This is why AI-powered misinformation is the top global risk

With many nations expected to hold elections during the next two years, the use of misinformation and disinformation - powered by artificial intelligence - will be the most severe global risk.
Also: 4 ways to overcome your biggest worries about generative AI. During this time period, misinformation and disinformation will emerge as the leading global risk, followed by extreme weather events, and societal polarization.
The report then ranks cyber insecurity and interstate armed conflict to round out the top-five global risks.
Misinformation and disinformation is placed as the top risk in India, while it ranks as the sixth highest risk in the US, and eighth in the European Union.
WEF notes that the disruptive capabilities of manipulated information are rapidly accelerating.
These capabilities are being fuelled by open access to increasingly sophisticated technologies and deteriorating trust in information and institutions.
Over the next couple of years, a wide set of actors will capitalize on the explosion of synthetic content, amplifying societal divisions, ideological violence, and political repression, WEF said.
With almost three billion citizens heading to the polls, including in India, Indonesia, the US, and the UK, the widespread use of misinformation and disinformation, as well as the tools to disseminate it, could undermine the legitimacy of new incoming governments.
New classes of crimes also will proliferate, such as non-consensual deepfake pornography or stock market manipulation, WEF added.
To combat the risks of AI-generated information, some countries have already begun deploying new and evolving regulations that target both hosts and creators of online information and illegal content.
Nascent regulation of generative AI is also likely to complement such efforts, it added, pointing to requirements in China to watermark AI-generated content as an example.
Such rules might help identify false information, including unintentional misinformation through AI-hallucinated content.
It notes that recent technological advances have enhanced the volume, reach, and efficacy of falsified information, with flows that are more difficult to track, attribute, and control.
Disinformation will be increasingly personalized to its recipients and targeted to specific groups, such as minority communities, and disseminated through more opaque messaging platforms, such as WhatsApp or WeChat.
WEF notes also that it's increasingly difficult to discern between AI-generated and human-generated content, even for detection mechanisms and tech-savvy individuals.
Led by its Ministry of Communications and Information, the initiative is slated to run through 2028.
Scheduled for launch during the first half of 2024, the facility will focus on building and customizing tools to detect harmful content, such as deepfakes and non-factual claims.
The center will seek to identify societal vulnerabilities and develop possible interventions, such as flagging or correcting misinformation, that could reduce online users' susceptibility to content deemed harmful.
The facility will also test digital trust technologies, such as watermarking and content authentication.
Global populations should hope for such development efforts to yield effective detection tools because, if left unaddressed, misinformation may lead to two different circumstances.


This Cyber News was published on www.zdnet.com. Publication date: Thu, 11 Jan 2024 18:13:03 +0000


Cyber News related to This is why AI-powered misinformation is the top global risk

This is why AI-powered misinformation is the top global risk - With many nations expected to hold elections during the next two years, the use of misinformation and disinformation - powered by artificial intelligence - will be the most severe global risk. Also: 4 ways to overcome your biggest worries about ...
5 months ago Zdnet.com
Cyber Insecurity and Misinformation Top WEF Global Risk List - The latest World Economic Forum Global Risks Report 2024 highlighted the rising tide of cyber threats and places misinformation and disinformation as the most severe risk globally. It also warned of low-cost crime havens and issues surrounding ...
5 months ago Infosecurity-magazine.com
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
5 months ago Darkreading.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
5 months ago Techtarget.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
5 months ago Cyberdefensemagazine.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
Key Takeaways from the Gartner® Market Guide for Insider Risk Management - Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. The report reveals several key findings about ...
6 months ago Securityboulevard.com
Key elements for a successful cyber risk management strategy - In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel ...
5 months ago Helpnetsecurity.com
A Plan to Protect Critical Infrastructure from 21st Century Threats - On April 30th, the White House released National Security Memorandum-22 on Critical Infrastructure Security and Resilience, which updates national policy on how the U.S. government protects and secures critical infrastructure from cyber and ...
1 month ago Cisa.gov
How to Complete an IT Risk Assessment - An effective security strategy needs to put managing risk at the heart of its approach. An IT risk assessment process is used by organizations to identify and prioritize the most pressing risks to their IT environment. Naturally, it focuses on IT ...
6 months ago Heimdalsecurity.com
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines - Recently, the Securities and Exchange Commission adopted rules about the handling and reporting of cyber risks and breaches. With these new guidelines and regulations, public companies and organizations must disclose cybersecurity incidents ...
5 months ago Cyberdefensemagazine.com
5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem - Voice synthesis has already been used in a few fake kidnap extortion attempts and possibly in one or two Business Email Compromise attacks as well, but that's about it. AI-powered malware represents a new frontier in the ever-expanding portfolio of ...
6 months ago Securityweek.com
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
3 months ago Eff.org
Third-Party Security Assessments: Vendor Risk Management - As businesses rely more heavily on external vendors to provide critical services and support, the importance of effective vendor risk management strategies becomes paramount. This article explores the significance of third-party security assessments, ...
5 months ago Securityzap.com
Critical Start Implements Cyber Risk Assessments With Peer Benchmarking and Prioritization Engine - PRESS RELEASE. PLANO, Texas, Jan. 11, 2024 /PRNewswire/ - Today, Critical Start, a leading provider of Managed Detection and Response cybersecurity solutions and pioneer of Managed Cyber Risk Reduction, announced general availability of Critical ...
5 months ago Darkreading.com
TikTok's latest actions to combat misinformation shows it's not just a U.S. problem - Fake news, disinformation, misinformation - whatever label you want to put on it - will not just go away if one election in the U.S. goes one way or the other. It is an issue that is spreading on all platforms in all countries. While they have been ...
4 months ago Blog.talosintelligence.com
CVE-2015-2165 - Multiple cross-site scripting (XSS) vulnerabilities in the Report Viewer in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4.x, 5.x, and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) portal, (2) fromDate, (3) ...
5 years ago
What Are the 6 Types of Risk Assessment and How Do They Work? - Risk assessment is a tool used to help quantify potential risks in a certain situation. It can be used in many different scenarios, including business operations, financial decisions, and also cybersecurity. A risk assessment helps you identify areas ...
1 year ago Thehackernews.com
How to Do a Risk Analysis Service in a Software Project - Software projects are vulnerable to countless attacks, from the leak of confidential data to exposure to computer viruses, so any development team must work on an effective risk analysis that exposes any vulnerabilities in the software product. A ...
7 months ago Feeds.dzone.com
The ONE Thing All Modern SaaS Risk Management Programs Do - Reducing SaaS risk is, without a doubt, a difficult challenge. Gaining visibility into all the SaaS apps used across an enterprise is hard enough, but it becomes an even greater challenge when only a portion of the apps go through the company's ...
2 months ago Securityboulevard.com
Protect Yourself from Election Misinformation - Welcome to your U.S. presidential election year, when all kinds of bad actors will flood the internet with election-related disinformation and misinformation aimed at swaying or suppressing your vote in November. As EFF's Corynne McSherry wrote in ...
3 months ago Eff.org
Top 42 Cybersecurity Companies You Need to Know - As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we provide our recommendations for the world's leading ...
7 months ago Esecurityplanet.com
4 Metrics That Help CISOs Become Strategic Partners With the Board - Many CISOs experience burnout, and most find it difficult to be recognized as strategic, growth-oriented partners to their leadership team and board of directors. Challenges CISOs Face When Reporting to the Board It can be hard for CISOs to prove ...
6 months ago Darkreading.com
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
5 months ago Cyberdefensemagazine.com
Meet the Cisco Security Risk Score - In April 2023, we rebranded our risk-based vulnerability management solution, Kenna. Effective immediately, the Kenna Risk Score is renamed to the Cisco Security Risk Score. VI is renamed to Cisco Vulnerability Intelligence, and Kenna. To strengthen ...
6 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)