Connect with us

Technology

Inside Microsoft’s AI content verification plan

Published

on

Inside Microsoft’s AI content verification plan

NEWYou can now listen to Fox News articles!

Scroll your social media feed for five minutes. You will likely see something that looks real but feels slightly off.

Maybe it is a viral protest image that turns out to be altered. Maybe it is a slick video pushing a political narrative. Or maybe it is an artificial intelligence voice clip that spreads before anyone stops to question it.

AI-enabled deception now permeates everyday life. And Microsoft says it has a technical blueprint to help verify where online content comes from and whether it has been altered.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Microsoft’s proposal would attach digital fingerprints and metadata to help trace where online content originated. (YorVen/Getty Images)

Why AI-generated content feels more convincing today

AI tools can now generate hyperrealistic images, clone voices and create interactive deepfakes that respond in real time. What once required a studio or intelligence agency now requires a browser window. That shift changes the stakes.

It is no longer about spotting obvious fakes. It is about navigating a digital world where manipulated content blends into your daily scroll. Even when viewers know something is AI-generated, they often engage with it anyway. Labels alone do not automatically stop belief or sharing. So Microsoft is proposing something more structured.

How Microsoft’s AI content verification system works

To understand Microsoft’s approach, picture the process of authenticating a famous painting. An owner would carefully document its history and record every change in possession. Experts might add a watermark that machines can detect, but viewers cannot see. They could also generate a mathematical signature based on the brush strokes.

Now Microsoft wants to bring that same discipline to digital content. The company’s research team evaluated 60 different tool combinations, including metadata tracking, invisible watermarks and cryptographic signatures. Researchers also stress-tested those systems against real-world scenarios such as stripped metadata, subtle pixel changes or deliberate tampering.

Advertisement

Rather than deciding what is true, the system focuses on origin and alteration. It is designed to show where the content started and whether someone changed it along the way.

What AI content verification can and cannot prove

Before relying on these tools, you need to understand their limits. Verification systems can flag whether someone altered content, but they cannot judge accuracy or interpret context. They also cannot determine meaning. For example, a label may indicate that a video contains AI-generated elements. It will not explain whether the broader narrative is misleading.

Even so, experts believe widespread adoption could reduce deception at scale. Highly skilled actors and some governments may still find ways around safeguards. However, consistent verification standards could reduce a significant share of manipulated posts. Over time, that shift could reshape the online environment in measurable ways.

Why AI labels create a business dilemma for social platforms

Here is where the tension becomes real. Platforms depend on engagement. Engagement often feeds on outrage or shock. And AI-generated content can drive both. If clear AI labels reduce clicks, shares or watch time, companies face a difficult choice. Transparency can clash with business incentives.

FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

Advertisement

Invisible watermarks and cryptographic signatures could signal when images or videos have been altered. (Chona Kasinger/Bloomberg via Getty Images)

Audits of major platforms already show inconsistent labeling of AI-generated posts. Some receive tags. Many slip through without disclosure.

Now, U.S. regulations are stepping in. California’s AI Transparency Act is set to require clearer disclosure of AI-generated material, and other states are considering similar rules. Lawmakers want stronger safeguards.

Still, implementation matters. If companies rush verification tools or apply them inconsistently, public trust could erode even faster.

The risk of incorrect AI labels and false flags

Researchers also warn about sociotechnical attacks. Imagine someone takes a real photo of a tense political event and modifies only a small portion of it. A weak detection system flags the entire image as AI-manipulated.

Advertisement

Now, a genuine image is treated as suspect. Bad actors could exploit imperfect systems to discredit real evidence. That is why Microsoft’s research stresses combining provenance tracking with watermarking and cryptographic signatures. Precision matters. Overreach could undermine the entire effort.

How to protect yourself from AI-generated misinformation

While industry standards evolve, you still need personal safeguards.

1) Slow down before sharing

If a post triggers a strong emotional reaction, pause. Emotional manipulation is often intentional.

2) Check the original source

Look beyond reposts and screenshots. Find the first publication or account.

3) Cross-check major claims

Search for coverage from reputable outlets before accepting dramatic narratives.

Advertisement

4) Verify suspicious images and videos

Use reverse image search tools to see where a photo first appeared. If the earliest version looks different, someone may have altered it.

5) Be skeptical of shocking voice recordings

AI tools can clone voices using short samples. If a recording makes explosive claims, wait for confirmation from trusted outlets.

6) Avoid relying on a single feed

Algorithms show you more of what you already engage with. Broader sources reduce the risk of getting trapped in manipulated narratives.

7) Treat labels as signals, not verdicts

An AI-generated tag offers context. It does not automatically make content harmful or false.

8) Keep devices and software updated

Malicious AI content sometimes links to phishing sites or malware. Updated systems reduce exposure.

Advertisement

Strengthen account security

Use strong, unique passwords and a reputable password manager to generate and store complex logins for you. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Also, enable multi-factor authentication where available. No system is perfect. But layered awareness makes you a harder target.

Experts say stronger AI labeling standards may reduce deception, but they cannot determine what is true. (iStock)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Microsoft’s AI content verification plan signals that the industry understands the urgency. The internet is shifting from a place where we question sources to a place where we question reality itself. Technical standards could reduce manipulation at scale. But they cannot fix human psychology. People often believe what aligns with their worldview, even when labels suggest caution. Verification may help restore some trust online. Yet trust is not built by code alone.

So here is the question. If every post in your feed came with a digital fingerprint and an AI label, would that actually change what you believe?  Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Why the Microsoft 365 Copilot bug matters for data security

Technology

Listen to this: Mabe Fratti’s experimental cello pop

Published

on

Listen to this: Mabe Fratti’s experimental cello pop

The opening notes of “Kravitz”, which kicks off Mabe Fratti’s 2024 record Sentir Que No Sabes, are lodged in my brain permanently. It’s not a showy album, by any means. But there’s something about the buzzing of her cello, plucked as you might an upright bass. The way they ring out before coming to an abrupt stop, fuzz still hanging in the air, set against a simple kick and snare sat firmly in the pocket. There’s something industrial about the way it all comes together, like a jazzy “Closer.”

Then come Fratti’s paranoid lyrics in Spanish about ears in the ceiling and someone listening through the walls, and the slightly atonal horn blasts. In the back half, the arrangement blooms with big piano chords, and the drums pick up steam. It’s the perfect opening to a record that sees Fratti taking her experimental impulses and working them into something that more closely resembles pop music, straying further from her avant-garde roots.

Fratti was born in Guatemala, but operates out of Mexico. She’s told Pitchfork that, as a child, her parents mostly played Christian and classical music around the house. But as a teen, she discovered Limewire and the works of experimental composers like György Ligeti. This more expansive, internet-fed musical diet is on display in tracks like “Pantalla Azul.” It flits about, toying with various styles from goth rock to new age, but always coming back to the strength of Fratti’s melodic instincts. Meanwhile, “Oidos” leans fully into chamber pop, with echoed cello stabs, plaintive trumpet, and what sounds like an autoharp.

Even when the arrangements are stripped down, Sentir Que No Sabes sounds lush and enveloping. It would feel equally at home in a coffee shop or on an arena stage. The production from I. La Católica (Héctor Tosta) is the glue holding together Fratti’s frantic stylistic shifts and jagged cello manipulations. It would be easy for the delicate horns, atonal pizzicato strings, and icy digital synths to sound like several different albums stitched together haphazardly. Instead, the undercurrent of unease and lightly crushed drums form a thread tying all the disparate pieces together.

That’s not to say there aren’t moments of full-on experimental freakouts. Fratti indulges her more abstract musical inclinations on interludes like “Elástica” I and II, but the brilliance of Sentir Que No Sabes is in how it repackages her experimental instincts into something more approachable and downright catchy at times.

Advertisement

A comparison often thrown around when discussing Fratti’s music is Arthur Russell, and it makes sense. Russel was also an avant-garde cellist with surprising pop instincts. But he rarely married those two sides of his music as directly as Fratti does. For the most part, he had pop songs, and he had experimental compositions. Over her last few albums, both as a solo artist and as one half of the duo Titanic, Mabe Fratti has sought to break down those walls.

Continue Reading

Technology

Why widows and divorced women are targets for retirement scams

Published

on

Why widows and divorced women are targets for retirement scams

NEWYou can now listen to Fox News articles!

International Women’s Day celebrates empowerment, independence and resilience. However, people rarely talk about a difficult reality. Women navigating major life transitions, especially widows and divorced women, have become prime targets for sophisticated financial scams. In fact, scammers often look for people going through emotional or financial change. That is exactly what happened to one woman interviewed by ICE after she lost her husband and turned to online dating.

“Somebody suggested going online through a dating service… and this guy’s pictures showed up. He was no George Clooney, nothing gorgeous, but he did resemble my husband.”

Stories like this highlight an uncomfortable truth. Romance scams do not succeed because victims are careless. Instead, scammers carefully identify potential targets and craft messages that feel personal and believable. Increasingly, that targeting begins with data.

Scammers often build trust slowly through online conversations before introducing fake investment opportunities. (iStock)

Advertisement

Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

Life transitions create digital signals

When someone loses a spouse or goes through a divorce, certain information often becomes public or commercially available:

  • Obituaries list surviving spouses, family members and cities.
  • Property records reflect ownership changes.
  • Court filings may indicate marital status updates.
  • Address changes and household composition shifts get logged in databases.

Data brokers collect and package this information. They build profiles that may include:

  • Age
  • Property ownership
  • Estimated income or home value
  • Household composition
  • Marital status indicators

While this data is often marketed for advertising purposes, it can also be misused. Scammers don’t randomly search for victims. They build targeting lists. And “recently widowed” and “newly single homeowner” are categories that can be inferred from publicly available and commercially aggregated data.

How obituary scraping fuels targeting

Obituaries are meant to honor loved ones. But they can also unintentionally expose personal details:

  • Full names
  • Surviving spouse
  • Children and other relatives
  • City of residence
  • Sometimes even maiden names.

Scammers scrape obituary websites and cross-reference them with people-search databases. Within days, they can identify surviving spouses, locate their addresses and find phone numbers. This is often the starting point for:

  • Fake investment pitches
  • Impersonation scams
  • Romance approaches
  • Fraudulent “financial advisor” outreach

The scammer’s advantage? They already know what just happened in your life. That makes their message feel personal and believable.

Romance-investment hybrids are exploding

One of the fastest-growing threats today is the so-called “pig butchering” scam – a long-term romance scheme that transitions into an investment pitch.

Public records and data broker profiles can reveal life changes like widowhood or divorce, helping criminals identify potential targets. (Felix Zahn/Photothek via Getty Images)

Advertisement

Here’s how it works:

  • A scammer initiates contact through social media or messaging apps.
  • They build trust over weeks or months.
  • They introduce a “lucrative investment opportunity.”
  • The victim transfers funds to what appears to be a legitimate platform.
  • The money disappears.

Widows and divorced women are disproportionately targeted because scammers assume:

  • There may be life insurance proceeds or retirement savings available.
  • The individual is managing finances independently for the first time.
  • Emotional vulnerability may make relationship-building easier.

These scams can cost victims hundreds of thousands of dollars. And the targeting often begins with data broker profiles.

Fake financial advisors and retirement predators

Another growing tactic involves scammers posing as:

They may reference accurate details such as:

  • The value of your home
  • Your approximate age
  • Your city or neighborhood
  • Your marital status.

Because the information is correct, the outreach feels legitimate. Some even create fake websites, LinkedIn profiles and credentials to reinforce credibility. Women managing retirement assets alone, especially after the death of a spouse, are often approached with “exclusive” investment opportunities or urgent financial warnings. These predators rely on one thing: access to detailed personal information.

Why data exposure increases risk

The more publicly accessible your information is, the easier it becomes for scammers to craft convincing stories.

Data broker profiles can include:

Advertisement
  • Home addresses
  • Phone numbers
  • Names of relatives
  • Property ownership history
  • Estimated income bracket.

When scammers combine this with obituary data or court filings, they can infer life changes. They don’t need illegal hacking. They just need searchable data. Reducing that exposure significantly lowers the likelihood of becoming a target.

How to reduce your risk

International Women’s Day is about empowerment, and financial independence is a critical part of that. Protecting yourself means:

  • Being cautious with unsolicited investment offers
  • Verifying credentials independently
  • Never transferring funds based on online-only relationships
  • Limiting how easily your personal information can be found.

One of the most effective proactive steps is removing your personal data from people-search sites and other data brokers.

There are hundreds of these sites, each with its own opt-out process, and many relist your data later. However, reducing how much of your personal information appears online can make it much harder for scammers to build convincing profiles about you.

WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

Start by searching for your name on major people-search websites and reviewing what information appears publicly. If you find personal details listed, most sites provide instructions for requesting removal.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. 

Advertisement

By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Limiting how easily your personal information can be found online can reduce the chances of scammers targeting you. (Uchar/Getty Images)

MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Advertisement

Kurt’s key takeaways

International Women’s Day celebrates strength, independence and resilience. However, empowerment also means understanding how scammers operate in the real world. Criminals do not rely on luck. Instead, they rely on data. Obituaries, property records and data broker profiles can quietly reveal life changes that make someone appear financially stable yet emotionally vulnerable. Fortunately, awareness can change the equation. For example, you can verify financial advisors independently, question unsolicited investment offers and limit how easily people can find your personal information online. As a result, these steps can dramatically reduce your risk. Ultimately, protecting your financial future is part of protecting your independence. That goal sits at the heart of International Women’s Day.

Have you ever been contacted by someone online offering investment advice or a financial opportunity that felt suspicious?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Related Article

Scams that aren't illegal (but should be)
Continue Reading

Technology

Sony appears to be testing dynamic pricing on PlayStation games

Published

on

Sony appears to be testing dynamic pricing on PlayStation games

A site called PSprices has been tracking prices on Sony’s digital game store and noticed something unusual: some games were being offered at different prices to different users. What’s more, those offers are tracked in the PlayStation API with experiment identifiers like IPT_PILOT and IPT_OPR_TESTING.

Dynamic pricing is nothing new and is used across a number of industries. But it’s often met with backlash and isn’t typically found in online game stores. According to PSprices, Sony is running A/B testing on prices for over 150 games in 68 regions, though the US doesn’t currently appear to be part of the experiment. For now, at least, Sony isn’t toying with raising prices. Instead, the program appears to offer discounts to select users, ranging from 5 percent to 17.5 percent, on titles like Spider-Man 2, God of War, and Red Dead Redemption 2.

Still, even if Sony’s version of dynamic pricing is focused on lowering costs for some users, it’s likely to draw ire. Customers receiving a 10 percent discount on Sid Meier’s Civilization VII probably won’t be thrilled when they find out their next-door neighbor was offered 25 percent off.

We reached out to Sony for comment, but have yet to receive a response.

Continue Reading

Trending