Tag: spam

  • Wired: To Fight AI Search Spam, Prioritize Real Human Voices

    Source URL: https://www.wired.com/story/optimize-for-authentic-voices-in-a-sea-of-ai-search-spam/ Source: Wired Title: To Fight AI Search Spam, Prioritize Real Human Voices Feedly Summary: Anti-algorithm tactics and human moderators need to keep the web honest. AI Summary and Description: Yes Summary: The text discusses the implications of generative AI in various industries, particularly highlighting its impact on content creation and search engine…

  • Hacker News: Open source maintainers are drowning in junk bug reports written by AI

    Source URL: https://www.theregister.com/2024/12/10/ai_slop_bug_reports/ Source: Hacker News Title: Open source maintainers are drowning in junk bug reports written by AI Feedly Summary: Comments AI Summary and Description: Yes Summary: The emergence of AI-generated software vulnerability submissions has led to a decline in the quality of security reports for open source projects, according to Seth Larson of…

  • Hacker News: Fighting spam with Haskell at Meta (2015)

    Source URL: https://engineering.fb.com/2015/06/26/security/fighting-spam-with-haskell/ Source: Hacker News Title: Fighting spam with Haskell at Meta (2015) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses Facebook’s Sigma system, which is designed for proactively identifying and removing spam and abusive content. The significant improvement in performance and capability achieved through the transition from the custom…

  • Slashdot: Open Source Maintainers Are Drowning in Junk Bug Reports Written By AI

    Source URL: https://developers.slashdot.org/story/24/12/10/2334221/open-source-maintainers-are-drowning-in-junk-bug-reports-written-by-ai?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Open Source Maintainers Are Drowning in Junk Bug Reports Written By AI Feedly Summary: AI Summary and Description: Yes **Summary:** The report highlights the rising prevalence of low-quality security vulnerability submissions generated by AI models in open-source projects, which poses significant challenges for developers. Seth Larson from the Python…

  • The Register: Open source maintainers are drowning in junk bug reports written by AI

    Source URL: https://www.theregister.com/2024/12/10/ai_slop_bug_reports/ Source: The Register Title: Open source maintainers are drowning in junk bug reports written by AI Feedly Summary: Python security developer-in-residence decries use of bots that ‘cannot understand code’ Software vulnerability submissions generated by AI models have ushered in a “new era of slop security reports for open source" – and the…

  • Cisco Talos Blog: Malicious QR codes

    Source URL: https://blog.talosintelligence.com/malicious_qr_codes/ Source: Cisco Talos Blog Title: Malicious QR codes Feedly Summary: QR codes are disproportionately effective at bypassing most anti-spam filters, as most filters are not designed to recognize that a QR code is present in an image and decode the QR code. According to Talos’ data, roughly 60% of all email containing…

  • Hacker News: Bluesky says it won’t train AI on your posts

    Source URL: https://www.theverge.com/2024/11/15/24297442/bluesky-no-intention-train-generative-ai-posts Source: Hacker News Title: Bluesky says it won’t train AI on your posts Feedly Summary: Comments AI Summary and Description: Yes Summary: Bluesky has publicly declared its commitment to not using user content for training generative AI tools, contrasting with competitors like X, who have updated terms allowing such practices. This distinction…

  • The Register: O2’s AI granny knits tall tales to waste scam callers’ time

    Source URL: https://www.theregister.com/2024/11/15/o2_ai_granny/ Source: The Register Title: O2’s AI granny knits tall tales to waste scam callers’ time Feedly Summary: Brit mobile network’s Daisy has time, patience, and plenty of yarns to spin Watch out, scammers. O2 has created a new weapon in the fight against fraud: an AI granny that will keep you talking…

  • Cloud Blog: Cloud CISO Perspectives: The high security cost of legacy tech

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-the-high-security-cost-of-legacy-tech/ Source: Cloud Blog Title: Cloud CISO Perspectives: The high security cost of legacy tech Feedly Summary: Welcome to the first Cloud CISO Perspectives for November 2024. Today I’m joined by Andy Wen, Google Cloud’s senior director of product management for Google Workspace, to discuss a new Google survey into the high security…

  • The Register: Criminals open DocuSign’s Envelope API to make BEC special delivery

    Source URL: https://www.theregister.com/2024/11/05/docusigns_envelope_bec/ Source: The Register Title: Criminals open DocuSign’s Envelope API to make BEC special delivery Feedly Summary: Why? Because that’s where the money is Business email compromise scammers are trying to up their success rate by using a DocuSign API.… AI Summary and Description: Yes Summary: The text discusses a rise in business…