>
Marjorie Taylor Greene EVISCERATES Trump Over Iran War! w/ Rick Overton
Sip your way to better gut health with these science-backed, fermented beverages
The War on Sunlight Is Real (And It's Not an Accident) | Dr. Jack Kruse
Trump's Unconditional Surrender, NEW Supreme Leader Mojtaba Khamenei + NYC IED Attack...
The Pentagon is looking for the SpaceX of the ocean.
Major milestone by 3D printing an artificial cornea using a specialized "bioink"...
Scientists at Rice University have developed an exciting new two-dimensional carbon material...
Footage recorded by hashtag#Meta's AI smart glasses is sent to offshore contractors...
ELON MUSK: "With something like Neuralink… we effectively become maybe one with the AI."
DARPA Launches New Program Generative Optogenetics, GO,...
Anthropic Outpaces OpenAI Revenue 10X, Pentagon vs. Dario, Agents Rent Humans | #234
Ordering a Tiny House from China, what's the real COST?
New video may offer glimpse of secret F-47 fighter
Donut Lab's Solid-State Battery Charges Fast. But Experts Still Have Questions

In the wake of a Hong Kong fraud case that saw an employee transfer US$25 million in funds to five bank accounts after a virtual meeting with what turned out to be audio-video deepfakes of senior management, the biometrics and digital identity world is on high alert, and the threats are growing more sophisticated by the day.
A blog post by Chenta Lee, chief architect of threat intelligence at IBM Security, breaks down how researchers from IBM X-Force successfully intercepted and covertly hijacked a live conversation by using LLM to understand the conversation and manipulate it for malicious purposes – without the speakers knowing it was happening.
"Alarmingly," writes Lee, "it was fairly easy to construct this highly intrusive capability, creating a significant concern about its use by an attacker driven by monetary incentives and limited to no lawful boundary."
Hack used a mix of AI technologies and a focus on keywords
By combining large language models (LLM), speech-to-text, text-to-speech and voice cloning tactics, X-Force was able to dynamically modify the context and content of a live phone conversation. The method eschewed the use of generative AI to create a whole fake voice and focused instead on replacing keywords in context – for example, masking a spoken real bank account number with an AI-generated one. Tactics can be deployed through a number of vectors, such as malware or compromised VOIP services. A three second audio sample is enough to create a convincing voice clone, and the LLM takes care of parsing and semantics.