>
Why Doug Band's Upcoming Testimony to House Oversight on the Epstein Investigation...
Iran War Day Four: Shifting US Narratives As Skepticism Grows
Age Verification Mandates: The 'Protect the Kids' Scam That's Building a Permanent Surve
US particle accelerators turn nuclear waste into electricity, cut radioactive life by 99.7%
Blast Them: A Rutgers Scientist Uses Lasers to Kill Weeds
H100 GPUs that cost $40,000 new are now selling for around $6,000 on eBay, an 85% drop.
We finally know exactly why spider silk is stronger than steel.
She ran out of options at 12. Then her own cells came back to save her.
A cardiovascular revolution is silently unfolding in cardiac intervention labs.
DARPA chooses two to develop insect-size robots for complex jobs like disaster relief...
Multimaterial 3D printer builds fully functional electric motor from scratch in hours
WindRunner: The largest cargo aircraft ever to be built, capable of carrying six Chinooks

In the wake of a Hong Kong fraud case that saw an employee transfer US$25 million in funds to five bank accounts after a virtual meeting with what turned out to be audio-video deepfakes of senior management, the biometrics and digital identity world is on high alert, and the threats are growing more sophisticated by the day.
A blog post by Chenta Lee, chief architect of threat intelligence at IBM Security, breaks down how researchers from IBM X-Force successfully intercepted and covertly hijacked a live conversation by using LLM to understand the conversation and manipulate it for malicious purposes – without the speakers knowing it was happening.
"Alarmingly," writes Lee, "it was fairly easy to construct this highly intrusive capability, creating a significant concern about its use by an attacker driven by monetary incentives and limited to no lawful boundary."
Hack used a mix of AI technologies and a focus on keywords
By combining large language models (LLM), speech-to-text, text-to-speech and voice cloning tactics, X-Force was able to dynamically modify the context and content of a live phone conversation. The method eschewed the use of generative AI to create a whole fake voice and focused instead on replacing keywords in context – for example, masking a spoken real bank account number with an AI-generated one. Tactics can be deployed through a number of vectors, such as malware or compromised VOIP services. A three second audio sample is enough to create a convincing voice clone, and the LLM takes care of parsing and semantics.