Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»AI/ML»Someone used AI to replicate the state secretary – to ensure that you are not ahead
    AI/ML

    Someone used AI to replicate the state secretary – to ensure that you are not ahead

    PineapplesUpdateBy PineapplesUpdateJuly 9, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Someone used AI to replicate the state secretary – to ensure that you are not ahead
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Someone used AI to replicate the state secretary – to ensure that you are not ahead

    Andrew Harnik/Getty Images

    AI has proved itself a major security risk – even American government officials are not safe.

    Washington Post Informed On Tuesday that an unknown person used AI to pose as State Secretary Marco Rubio and “at least five government officials, including three foreign ministers, an American governor and Congress members.” The person used the signal app to send the voice and text messages of these officers, which was designed to mimic the rubio designed with AI.

    Also: Best Data Removal Services: Remove yourself from the Internet

    The post had access to a state department cable on 3 July, indicating that the Emphersner began trying to reach the privileged accounts and information for some time in mid-June, when he created a signal account under the name “Marco.Rubio@state.gov”-which is not the secret address of the secretary.

    The State Department did not specifically confirm the post which equipment the AI ​​tool used.

    The cable clarified, “The actor left the sound mail on the signal for at least two targeted persons and in an example, inviting the person to communicate on the signal sent a text message,” saying that Rubio was not the sole officially. It was also noted that other personnel of the state department were imposed using emails.

    Apart from this: The best identity of 2025 theft conservation and credit surveillance services

    Signal was the subject of a lot of investigation earlier this year when Defense Secretary Pete Hegseth used it to discuss the classified military strike plans with other officials and Inadvertently added Jeffrey GoldbergEditor -in -chief of Atlantic for chat. While the signal is an end-to-end encryption, many defense officers considered the chat a serious security violation and said the signal is not enough for such sensitive government information.

    Protect yourself from AI cyberthrate

    Whether you are using the signal or not, what happened to Rubio and other government officials is similar to a general safety concern: Business Email Agreement (BEC) – when fraudulent actors apply to known employees or company leaders using their email accounts.

    Passkeys can be a solution to protect from fishing and bec efforts, as they limit methods that hackers can strike by reducing information leak opportunities. Unlike traditional passwords, “Passke’s zero knowledge is a form of authentication,” explained by David Berlind of ZDNET. “The trusted party has zero knowledge of your secret, and to sign in to a relying party, all you have to do is to prove that the relying party has to prove that you have a mystery in your possession.”

    Also: How PassKeys Work: The Complete Guide to Your Unnecessary Passwordless Future

    However, the additional layer of AI voice cloning can be more confident than an email and can often be harder to protect it.

    “AI Voice Cloning Scams are dangerously assured. It is all a five-second clip of your voice-usually downloaded from social media-and scammers can clones to cheat it,” said Michael Skumac, Chief Innovation Officer of an identity theft monitoring forum. He talked to ZDNET how to avoid falling prey to an AI voice scam and what you can do to protect your voice from cloning.

    Also: AI phone scam sound scary real. Do these 5 things to protect yourself and your family

    Here are their top suggestions:

    • For the beginning, limit what you share online. “Scammers use public data and social media audio, which is to make the voice clone,” Scheumack said. “The lower they have, the more difficult it is to copy you.”
    • Verify a suspicious call immediately. “If you get a call from a loved one for money or personal information, especially if the call has a feeling of urgency and feels suspicious, hang it directly and call them directly,” Scheumack advised. “You can also install a ‘family password’ that only acts as a verification code for authentication that you and your loved ones know that you are actually talking to your family member.”
    • Invest in an identity protection service. “They are the first row of defense to protect your identity by monitoring signs of fraud in their financial accounts, credit reports and individual data,” said by Scumac. These are some recommended options for ZDNET.

    Get top stories of morning with us in your inbox every day Tech to -up newsletter,

    ahead Ensure replicate Secretary State
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBitcoin Depot Breech reveals the data of around 27,000 crypto users
    Next Article Subnatica 2 reportedly delayed 2026 in 2026, when Crafton Developer was due to paying $ 250 million bonus to the unknown world.
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025
    Apps

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025
    AI/ML

    Stabilize grid-scale battery power in Scotland

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.