Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

Month: June 2020

June 26, 2020

Incumbent Malawi President’s ...

In the court-sanctioned re-run, President Mutharika, leader of the Democratic Progressive Party, (DPP) is running against Lazarus Chakwera, leader of the opposition Malawi Congress Party (MCP) and little known Peter Kuwani of the opposition Mbakuwaku Movement for Democracy (MMD)

‘I Was Going to Jump Onto The...

In March, an annual report by the U.S. State Department cited reports from Amnesty International and other sources as saying that police had beaten and mistreated individuals in custody, with several reports emerging of sexual assault in detention

UN Secretary-General Holds Virtual ...

United Nations Secretary-General António Guterres holds a virtual press briefing on the 75th anniversary of the adoption of the United Nations Charter, as well as the COVID-19 pandemic

June 25, 2020

Argonne Laboratory Technology Helpi...

The U.S. Department of Energy’s Argonne National Laboratory is known historically as an important nuclear research center

Voting Skulduggery? Graveyard Prote...

Activists dressed as corpses gathered at a St. Petersburg cemetery in a bizarre protest against Russia’s nationwide vote on changing the constitution. They’re not the only ones arguing that voting could be dangerous in a country with the third-highest COVID-19 caseload in the world. Hundreds of local voting officials have signed an open letter refusing to work at polling stations

Cloud Computing Forensics: In The C...

Globalization period changed the dynamics of information and communication technology, with virtual services use for IT infrastructure security, because of the rapidly re-configuration and evolving requirements limiting the request for redundant services (hardware). It’s also worth noting that cloud computing reduces the costs of providing IT services, by eliminating redundant computing power and storage, reducing support requirements

COVID-19: Florida Reopens

This week Florida hit a grim milestone as the number of COVID cases in the state passed 100-thousand and more than three thousand people have died. Despite the spike in cases, Florida entered phase two of re-opening with non-essential businesses working at 50 percent capacity and beaches remaining open

North Korean City of Chongjin on Lo...

While North Korea publicly claims that it has not confirmed a single case of the coronavirus within its borders, RFA reported in January that the government told people in a series of lectures that the virus had spread in three parts of the country, including North Hamgyong province. Chongjin, an industrial center with a population of 625,000, is the provincial capital

WHO Expects Confirmed COVID Cases t...

Speaking Wednesday at his regular briefing from Geneva, WHO Director-General Tedros Adhanom Ghebreyesus noted that in the first month of the pandemic, there were fewer than 10,000 COVID cases reported to his organization, and in the last month, there have been almost 4 million.Latin America is World’s New Coronavirus EpicenterDeath toll in region surpasses 100,000

South Africa Gender Based Violence

Violence against girls and women is South Africa’s “second pandemic,” President Cyril Ramaphosa says. The nation has one of the world’s highest rates of rape and murder, and several recent, especially brutal killings have enraged the nation. But activists say they need to see real change, not just words, from leaders, to protect victims

Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close