Technology Headlines


VideoCyber Security Expert: Deepfake Videos Could Be Used in Tight Election Races to Harm a Candidate.




TRANSCRIPT:

Dan Bongino: Welcome back to “unfiltered.”  Folks, the next fight in the disinformation wars could be brewing from fake movie stars to TV shows.  Deepfake technology is suddenly everywhere.

[♪] Music Plays: ♪ ♪ ♪♪ ♪♪♪ ♪

Dan Bongino: He can sing.  Now even businesses are worried about the potential for deep fakes to be used during video calls.  Morgan Wright, thanks for your time.  These deep fakes are so convincing.  But the problem goes both ways.  I could do a video of Morgan Wright that’s not you and have you do all kinds of terrible stuff.  But some of these videos could be real and deepfake technology so convincing that it creates a whole bevy of problems.

Morgan Wright With deepfake technology, you might prove that it’s not true an hour later, it doesn’t matter the initial damage is done.  The damage is done.  Imagine what happens.  We know it’s going on in Russia and Ukraine.  But you said earlier.  You said I am doing it if I had the skill.  If you upload enough video you can make somebody say or do something.  It’s deepfake as a service.  It’s simply upload this stuff.  I worry about stuff around nation state actors that use it for extortion.  Imagine in our military, you have a military leader and you make it look so convincing that they say we are going to blow up x.  Now, people believe that.  And Dan, the problem is, even if you prove its not true later, there will be a percentage of people who...  To this day, there are people who still think 9/11 is an inside job.  That Bush did it.  You will have a certain percentage of people, even if you debunk it and disprove it, they will believe the deepfake.

Dan Bongino: Yeah, that I was going to get to that.  Yeah, this is a real national security threat.  Isn't it?  I can’t imagine the secret service being sent a video giving that you think is from a protectee, and in fact its a deepfake video giving you instructions you should have not gotten.  This is a real threat.

Morgan Wright:Think about how tense things are with China and Taiwan, and with Russia and Ukraine.  Imagine a video comes out with Xi Jinping or Vladimir Putin.  Where they said we have had enough, we are dropping a nuke on you.  Do you not reply to that?  It’s going to get to the point that it will be tough to know, is it real or Memorex.  Was it live or was it a deepfake.  We have to come up with ways to show this is authentic video.  I worry things will be done to national security from a political standpoint that a video purports to come out showing some dastardly thing an opponent has done.  They don’t have time to react to it because the damage from the deepfake is already done.

Press ReleaseGlobal Flying Taxi Market Size Expected to $16.05 Billion by 2028 with CAGR of 28.4%


cyber-forensics logo


NEW YORK, NY, - EINPresswire.com: Rising demand for faster means of transportation is a major factor driving flying taxi market revenue growth.

The global Flying Taxi market size is expected to reach USD 16.05 Billion in 2028 and register a revenue CAGR of 28.4% over the forecast period, according to the latest report by Reports and Data.  Rising need for more enhanced and faster mode of transportation in urban areas is driving Flying Taxi market revenue growth.  Urban population is increasing globally leading to ever-increasing on-road traffic.  Therefore, for distances of more than 20 kilometers, a Flying Taxi acts as an attractive solution to a conventional taxi, as it can bypass the congested roadway on the ground.  Increasing investments in research & development activities by major players to develop better battery technologies in order to extend the distance that the Flying Taxi can be flown to is also expected to drive market revenue growth.

Aerospace companies and startups have started to shift focus towards flying taxis from science fiction to reality by partnering and merging with startups and other companies involved in manufacturing of flying taxi.  For instance, in February 2021, United Airlines announced that it is investing USD 20 Million in an electric-aircraft startup and might buy 200 of the company’s flying taxis.  The deal represents a step towards an environmentally sustainable flight.

Major companies profiled in the global market report includes Airbus, Joby Aviation, Boeing, Dassault Aviation, Lilium, Volocopter GmbH, Kitty Hawk, Embraer, Gulfstream Aerospace, and Hyundai.

Some Key Highlights from the Report:

  • In January 2021, Hyundai partnered with the U.K. startup, Urban-Air Port, to develop urban Flying Taxi infrastructure.  The project is based in Coventry, in central England and will show how air taxis work in urban areas.  The startup was chosen by a government program to develop zero-emission flying vehicles and received USD $1.65 million grant to fund temporary installation of airport in Coventry city center.
  • Software segment accounted for considerably large revenue share in 2020 owing to several companies working on developing advanced software programs to ensure safe and smooth operation workflow of flying taxi.  Software also helps automate Flying Taxi without requiring a manual process.
  • By passenger capacity, the 3 to 10 segment is expected to register significantly high revenue growth rate during the forecast period.  Increasing automation in Flying Taxi is resulting in no need for pilots, thus making way for an extra seating capacity in the aircraft.
  • 51 to 200 kms segment is expected to register considerably high revenue growth rate during the forecast period.  Development of battery capacity, is expected to result in increase in the maximum distance that an aircraft can cover during the forecast period.  In January 2020, Hyundai and Uber unveiled new electric Flying Taxi with 100 km range and a cruising speed of up to 290 km/hr.
  • Market in North America accounted for largest revenue share in 2020.  It is one of the most technologically advanced regions and has skilled workforce, which helped in development of flying taxi.  Presence of prominent market players such as Uber, Boeing, and Kitty Hawk among others, is also contributing to high revenue share.  North America’s first autonomous Flying Taxi demonstration took flight in Raleigh in January 2020. EH 216 is designed to work as a taxi service on preprogrammed routes.
To understand how our Flying Taxi Market report can bring difference to your business strategy:  reportsanddata.com

  • Attribution: Peer Reviewed Politics™Media Attribution: EINPresswire.comAuthor(s): ReportsandData - Report and Analysis -  ReportsandData - | Date: September 09, 2022 Duration: 00:00:00Photo/Video Credit: ReportsandData


Old Technology News


ArticleTheft by hacking is becoming a nightmare for crypto coin holders: Cyber-Forensics.net alerts cryptocurrency investors


cyber-forensics logo


Hacking involves breaking into a computer system or network without permission and stealing financial assets like crypto.  Experts suggest ways to stay protected.

EINPresswire.com / -- Statistically speaking, theft by hacking has grown drastically. According to suggested figures by scam surveys, the cybercrime environment has expanded since 2021.  It will cost countries trillions in financial losses by 2025.

And as users continue to spend more and more time online, hacking has become a more significant issue.  Cyber-Forensics.net, a cyber forensics service for online scam victims, has been receiving several complaints explaining what theft by hacking looks like:

  • How does theft by hacking work?
All computer networks are required to provide a safe passage for internet browsing.  For example, in online purchases, internet users are supposed to visit official websites that undergo multiple checks to ensure that a website protects consumer data and stores wallet information safely.

But according to experts, in reality, nothing is perfectly secure.  As per the latest investigations, hackers have repeatedly discovered new ways to break into computer networks, such as exchanges created by various mining companies that make digital wallets where people can store their cryptos.

Like a trespasser, hackers penetrate computer networks. At first, they may bypass a secured network to look for information.  However, they soon access the folders where digital wallets may be, sensitive corporate data may be and steal it when they can.

  • Is Hacking Illegal?
Timothy Benson, who guides crypto scam victims on how to recover scammed bitcoin and other financial assets, opines: Anytime an individual trespasses the information on someone’s computer without permission, it is a crime.  Hacking is illegal even if the hacker has not caused any system damage.  Criminals can be prosecuted as per state or federal law.

  • How do you stay protected from theft by hacking crimes?
Since cyber security is critical, here are a few steps to take to stay protected from theft by hacking crimes:

Don’t put blind trust in anyone online: Approach every contact online with extreme caution.

Set up firewalls on your devices: Firewalls prevent unauthorized access and alert users via email or text message in case someone attempts to.

  • Install antivirus software.  Antivirus programs like Avast, Bitdefender, and Malwarebytes can protect unauthorized codes from being added as an extension to the operating system.
  • Consider safe browsing: The first thing to do is to secure computers and mobile devices.  Check virtual private networks and if a website has an SSL (Secure Socket Layer) certificate.
  • When using public wifi, never allow computers to save passwords entered to access digital wallets.
  • Keep operating systems, apps, and browsers up-to-date.
  • Choose Strong Passwords: Make sure to encrypt the files containing all the financial assets by using strong passwords.  Easy-to-remember passwords are an open invitation for hackers to conduct organized crimes.
  • Switch off autocomplete.
  • Clear caches and delete browsing history regularly.  Browsing history may have cookies and cached files to give hackers plenty of information.
  • Beware of other financial crimes prevalent around you: Scams like phishing, vishing, investment-related, crypto-related, and others receive close attention from the media.  Thus, anything that’s affecting many people is sure to make the headlines.
  • How do you get back at scammers involved in theft by hacking?
  • Report the matter: When someone has been a target of such scams, it is a logical approach to file a report with the local police officers.  Approaching local investigators tends to provide a preliminary screening of how the fraud happened.
  • Keep scammers at bay by joining forces with authorities.  Connect with specialists such as Cyber-Forensics.net, who have years of experience collaborating with lawyers, cyber experts, and ethical computer hacking experts, and team up to scam the scammers.  Getting proper help will ensure victims know what happened.
  • Hire fund recovery services: A logical approach is to seek expert advice. One can do it by hiring the best bitcoin recovery expert to recover scammed bitcoin or getting connected with legal help providers.  The former ensures increased chances of recouping lost funds.
How do fund recovery services help victims secure financial assets after theft by hacking?

A few situations in online scams are worse and cannot be handled by the customers.  It can be proven a crime if one can show how hackers penetrated their computer devices, accounts, or digital wallets without their permission.  Once confirmed, the funds can be reported as stolen.  And this can ensure victims’ eligibility to get the total amount back.

Hiring fund recovery agencies and bitcoin recovery services when cryptocurrency is involved acts as an advocate like individuals would hire a lawyer for a personal or financial issue.  There are different types of services a fund recovery company can offer.  Thus, it is recommended to identify which kind of service victims need.

  • Attribution: Peer Reviewed Politics™Media Attribution: EINPresswire.comAuthor(s): Peter Thompson - Cyber Forensic Specialist  Cyber-Forensics.netDate: August 21, 2022 Duration: 00:00:00Photo/Video Credit: