Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

More Details

Sri Lankan Catholic Church Asks for a Transparent Investigation on the Easter Attacks

Colombia: A serious and transparent investigation on the instigators and perpetrators of the “Easter massacre”, the terrorist attack that in 2019 killed more than 250 people in Sri Lanka: this is what the Catholic Church asks, and through his more respected representative, Cardinal Malcom Ranjith, Archbishop of Colombo, the Church reminded the institutions of the urgent task and deepened some aspects to understand “how the April 21, 2019 attacks have occurred and who helped the aggressors”.

“We won’t hesitate in going to the street in order to protect the rights of our people”, these are the words of the Cardinal speaking in Ragama, in the north of Colombo. Despite the investigation initiated by Maithripala Sirisena, President Gotabaya Rajapaksa’s predecessor, “the procedure appears now to be lacking in transparency”, he said. “Some elements that must emerge are still hidden: who had the responsibility? Who helped the terrorists and who kept the contacts with them?” – he pointed out.

In February, the Sri Lankan government appointed a special team of six members to help the police in gathering information and accelerating a presidential investigation about the devastating attack. President Rajapaksa announced to “accelerate the ongoing investigation on the attack” that have proved to be crucial in his electoral success last November.

In fact, Rajapaksa has more than once mentioned the Easter Sunday terrorist attack during his electoral campaign in order to present himself as a “leader able to stop terrorism”. Rajapaksa won the elections against his rival Sajith Premadasa with a margin of 1.3 million votes (52.25% against 41.99% of his closest rival).

The previous government led by Maithripala Sirisena and Ranil Wickremesinghe was blamed for his incapability in preventing the attacks, even though the intelligence information had warned about the potential imminent attacks.

Nine suicide bombers belonging to the local Islamic extremist group “National Thawheed Jamaat” (NTJ) linked to ISIS carried out a series of devastating explosions that damaged three churches and the same number of luxury hotels during the Easter Sunday, killing 258 people including some foreign citizens~Agenzia Fides

Breach and Attack Stimulation

Organizations can better identify security posture vulnerabilities by using Breach and Attack Simulation (BAS) tools, which automate testing of threat vectors such lateral movement, data exfiltration, and external and insider threats.
Read More

Pet Quiz

it true that Dalmatian pups are born with spots? What other name is there for a parakeet?Which dog breed is the heaviest?
Read More

Stay Alert from Scammers

Fake profiles are created by scammers on chat apps, social media, and other platforms. They might pose as someone who is interested in a relationship, a friend, or a relative. They pose as employers, government agencies, real businesses, and online trading or investing platforms.
Read More

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies






Related Article

35 Years On, Chinese Man Seeks…

An auxiliary policeman in central China’s Henan province is seeking justice for his “stolen life ...
May 2, 2025

Junta Bombs Kill 8, Injure Dozens…

Junta aerial attacks in an embattled region of northwest Myanmar killed eight people and injured doz ...
May 1, 2025

Remote Island’s Brain-Damaged Seabirds Show Far-Reaching…

Promoted as “Just Paradise,” Lord Howe Island hundreds of kilometers east of Australia is a uniq ...
April 29, 2025

Chinese Man Who Displayed Pro-Democracy Banners…

Chinese authorities have detained a young man for unfurling pro-democracy banners this month at an ...

One Month On, Myanmar’s Quake Victims…

Some families have waited one month, hoping to receive critical aid in the aftermath of Myanmar’s ...
April 28, 2025

The Story of One of Buddhism’s…

The young boy who was abducted as a 6-year-old turned 36 on Friday.What he does, where he lives or e ...
April 25, 2025

Other Article

Prevent Cyber Crime

Breach and Attack Stimulation

Organizations can better identify security posture vulnerabilities by using Breach and Attack Simula ...
May 5, 2025
Pick of the Day

Permanent Representative of Pakistan Briefs Press…

Asim Iftikhar Ahmad,Permanent Representative of the Islamic Republic of Pakistan to the United Natio ...
May 2, 2025
Freedom of Press

Reporters’ Group Calls for Release of…

The Independent Myanmar Journalists Association is calling for the release of a reporter who was sen ...
Bizzare News

Trapper Grapples With an Alligator on…

A Florida alligator trapper and local law enforcement collaborated to catch a huge alligator in a hi ...
Pet Corner

Pet Quiz

it true that Dalmatian pups are born with spots? What other name is there for a parakeet?Which dog b ...
Prevent Cyber Crime

Stay Alert from Scammers

Fake profiles are created by scammers on chat apps, social media, and other platforms. They might po ...

Top