SEARCH
  • [:en]Recent Posts[:af]Onlangse bydraes

  • [:en]Categories[:af]Kategorieë

  • [:en]Archives[:af]Argiewe

bots

[:en] The (ro)bots are here [:af] Die (ro)botte is hier

Friday, April 15th, 2016

[:en]

robotFor decades sci-fi movies have told us robots will take over the world one day. We don’t have to prepare for a robot war just yet, but they are part of our lives. We just don’t realise it. 

Bots have been in the news recently; some, like Tay, for the wrong reasons. But why all the fuss suddenly?

One of the reason is the swift improvement of the artificial intelligence technology bots are powered with. Key Silicon Valley players Facebook, Google and Telegram have been at the forefront of these developments. At Wednesday’s F8 conference Facebook announced that were adding various bots, including a CNN bot, to their Messenger app.

Most of us don’t know what a bot is and what it does. Even though it sounds suspicious, a bot is merely software designed to automate and complete simple and repetitive tasks you would usually perform yourself. For example, adding appointments to your calendar or making reservations, ordering food, etc. If you were living in America, you’d be able to use the Taco Bell bot to order and pay for your meal.

Chatterbots or chatbots are used in messaging apps and to simulate conversations via auditory or textual methods. They are designed to engage in small talk and ideally they should convince the person on the other end that the program is human.

Large international companies Lloyds Banking Group, Royal Bank of Scotland, Renault and Citroën all use automated chatterbots.  They can be used to answer basic customer enquiries, a function a call centre agent might normally deal with, or to acquire information. 

Other bots can help you schedule meetings by e-mail. The bot is added to your e-mail thread and continues the conversation needed to schedule a meeting. 

Unfortunately, bots can be used for malicious purposes. For example, posing as a human in chat rooms to tempt users to divulge personal information. They can be found on Yahoo! Messenger, Windows Live Messenger, AOL Instant Messenger and other instant messaging protocols.  

Next time you send a chat message to someone at a call centre, you might be talking to Amy, the bot, not Amy, the human. We can confirm that all our own IT Service desk agents are 100% human.

More recent articles on bots (and robots!):

Shopify acquires Kit, the artificially intelligent marketing bot
Hitachi’s cute new customer service robot seeks out lost customers
Fear the future: Donalddrumpfbot coming to Facebook Messenger 
Facebook’s David Marcus explains how bots are going to change Messenger
This personal shopping startup just launched one of the first Facebook Messenger bots
Facebook launches Messenger platform with chatbots
Microsoft created a bot to auto-caption photos and it’s going hilariously wrong

[SOURCES: http://www.recode.net, http://www.wikipedia.org]

  

[:af] 

Wetenskapfiksie vertel al vir jare dat robotte die wêreld gaan oorneem. Ons hoef nog nie gereed te maak vir ʼn robot-oorlog nie, maar botte is reeds deel van ons lewens. Ons besef dit net nie. 

robot

Bots is die afgelope tyd gereeld in die nuus. Sommiges, soos Tay, om die verkeerde redes. Maar hoekom ewe skielik die ophef? 

Een van die redes is die eensklapse vordering in die kunsmatige intelligensie tegnologie wat hierdie botte dryf. Sleutelfigure in Silicon Valley, soos Facebook, Google en Telegram is aan die voorgrond van die ontwikkelinge. Facebook het Woensdag op hulle F8-konferensie aangekondig dat hulle verskeie botte, onder andere ʼn CNN-bot, by hul Messenger-toepassing voeg.

Die meeste van ons weet nie regtig wat ʼn bot is of wat dit doen nie. ʼn Bot is nie iets wat die wêreld gaan oorneem nie (wel, nog nie). Dis doodgewoon sagteware wat ontwerp is om eenvoudige, herhalende take wat jy gewoonlik self sou verrig, te outomatiseer en voltooi. Dit kan byvoorbeeld afsprake op jou kalender voeg, besprekings maak of kos bestel. As jy in Amerika gewoon het, kon jy die Taco Bell bot gebruik het om jou tacos te bestel en betaal.

Chatterbots of chatbots word hoofsaaklik gebruik in boodskap-toepassings om gesprekke te simuleer deur ouditoriese en tekstuele metodes. Hulle is ontwerp om eenvoudige gesprekke te voer en behoort die persoon aan die ander kant te oortuig dat hulle `n persoon is.

Groot internasionale maatskappye soos Lloyds Banking Group, Royal Bank van Skotland, Renault en Citroën gebruik almal outomatiseerde chatterbots. Die botte word gebruik word om basiese kliënte navrae te hanteer wat ʼn dienstoonbank normaalweg sou beantwoord, of om inligting te bekom.

Ander botte kan jou help om vergaderings per e-pos te skeduleer. Die bot word bygevoeg in die e-posgesprek en neem oor by jou sodra die skedulering van ʼn vergadering gedoen moet word.

Ongelukkig kan botte ook kwaadwillig gebruik, byvoorbeeld om gebruikers in geselskamers te oortuig om hul persoonlike inligting uit te gee. Hierdie botte kan gevind word in Yahoo! Messenger, Windows Live Messenger, AOL Instant Messenger en ook ander kitsboodskap protokolle.

Volgende keer as jy met iemand by ʼn dienstoonbank gesels, onthou, jy praat dalk met Amy die bot, nie met Amy die mens nie. Ons kan darem wel bevestig dat, as jy die IT Dienstoonbank skakel, al ons agente steeds 100% mens is.

Meer onlangse artikels oor botte (en selfs robotte!)

Shopify acquires Kit, the artificially intelligent marketing bot
Hitachi’s cute new customer service robot seeks out lost customers
Fear the future: Donalddrumpfbot coming to Facebook Messenger 
Facebook’s David Marcus explains how bots are going to change Messenger
This personal shopping startup just launched one of the first Facebook Messenger bots
Facebook launches Messenger platform with chatbots
Microsoft created a bot to auto-caption photos and it’s going hilariously wrong

[BRONNE: http://www.recode.net, http://www.wikipedia.org]

Attack of the trojans, bots & zombiesDie trojane, bots & zombies val in

Friday, August 30th, 2013

Once of the most common questions we are asked by users is: How do these spammers get my e-mail address? Previously we looked at Rumpelstiltskin attacks and this week we will focus on the second of the methods –  by using Trojan Horses, Bots and Zombies. Now, thet may sound like something from a movie, but they do pose quite a serious threat to you as e-mail user.

Let us use a familiar example. You regularly exchange emails with your elderly mother who has a computer. Your mother uses Outlook or Thunderbird and has dozens of emails from you in her inbox. She even added you to her address book. She also has lots of emails from a distant family member – cousin Johan from Australia. You haven’t stayed in touch with Johan that closely over the years, but you definitely know who he is.

Last year, just before the Christmas, Johan downloaded and installed this really pretty Christmas screensaver that showed tranquil tree and candle scenes when he wasn’t using the computer. What he didn’t know was that the screen saver had a sinister hidden payload. While the candles flickered peacefully on his screen, the software went to work combing through his emails and address book, his browser’s cache of past webmail sessions and other files, storing every email address it would find in a separate list.

Then it sent the entire list to a server in Russia, where a criminal combined it with other such submissions to build the ultimate monster spam list that can be sold and resold over and over again.

But as if that wasn’t enough, when the “screensaver” sent the address list to Russia, it received some content in return – messages to be sent to all of Johan’s contacts. Then, unbeknownst to John, his computer started creating hundreds of emails randomly using the harvested email addresses in the To: and From: field along with the content from the Russian server and sent them out using Johan’s Internet connection. One of them used your mother’s email address as sender and yours as recipient.

Now you received some spam from your mother asking you to buy fake watches and you’re ready to speak to her telling her to stop. Well, don’t. Your mother has obviously nothing to do with the whole thing and you’ll never find out that it was actually Johan’s computer.

You just had a look into the really nasty underworld of the Internet where botmasters (the guy in Russia) control botnets (infected computers that all report to the same server) of remote-controlled zombies (Johan’s computer) that were compromised using trojan horses (the screensaver) or similar malware.

And it doesn’t even end there. The botmaster typically doesn’t spam for his own account but hires out his botnet to whoever pays the most. The equally shady factory in China wanting to sell more fake Rolexes can now hire the botmaster to blast their offers all over the internet. The guy in Russia doesn’t even care if you open or click on that email from your mother, he gets paid either way. And when he’s done with the watches, he’ll inform his entire mailing list that they all won the lottery and can pick up the prize if only they pay a small “transfer fee” up front. And after that, he’ll mail a Paypal phish for yet another “client”. And for good measure, he’ll sell his entire email address database, incl. yours, to a friend who is in the same line of “business”.

In other words, once your email address got picked up by a botnet, Pandora’s Box is wide open. The whole scheme is particularly wicked because now you have to depend on others to keep your address safe. Unfortunately, there is little you can do:

  • First of all, do your own share: NEVER open email attachments that you didn’t ask for, even if they appear to come from good friends like Johan. If you’re still curious, ask Johan or your mother first if they really sent it.
  • NEVER download anything where you can’t in­de­pend­ent­ly verify it’s safe. With“independently verify” I mean you can read about it in forums, blogs, news sites, your local “computer geek” etc. Facebook fan pages, even with 1000s of “fans”, do NOT count, they are way too easy to manipulate and are usually full of misinformation!
  • NEVER get fooled by fake “security scans” (they’re quite the opposite!) or“video codec updates” to see that funny kitten clip. If you think you need a new Flash player, type in flash.com by hand and update from there. If afterwards the site still says you need an “update” get out of there as fast as you can.
  • Then educate your friends and family about the same. Explain how trojans work. Send them a link to this blog page!
  • You can try having multiple private email addresses. Keep a super-private one, only for family and very few of your closest friends.  Use your university address for everyone you work with and don’t use this for private mail – EVER!  Get a semi-private one for your wider social circle. The latter two do get some spam, although it’s still manageable. GMail has a very good “spam filter”, and blacklisting spammers is very easy!

 

[ARTICLE BY DAVID WILES & MATERIAL BY BustSpammers.com]

Een van die algemeenste navrae wat ons by gebruikers kry, is – “Hoe kry gemorsposversenders my e-posadres?!”. By `n vorige geleentheid het ons gekyk na Repelsteeltjie-aanvalle en die keer kyk ons na `n tweede metode, die gebruik van Trojaanse perde, robotte en zombies. Dit klink nou wel soos iets uit `n fliek, maar ten spyte van hul belaglike name, hou al drie `n gevaar in vir jou as e-posgebruiker.

Kom ons gebruik `n bekende voorbeeld. Jy stuur gereeld e-posse aan jou ma wat onlangs `n rekenaar gekry het. Sy gebruik Outlook of Thunderbird en het dosyne e-posse van jou in haar posbus. Sy’t jou selfs bygevoeg as `n kontak in haar adresboek. Sy kry ook gereeld e-pos van `n verlangse familielid – neef Johan van Australië. Jy en Johan het nie regtig kontak nie, maar jy weet definitief wie hy is.

Verlede jaar, net voor Kersfees, het Johan ‘n baie oulike Kersfees skermskut (“screensaver”) afgelaai wat `n feestelike boom en flikkerende kersies wys as hy weg is van sy rekenaar. Wat Johan egter nie geweet het nie, is dat, terwyl die kersies vrolik geflikker het, die skermskut op die agtergrond besig was met ander aktiwiteite. Die sagteware wat Johan installeer het, het stelselmatig deur sy e-posse, adresboek, webblaaier se kasgeheue en ander leêrs gesoek en elke e-pos adres wat dit kon opspoor, gebêre op `n lys.

Die program het daarna die saamgestelde lys na `n bediener in Rusland versend waar `n kuberkrimineel dit kombineer het met soortgelyke lyste om `n super-lys saam te stel wat oor en oor verkoop kan word. Asof dit nie genoeg was nie, het die program ook boodskappe aan al Johan se kontakte gestuur. Sonder dat Johan bewus was, het sy rekenaar honderde e-posse geskep deur middel van die ge-oeste adresse, saam met die inhoud van die Russiese bediener en dit uitgestuur via Johan se adres en internetkonneksie. Een hiervan het jou ma se e-posadres as versender en joune as ontvanger gebruik.

Ewe skielik kry jy nou e-pos van jou ma oor nagemaakte horlosies en verskeie ander gemorspos. Natuurlik het sy het niks daarmee te doen nie en jy sal waarskynlik nooit uitvind dat Johan se rekenaar eintlik die skuldige party is nie.

Dit was `n kykie in die nare onderwêreld van die Internet waar “botmasters” (die ou in Rusland) “botnets” (besmette rekenaars wat almal aan dieselfde rekenaar rapporteer) beheer of afstandbeheerde zombies (Johan se rekenaar) wat blootgestel is d.m.v. trojaanse perde (die skermskut) of soortgelyke “malware”.

En daar hou dit nie op nie. Die “botmaster” huur gewoonlik net die “botnet” uit aan wie ookal die meeste betaal. Die ewe verdagte fabriek in China wat nog meer nagemaakte Rolex-horlosies wil verkoop kan dit, onder andere, huur om hul e-posse te versprei. Daarna verkoop hy die lys ten duurste aan ander suspisieuse besighede, jou adres ingesluit. 

Met ander woorde, as jou adres opgetel word deur `n “botnet” is die deure wawyd oop. Ongelukkig is daar nie baie wat jy kan doen om dit te voorkom nie, maar jy kan op die volgende let:

  • Moet nooit e-pos aanhangsels oopmaak waarvoor jy nie gevra het nie – selfs al is dit van iemand wat jy ken. As jy wel nuuskierig is, vra vir die persoon of hulle dit gestuur het.  
  • Moet nooit iets aflaai as jy nie self kan verifieer dat dit veilig is nie. Lees eers op daaroor op forums, blogs, webwerwe of vind uit by kenners.
  • Moenie val vir sekuriteitswaarskuwings of video-opdaterings om daai oulike katprentjie te sien nie. As jy dink jy het `n Flash-speler nodig, laai dit af van die webwerf self.
  • Deel hierdie inligting met jou vriende en familie. 
  • Om veilig te speel kan jy meer as een e-posadres gebruik. Kry `n privaat adres vir jou naaste vriende, `n tweede een vir kennisse en gebruik jou sun-adres net vir jou kollegas, nie vir privaat aangeleenthede nie. GMail het byvoorbeeld `n baie goeie gemorsposfilter en dis maklik om ontslae te raak van ongewenste e-posse. 

[BRON: BustSpammers.com & David Wiles]