{"id":879709,"date":"2024-11-22T09:08:03","date_gmt":"2024-11-22T03:38:03","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=879709"},"modified":"2024-11-22T09:22:21","modified_gmt":"2024-11-22T03:52:21","slug":"think-before-you-download-how-hackers-are-spreading-malware-using-fake-ai-video-tools","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/11\/22\/think-before-you-download-how-hackers-are-spreading-malware-using-fake-ai-video-tools\/","title":{"rendered":"Think before you download: How hackers are spreading malware using fake AI video tools"},"content":{"rendered":"<p>With Artificial Intelligence powered tools available on the internet, threat actors are using the opportunity to infect Windows and macOS-powered machines.  These malware not only steal your cryptocurrency wallet credentials but also target your passwords and browsing history. <\/p>\n<p>According to a recent report by Bleeping Computer, threat actors are spreading malware via fake websites that impersonate an AI video and image generator named EditPro.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With Artificial Intelligence powered tools available on the internet, threat actors are using the opportunity to infect Windows and macOS-powered machines. These malware not only steal your cryptocurrency wallet credentials but also target your passwords and browsing history. According to a recent report by Bleeping Computer, threat actors are spreading malware via fake websites that impersonate an AI video and image generator named EditPro.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-879709","post","type-post","status-publish","format-standard","hentry","category-newspapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/879709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=879709"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/879709\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=879709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=879709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=879709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}