{"id":11000,"date":"2025-03-31T10:00:00","date_gmt":"2025-03-31T08:00:00","guid":{"rendered":"https:\/\/haimagazine.com\/uncategorized\/guarded\/"},"modified":"2025-06-26T15:33:45","modified_gmt":"2025-06-26T13:33:45","slug":"guarded","status":"publish","type":"post","link":"https:\/\/haimagazine.com\/en\/hai-magazine-4\/guarded\/","title":{"rendered":"\ud83d\udd12 Guarded!"},"content":{"rendered":"<p><strong><strong>New technologies mean new opportunities, but also new threats. Luckily, the security market already offers tools that enhance protection on the physical and cybernetic level. <\/strong><\/strong><\/p><h4 class=\"wp-block-heading\"><strong><strong>PROTECTION AGAINST DEEPFAKES AND FAKE CONTENT<\/strong><\/strong><\/h4><p>With the development of technology and generative artificial intelligence, we&#8217;re increasingly encountering various materials which, besides having a humorous tone, can misinform and even enable criminals to commit fraud. Below, we present tools that help protect against such threats. <\/p><figure class=\"wp-block-table aligncenter is-style-regular\"><table class=\"has-very-light-gray-background-color has-background has-fixed-layout\"><tbody><tr><td> <strong>Sensity AI<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>AI Voice Detector<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Originality.ai<\/strong><\/td><\/tr><tr><td>A system for detecting deepfakes based on the submitted video. Classic models examine pixels and file structures, such as metadata, while advanced deep neural networks analyze voice patterns to determine as accurately as possible whether the material is genuine. Sensity AI has an intuitive interface \u2013 it lets you drag and drop a file, which will be verified within seconds.  <\/td><td class=\"has-text-align-left\" data-align=\"left\">AI Voice Detector can identify whether a sound is real or generated by artificial intelligence. The detector has an integrated feature for removing background noise and music, is multilingual and can detect audio recordings even shorter than 7 seconds. The tool will detect if someone is impersonating your loved ones, trying to imitate their voice.  <\/td><td class=\"has-text-align-left\" data-align=\"left\">The program allows you to check whether a specific content was created using AI or shows signs of plagiarism. It also offers the option to verify information accuracy, allows you to check readability scores, and proves that the content is original and written by a human. The tool is effective thanks to its advanced natural language processing (NLP) models.  <\/td><\/tr><\/tbody><\/table><\/figure><h4 class=\"wp-block-heading\"><strong>PROTECTION AGAINST PHISHING ATTACKS AND SCAMS<\/strong><\/h4><p>Phishing is one of the most popular methods of fraud. The criminal impersonates someone or an institution to swindle confidential data. The following solutions protect network users from such attacks, and thanks to AI, their effectiveness is increasingly greater.  <\/p><figure class=\"wp-block-table\"><table class=\"has-very-light-gray-background-color has-background has-fixed-layout\"><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Microsoft Defender SmartScreen \u2013 Scareware Blocker<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Google Safe Browsing \u2013 Enhanced Protection<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">The built-in Windows and Edge browser tool called Defender SmartScreen helps you browse safely, preventing phishing attacks and detecting malware. It handles blocking suspicious websites well, but only protects users against known attacks that have been previously reported. <br\/><br\/>That&#8217;s why Microsoft introduced Scareware Blocker \u2013 it helps protect users who are exposed to new scareware attacks. This is a particularly dangerous type of scam \u2013 it uses fullscreen pop-up windows to convince potential victims that their system has been infected with malware. As a result, it puts pressure on the attacked person to contact fake tech support or download malicious software, which allows the attacker to gain access to their computer.  <br\/><br\/>Thanks to machine learning, Scareware Blocker is getting better at identifying and blocking malicious websites that try to deceive online users this way.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Google&#8217;s service helps keep you safe while browsing the web by identifying phishing, malware, scams and other online threats in real time. As part of this service, you can enable an additional protection \u2013 Enhanced Protection, which uses machine learning models to detect dangerous URLs involved in known scam techniques and protects against dangerous downloads. <br\/><br\/>Enhanced Protection Safe Browsing models compare suspicious pages with known attack patterns to identify potential threats. Thanks to this mode, you&#8217;ll not only improve your safety \u2013 information about the detected threat will be added to the Google Safe Browsing database, so the following page visitors will receive a warning. <\/td><\/tr><\/tbody><\/table><\/figure><h4 class=\"wp-block-heading\"><strong>PROTECTING CHILDREN ONLINE<\/strong><\/h4><p>Children are particularly vulnerable to online threats, so it&#8217;s worth looking into solutions that provide effective parental control.<\/p><figure class=\"wp-block-table\"><table class=\"has-very-light-gray-background-color has-background has-fixed-layout\"><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Bark<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Qustodio<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">This app runs in the background. It scans the child&#8217;s activity, monitoring text messages, social media, apps and other content for threats. Bark uses advanced machine learning techniques and statistical analysis to identify potential problems, and sends safety alerts that inform about a possible threat.  <br\/><br\/>The app also utilizes contextual analysis and natural language processing to scan texts, images, videos and sounds on social media for threats such as cyberbullying and pornography, helping ensure children&#8217;s safety.<\/td><td class=\"has-text-align-left\" data-align=\"left\">A parental control tool that analyzes your child&#8217;s activity online. It monitors visited websites, used applications, and time spent online \u2013 helping parents provide a safe digital environment for their kids. <br\/><br\/>Thanks to Qustodio alerts, the app can send messages and push notifications as soon as your child sends or receives a concerning text message. The system can detect over 20 types of threats, such as bullying, self-harm and health concerns. <\/td><\/tr><\/tbody><\/table><\/figure>","protected":false},"excerpt":{"rendered":"<p>Review of AI tools that help maintain security<\/p>\n","protected":false},"author":134,"featured_media":9730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[791,673,781,674],"tags":[],"popular":[],"difficulty-level":[36],"ppma_author":[344],"class_list":["post-11000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-how-to","category-hai-magazine-4","category-hai-premium","category-issue-4","difficulty-level-easy"],"acf":[],"authors":[{"term_id":344,"user_id":134,"is_guest":0,"slug":"sebastian-kawecki","display_name":"Sebastian Kawecki","avatar_url":{"url":"https:\/\/haimagazine.com\/wp-content\/uploads\/2024\/10\/sk-1.png","url2x":"https:\/\/haimagazine.com\/wp-content\/uploads\/2024\/10\/sk-1.png"},"first_name":"Sebastian","last_name":"Kawecki","user_url":"","job_title":"","description":"Entuzjasta narz\u0119dzi GenAI oraz propagator has\u0142a #AIdlaka\u017cdego. Zawodowo Sales Support Team Leader. Obecnie w trakcie studi\u00f3w podyplomowych z psychologii na UW."}],"_links":{"self":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/users\/134"}],"replies":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/comments?post=11000"}],"version-history":[{"count":1,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11000\/revisions"}],"predecessor-version":[{"id":11001,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11000\/revisions\/11001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/media\/9730"}],"wp:attachment":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/media?parent=11000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/categories?post=11000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/tags?post=11000"},{"taxonomy":"popular","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/popular?post=11000"},{"taxonomy":"difficulty-level","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/difficulty-level?post=11000"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/ppma_author?post=11000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}