Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

Tag: Cyber Crime

January 16, 2020

Tanzania Threatens to Block Unregistered SIM...

To curb cyber crime, Tanzanian Authority set a dead line of 20 January to register mobile phone. After that mobile SIM card will be blocked

November 14, 2019

Los Angeles Takes On Cybercriminals

As the world becomes more connected people are vulnerable of being victims of cybercriminals. Police departments, hospitals, universities and businesses everywhere are also at risk

June 10, 2019

USG Recruiting the Next Generation of...

Online data is at risk. Hackers are getting smarter and companies across the globe are facing a shortage of trained professionals who can help protect their data~ VOA NEWS

January 11, 2019

Authoritarian Governments Try to Control Social...

Many countries have created their own strong web presences, both to ensure their messages get out and to monitor for anything remotely resembling criticism

January 10, 2019

Cyber World Provides Both Benefits and...

Various studies suggest that one in three internet users around the world is a child. But to protect children from tge negative effects of cyber world is a huge challenge

December 27, 2018

Always Remember Pedophiles are Active in...

Always remember pedophiles are active in cyber world they may get in touch with children by using fake profile and hide their age

December 20, 2018

Cyber Trolling

If any person harassing a woman through Internet, email or any other electronic communication is stated as an offence under Section 354D IPC

December 14, 2018

Cyber security Campaign Taken to Rural...

“Some people in the villages fall victim to cybercrime because… they are looking for better opportunities. They get phone calls from people claiming to be in Gauteng, offering them opportunities

December 4, 2018

Beware of Cyber Stalkers

Sometime, perpetrators create fake account on face book to defame their victims and post morphed pictures to blackmail them

November 30, 2018

Ignorance of the Law is No...

Don’t send explicit messages or post pictures or videos of a person in a compromising position/private moments with out permission

Top