bank account
- Europe > France (0.04)
- North America > United States > Washington > King County > Seattle (0.04)
- North America > United States > California > Santa Clara County > Stanford (0.04)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Banking & Finance (0.94)
Mum of two left penniless by Tinder scammer
A mother of two says she was left penniless after giving her savings to Tinder predator Christopher Harkins in a fake investment scam. The pair matched on the dating app in London in 2020. Caitlyn - not her real name - told how the fraudster and rapist initially tried to talk her into going on holiday with him - a regular ruse of Harkins, now 38. When she said she couldn't afford a holiday, he offered to help by doubling what money she had via his foreign currency exchange business. She's one of four women the BBC is aware of who were targeted by Harkins in the capital - where he fled to after his crimes were exposed in Scotland.
- Europe > United Kingdom > Scotland (0.29)
- South America (0.15)
- North America > Central America (0.15)
- (14 more...)
- Europe > Portugal (0.04)
- Europe > France (0.04)
- North America > United States > Washington > King County > Seattle (0.04)
- (6 more...)
- Law Enforcement & Public Safety > Fraud (1.00)
- Information Technology > Security & Privacy (1.00)
- Banking & Finance (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science > Data Mining (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning (0.93)
Privacy Risk Predictions Based on Fundamental Understanding of Personal Data and an Evolving Threat Landscape
Niu, Haoran, Barber, K. Suzanne
--It is difficult for individuals and organizations to protect personal information without a fundamental understanding of relative privacy risks. By analyzing over 5,000 empirical identity theft and fraud cases, this research identifies which types of personal data are exposed, how frequently exposures occur, and what the consequences of those exposures are. We construct an Identity Ecosystem graph--a foundational, graph-based model in which nodes represent personally identifiable information (PII) attributes and edges represent empirical disclosure relationships between them (e.g., the probability that one PII attribute is exposed due to the exposure of another). Leveraging this graph structure, we develop a privacy risk prediction framework that uses graph theory and graph neural networks to estimate the likelihood of further disclosures when certain PII attributes are compromised. The results show that our approach effectively answers the core question: Can the disclosure of a given identity attribute possibly lead to the disclosure of another attribute? Different individuals and organizations have different sets of personally identifiable information (PII), and therefore have different perspectives on which PII attributes are more vulnerable, more valuable, and in greater need of protection. An individual's PII includes personal data in four different categories--What you Know (e.g., name, address, phone number, mother's maiden name), What you Have (e.g., driver's license, Social Security Card, employee ID, passport), What you Are (e.g., fingerprint, voice, facial image), and What you Do (e.g., patterns of life such as websites visited, GPS locations visited, phone logs) [1]. Protecting PII data can be costly and time-consuming. Research has uncovered various strategies to reduce risks of unintended data disclosure [2], including statistical disclosure limitation (SDL) techniques commonly used by national statistical agencies before releasing public-use data sets.
- North America > United States > Texas > Travis County > Austin (0.04)
- North America > United States > New Mexico > Los Alamos County > Los Alamos (0.04)
- Information Technology > Security & Privacy (1.00)
- Transportation > Ground > Road (0.34)
Top 5 scams spreading right now
NetChoice Policy Director Patrick Hedger joins'Fox News Live' to explain why the United States must embrace artificial intelligence to stay ahead in national security. Lately, I've had way too many calls on my shows from people who have lost thousands (sometimes hundreds of thousands) to scams. These are so cleverly evil, it's like Ocean's Eleven but starring a dude with three Instagram followers and a ChatGPT subscription. Last chance to enter to win 500 in giveaway. You see, we're way past scam emails from sketchy Nigerian princes.
- North America > United States > New Hampshire (0.05)
- North America > United States > Iowa (0.05)
- North America > United States > California > Los Angeles County > Los Angeles (0.05)
For years she was a perfect wife. Then he learned of her arrest in a deadly dating app scheme
William Phelps was at work when he got the call from the FBI that he had to return home at once. It was December 2023 and his wife, Aurora Phelps, was in big trouble, something to do with a fraud scheme. About a dozen agents turned his apartment upside down looking for evidence in their case, and William Phelps wouldn't see his wife again. That is, until this week, when William came to learn the scope of the allegations against his wife. According to federal prosecutors, Aurora was the perpetrator of a deadly romance scam, connecting with older men on the internet, then drugging them and stealing from their bank accounts.
- North America > United States > California (0.40)
- North America > United States > Nevada > Clark County > Las Vegas (0.07)
- North America > Mexico > Mexico City > Mexico City (0.06)
- North America > Mexico > Jalisco > Guadalajara (0.05)
Don't let AI phantom hackers drain your bank account
Kurt Knutsson joins "Fox & Friends" to discuss bank scams and a self-driving car that trapped a rider inside. Tech support scams have been around for years, but a new variant called the Phantom Hacker scam is rapidly gaining traction. It has cost victims, primarily older Americans, over 500 million since 2023. This scam is particularly deceptive because it unfolds in three carefully orchestrated phases and uses AI-powered social engineering tactics to avoid detection. Attackers leverage caller ID spoofing and AI-generated voices to make their scheme more persuasive, but there are ways to protect yourself.
PERC: Plan-As-Query Example Retrieval for Underrepresented Code Generation
Yoo, Jaeseok, Han, Hojae, Lee, Youngwon, Kim, Jaejin, Hwang, Seung-won
Code generation with large language models has shown significant promise, especially when employing retrieval-augmented generation (RAG) with few-shot examples. However, selecting effective examples that enhance generation quality remains a challenging task, particularly when the target programming language (PL) is underrepresented. In this study, we present two key findings: (1) retrieving examples whose presented algorithmic plans can be referenced for generating the desired behavior significantly improves generation accuracy, and (2) converting code into pseudocode effectively captures such algorithmic plans, enhancing retrieval quality even when the source and the target PLs are different. Based on these findings, we propose Plan-as-query Example Retrieval for few-shot prompting in Code generation (PERC), a novel framework that utilizes algorithmic plans to identify and retrieve effective examples. We validate the effectiveness of PERC through extensive experiments on the CodeContests, HumanEval and MultiPL-E benchmarks: PERC consistently outperforms the state-of-the-art RAG methods in code generation, both when the source and target programming languages match or differ, highlighting its adaptability and robustness in diverse coding environments.
- Asia > Singapore (0.04)
- Asia > South Korea > Seoul > Seoul (0.04)
- North America > Dominican Republic (0.04)
- (3 more...)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Automatic Programming (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.50)
Automating Detective Work
Every fingerprint is believed to be unique, making it possible to identify an individual by matching a new fingerprint with an image on file, whether to unlock a mobile phone, access a bank account, or solve a murder. Fingerprint examiners, however, do not always agree on whether two print images match and, asked to recheck their work after several months, they sometimes do not even agree with themselves. That is leading to increased use of neural networks, powerhouses for identifying and matching patterns of all sorts, to automate and improve decisions about whether two fingerprints come from the same person. A group of computer scientists decided to use neural networks to test the assumption that no two fingerprints are the same. Using twin neural networks, researchers from Columbia University, Tufts University, and the State University of New York (SUNY) University at Buffalo looked for similarities between different fingerprints in a database from the National Institute of Standards and Technology (NIST).
- North America > United States > New York (0.25)
- North America > United States > Michigan (0.05)
- North America > United States > California > Orange County > Irvine (0.05)
- Europe > Switzerland > Vaud > Lausanne (0.05)
Word Order in English-Japanese Simultaneous Interpretation: Analyses and Evaluation using Chunk-wise Monotonic Translation
Doi, Kosuke, Ko, Yuka, Makinae, Mana, Sudoh, Katsuhito, Nakamura, Satoshi
This paper analyzes the features of monotonic translations, which follow the word order of the source language, in simultaneous interpreting (SI). Word order differences are one of the biggest challenges in SI, especially for language pairs with significant structural differences like English and Japanese. We analyzed the characteristics of chunk-wise monotonic translation (CMT) sentences using the NAIST English-to-Japanese Chunk-wise Monotonic Translation Evaluation Dataset and identified some grammatical structures that make monotonic translation difficult in English-Japanese SI. We further investigated the features of CMT sentences by evaluating the output from the existing speech translation (ST) and simultaneous speech translation (simulST) models on the NAIST English-to-Japanese Chunk-wise Monotonic Translation Evaluation Dataset as well as on existing test sets. The results indicate the possibility that the existing SI-based test set underestimates the model performance. The results also suggest that using CMT sentences as references gives higher scores to simulST models than ST models, and that using an offline-based test set to evaluate the simulST models underestimates the model performance.
- Asia > Japan > Honshū > Chūbu > Toyama Prefecture > Toyama (0.04)
- North America > Canada > Ontario > Toronto (0.04)
- Europe > Spain (0.04)
- (18 more...)