AI spots malicious data leaks online

Revell, Timothy
November 2017
New Scientist;11/18/2017, Vol. 236 Issue 3152, p14
The article reports on a study related to malicious data leaks. Topics discussed include use of artificial intelligence (AI) tools for gathering various dox files including private information intended for dissemination; views of researcher Peter Snyder on the study; and talks about changes to Facebook and Instagram's algorithms.


Related Articles

  • Visit AAAI on Facebook and LinkedIn.  // AI Magazine;Winter2013, Vol. 34 Issue 4, p8 

    The article invites all interested parties to check the Facebook and LinkedIn accounts of the Association for the Advancement of Artificial Intelligence (AAAI).

  • Visit AAAI on Facebook and LinkedIn.  // AI Magazine;Spring2014, Vol. 35 Issue 1, p7 

    The article offers information on the sites of the Association for the Advancement of Artificial Intelligence (AAAI) on social networking service Facebook and business-oriented social network web site LinkedIn.

  • Visit AAAI on Facebook and LinkedIn.  // AI Magazine;Winter2012, Vol. 33 Issue 4, p7 

    The article announces the Association for the Advancement of Artificial Intelligence's (AAAI) invitation to check out its Facebook and LinkedIn! accounts.

  • Christmas decorations torn up.  // East Bernard Express (TX);1/4/2007, Vol. 64 Issue 1, p1 

    The article reports on an investigation by Wharton County Sheriff's Department on a spree of mischiefs damaging Christmas decorations and other properties in East Bernard, Texas.

  • Overcooking is a crime.  // AutoWeek;9/6/93, Vol. 43 Issue 36, p10 

    Reports on the sentencing of a man from Nashua, New Hampshire, to one year in jail for malicious mischief. Throwing of heavy clumps of pasta from a balcony; Rolling up pasta in balls and hurling at cars; Charge of reckless conduct.

  • Ethiopia wants Nile accord to end disputes.  // MEED: Middle East Economic Digest;1/30/1998, Vol. 42 Issue 5, p13 

    Reports that Ethiopia accused Egypt of attempting to monopolise water from the river Nile. Reference to the calls for a formal agreement among the 10 riparian states; Benefits of this agreement; When the complaint was made; Information on the World Bank conference in Cairo; Aims of the conference.

  • Mischief in Blanco.  // Burnet Bulletin (Texas);10/3/2007, Vol. 135 Issue 40, p4A 

    The article reports on the call for public assistance by Blanco Police Department and Hill Country Area Crime Stoppers in locating the suspect who broke a window and destroyed a computer monitor in Blanco High School, Texas.

  • Facebook, Gmail, Hotmail, Yahoo Users Hit by Zeus Debit Card Scam. Prince, Brian // eWeek;5/17/2012, p2 

    The article focuses on the connection of the infamous financial malware Zeus Trojan to debit card scam using Facebook, Google Mail, and Hotmail. Topics include the research conducted by the security firm Trusteer, how the attackers conduct their malware campaign to get the personal information...

  • Cybercrime detection techniques based on support vector machines. Deylami, Hanif Mohaddes; Singh, Yashwant Prasad // Artificial Intelligence Research;Mar2013, Vol. 2 Issue 1, p1 

    This paper presents the cybercrime detection model by using support vector machines (SVMs) to classify social network (Facebook) dataset. We try to compare between three kinds of classification algorithms such as: SVMs, AdaBoostM1, and NaiveBayes in order to find a high percentage of...

  • The advertising rationale behind Facebook's mooted 'dislike' button. Cameron, Mark // BRW;9/18/2015, p1 

    The article discusses the plans for the social media platform Facebook to incorporate buttons on its front end to display emotions including sympathy and disagreement. The buttons are mentioned to be presented with links to advertisements. The data amassed would be used by Facebook's artificial...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics