Pete Recommends – Weekly highlights on cyber security issues, September 9, 2023

Subject: How To Stop Facebook Using Your Personal Data To Train AI

A new Facebook privacy option lets you ask the social network not to use your data to train AI. Here’s where to find it.

Meta has quietly introduced a Facebook privacy setting where you can request to restrict your data from being used to train its generative AI models. Here’s what you need to know about the new option, including how to access it and stop Facebook using your data to train AI.If you’re unhappy about how much data Facebook collects and how it’s used, the alternative has long been to delete Facebook entirely. However, if it’s having your data scraped to train AI models that you specifically object to, then this looks like a useful new privacy feature.How much mileage you get from your opt out request may vary depending on your location, but it’s worth a shot and at least partially addresses one of the AI ethics issues that has arisen as the technology booms in 2023….


Subject: Spam is up, QR codes emerge as a significant threat vector
Source: Help Net Security

[From the forewarned is forearmed dept.] 85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023, according to a VIPRE report.

Malicious content

Malicious content likely tops the Q2 2023 list because, with security awareness programs becoming increasingly more common, users are less likely to open suspicious links or attachments. Cybercriminals use malicious content to trick victims into performing an action, such as approving or submitting a payment – significantly more challenging to detect.

QR codes as key phishing attack vector – During the assessment, VIPRE also discovered that many phishing emails utilized QR codes as a primary attack method, which diverted users to a phishing page. The increased use of QR codes suggests that users are increasingly aware of traditional email-based attack techniques, such as malicious links or attachments, forcing threat actors to switch to more unconventional methods.

Posted in: AI, Cybercrime, Cybersecurity, Email Security, Privacy, Social Media