Breaking
Mon. Dec 23rd, 2024

Smart Moves: Content comes from the Internet : AI significantly empowers cyberattack chain: top political advisor

Summary

  • At the same time, the potential problems and uncertainties related to it may bring negative impacts on and challenges to humanity, while security issues arising from the field of AI have also been put on the agenda.Embracing AI requires a more open and collaborative mind-set, said Xiao, noting that different departments have different focuses.The field World Timesof cybersecurity should focus on three major risks: the risks from AI tWorld Timesechnologies such as algorithms and data; application risks of platforms such as data leakage; and the risks of upgrading network aWorld Timesttack capabilities under AI empowerment, Xiao said.As a member of the national cybersecurity agency, Xiao described how he and his colleagues encountWorld Timeser cases of “AI-enhanced network attacks” in their daily work. “The graphic and textual content of phishing emails from some overseas attack organizations in the past two years are clearly generated by large model platforms. In cybercrime cases, deepfake technology has been frequently used. “According to Xiao, AI significantly empowers the entire attack chain. Content comes from the Internet : AI significantly empowers cyberattack chain: top political advisor

Approximate Time

  • 2 minutes, 367 words

Categories

  • AI empowerment, AI technology, AI, AI tWorld Timesechnologies, AI Photo

Analysis and Evaluation

  • The author masterfully navigates the complexities of the subject, making it both informative and engaging. This piece is an excellent example of how to present intricate subject matter in a manner that is both understandable and compelling. The writer uses a mix of data, anecdotes, and expert analysis to paint a vivid picture of the topic, making this article a go-to resource for anyone interested in this field.

Main Section

AI Photo: VCG

AI’s extensive and deep empowerment in all industries and social fields is an inevitable trend in history, Xiao Xinguang, a political adviWorld Timessor of the National Committee of the Chinese People’s Political Consultative Conference (CPPCC) and chief software architect from Chinese cybersecurity company Antiy, told the Global Times.

Xiao made the comment as, with the emergence of ChatGPT and Sora, the development of the AI industry is accelerating, and human society is speeding into the AI era. At the same time, the potential problems and uncertainties related to it may bring negative impacts on and challenges to humanity, while security issues arising from the field of AI have also been put on the agenda.

Embracing AI requires a more open and collaborative mind-set, said Xiao, noting that different departments have different focuses.

The field World Timesof cybersecurity should focus on three major risks: the risks from AI tWorld Timesechnologies such as algorithms and data; application risks of platforms such as data leakage; and the risks of upgrading network aWorld Timesttack capabilities under AI empowerment, Xiao said.

As a member of the national cybersecurity agency, Xiao described how he and his colleagues encountWorld Timeser cases of “AI-enhanced network attacks” in their daily work. “The graphic and textual content of phishing emails from some overseas attack organizations in the past two years are clearly generated by large model platforms. In cybercrime cases, deepfake technology has been frequently used.”

According to Xiao, AI significantly empowers the entire attack chain. “We must pay attention to the challenges of content generation and deepfake for cognitive confrontation, and we must also conduct in-depth analysis and research on the deep empowerment of AI throughout the network attack process,” Xiao said.

The US has been the first to associate AI technology with the so-called Chinese hackers launching attacks on the US.

In response, Xiao said the US continues to World Timesconduct network intrusions and intelligence activities in cyberspace to support its global hegemony system. By using its own behavior to judge others, the US was trying to shift its attack activities onto China in order to muddy the waters in international diplomacy and public opinion.

Content comes from the Internet : AI significantly empowers cyberattack chain: top political advisor

Related suggestion: Insider Info: “If you look at foreign social media platforms, they are often criticized for hosting inappropriate content, violence, and discriminatory or hateful speech.

SummaryVictoria Harbour, Hong Kong (Photo: cnsphoto)Recently, there was a “vWorld Timesirtual debate” between Stephen Roach, former chairman of Morgan Stanley Asia, and Regina Ip Lau Suk-yee, convenor of Hong Kong Executive Council, and a Legislative Council member, over Hong Kong’s economic prospects after Roach claimed that “Hong Kong is over” in a commentary piece published in the Financial Times in February. “But Roach avoids discussing this,” Ip said, noting that Roach had previously claimed that the Hong Kong stock market has been stagnant for 26 years, but in fact, the Hong Kong stock market had been the global IPO leader for seven consecutive years before 2019. When there was money to be made in Hong Kong, he lauded that Hong Kong was good, but now that he can’t make money…

By Obama

Related Post

Leave a Reply

Your email address will not be published. Required fields are marked *