. While they offer exciting possibilities for entertainment, education, and marketing, they also pose significant risks to privacy, security, and trust.

As deepfake technology continues to evolve, it is crucial to develop robust detection methods and legal frameworks to mitigate its potential harms while harnessing its benefits for positive use.

Again, it never ceases to surprise us how quickly people resort back to primitive needs when it comes to technology. We’re not shaming, the lizard brain is strong but as technology evolves, the idea is we evolve with it.

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly