Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Al Technology. Show all posts

The Alarming Convergence of Cyber Crime and Real-World Threats

 


It is becoming increasingly evident that every aspect of everyday life relies on digital systems in today’s hyper-connected world, from banking and shopping to remote work and social media, as well as cloud-based services. With more and more people integrating technology into their daily lives, cybercriminals have become increasingly successful in hunting down and exploiting them. 

Malicious actors are exploiting vulnerabilities in both systems as well as human behaviour to launch sophisticated attacks, ranging from identity theft and phishing scams to massive ransomware campaigns and financial frauds, and the list goes on. There is no doubt that cybercrime has become a pervasive and damaging threat in the modern era. 

It affects both individuals, businesses, and governments. As lone hackers once dominated the market, this has now developed into a globally organized, organised industry that is driven by profit and armed with ever-evolving tools, including artificial intelligence, that are transforming the cybersecurity industry. 

The risk of falling victim to cyber-enabled crime continues to rise as billions of people interact with digital platforms daily, thereby making cybersecurity not only a technical matter but a fundamental necessity of our time. In the years that have followed, cybercrime has continued to grow in scope and sophistication, causing unprecedented damage to the global economy through phishing attacks and artificial intelligence-driven scams, now over $1 trillion annually. 

There is no doubt that cybercriminals are becoming more and more sophisticated as technology advances, and this alarming trend indicates that a coordinated, long-term response needs to take place that transcends the boundaries of individual organisations. A recognition of the systemic nature of cybercrime has led the Partnership against Cybercrime and the Institute for Security and Technology to launch the Systemic Defence initiative, which is in collaboration with the Institute for Security and Technology.

In this global effort, companies will be developing a multi-stakeholder, forward-looking, multi-layered approach to cybersecurity threats, especially phishing and cyber-enabled fraud, that will redefine how people deal with these threats in the future. There is a strong argument made by the project that instead of relying solely on reactive measures, that responsibility should be moved upstream, where risks can be mitigated before they become major problems before they become larger. 

Through this initiative, the government, industry leaders, law enforcement, and civil society members are encouraged to collaborate in order to create a more resilient digital ecosystem in which cyber threats can be anticipated and neutralised. There has never been a better time than now to share intelligence, deploy proactive defences, and establish unified standards in response to the growing use of artificial intelligence by threat actors to launch more deceptive and scalable attacks. 

As part of the Systemic Defence project, poeples will be able to identify and protect the global digital infrastructure from a rapidly evolving threat landscape as people move towards this goal. As cybercrime scales and impacts, experts warn of an increasing financial toll that could soon overshadow even the most devastating global events. This alarming pace has caused experts to warn that cybercrime could become more prevalent than ever before. 

According to projections by Cybersecurity Ventures, the cost of cybercrime worldwide will increase by 15 per cent annually by 2025, reaching $10.5 trillion per year in 2025 - an increase of 15 per cent from the $3 trillion in 2015. A dramatic escalation of this situation is widely considered to be the largest transfer of wealth in human history, putting a direct threat to global innovation, economic stability, and long-term investment. 

This forecast is not based on speculation, but rather on an in-depth analysis of historical data, combined with an increased number of state-sponsored cyberattacks and organized cybercrime syndicates, and an exponential increase in the number of digital attacks, all of which have led to this forecast. Increasingly, as the world becomes increasingly dependent on interconnected technologies, such as personal devices and enterprise systems, there are more opportunities for exploitation. This results in an ever-evolving landscape of risks in the world of cybercrime. 

There are far-reaching and multifaceted economic costs associated with cybercrime. Among the most significant losses are the destruction or theft of data, direct financial loss, disruption to operations, productivity losses, theft of intellectual property and confidential data, embezzlement and fraud, as well as the high costs associated with legal and forensic investigation. Additionally, organisations suffer long-term reputational damage as well as a loss of customer trust, which can be difficult to recover from for quite some time. 

In addition to its potential financial impact, cybercrime will have a much larger economic impact than all major illegal drugs combined, making it even more pressing. Cybercrime is expected to be more costly than the combined global trade of all major illegal drugs, and its economic impact will be exponentially larger than all natural disasters combined. As a consequence, cybercrime is no longer a niche security problem; it is now regarded as a systemic global threat that requires urgent, coordinated, and sustained attention from every sector. 

In the last decade or so, the cyber threat landscape has been transformed fundamentally, as a result of the rapid evolution of cybercrime and the increasing use of advanced persistent threat (APT) tactics by criminal actors. In 2024, Critical Start's Cyber Research Unit (CRU) is expecting a significant shift in cyber criminal activity, as they will be refining and using APT-level techniques that were once primarily associated with nation states. 

Using advanced methods, such as artificial intelligence, machine learning, social engineering, as well as spear-phishing campaigns, cyberattacks are becoming more effective, stealthier, and harder to detect or contain, as they now make use of smart methodologies. The APT tactic enables criminals, in contrast to traditional cyberattacks, which often rely on quick attacks and brute-force intrusion, to establish a long-term foothold within networks, carry out sustained surveillance, and carry out highly precise, calculated operations. 

As a result of the ability to remain undetected while gathering intelligence or gradually executing malicious objectives, governments, businesses, critical infrastructure companies, as well as individuals have been increasingly threatened. Despite the fact that cybercriminals have evolved in tactics, there has also been a fundamental shift in the scale, scope, and motivation of cybercrime as a whole. Cybercrime has since grown into a profitable enterprise mimicking the structure and strategy of legitimate businesses, which has evolved from a business largely driven by prestige or mischief during the early internet era of the 1990s. 

During the 1990s and 2006, cybercriminals began to capitalise on the economic potential of the internet, resulting in a period in which digital crime was being monetised. According to the World Economic Forum, cybercrime represents the third-largest economy in the world, illustrating its tremendous financial impact. Even more alarming about this evolution is the easy access to cybercriminal tools and services that make cybercrime so common. 

As a result of the democratisation of cybercrime, individuals with little or no technical expertise can now purchase malware kits, rent access to compromised networks, or utilise ransomware-as-a-service platforms at very low costs. Because of this, sophisticated attacks have increased in sophistication, especially in sectors such as healthcare, education, and commerce, as a result of this democratisation of cybercrime.

Cybercriminals have continued to blur the lines between criminal enterprises and nation-state tactics, making ransomware one of the most effective and preferred attack vectors. In today's cyber world, cybercriminals are often able to deliver malicious software through exploited security gaps. As such, it has become increasingly important to implement proactive, intelligence-driven, and systemic cybersecurity measures. This evolving digital warfront does not remain limited to high-profile organisations any longer. 

Every connected device and vulnerable system now represents a potential entry point into this digital war. In today's cybercrime ecosystem, there are a number of alarming aspects that are highlighting the use of the dark web by sophisticated threat actors, including state-sponsored organisations, which is becoming more prevalent. 

Based on the IBM X-Force 2025 Threat Intelligence Index, it is reported that actors are exploiting the anonymity and the decentralized nature of the dark web to acquire high-end cyber tools, exploit kits, stolen credentials, and services that will enable them to increase the scope and precision of their attacks by acquiring cutting-edge cyber tools. 

Cybercriminal innovation has been fueled by this hidden marketplace, enabling a level of coordination, automation, and operational sophistication that has reshaped the global threat landscape for the better. A threat from this adversary is no longer an isolated hacker working in a silo, but rather a group of highly organised, collaborative cybercriminals whose structure and efficiency are similar to that of legitimate businesses. 

In recent years, cybercriminals have been evolving in a rapid fashion, with unprecedented technical sophistication that allows them to go beyond simple data breaches to launch widespread disruptions in the digital world. Cybersecurity attacks include attacks on critical infrastructure, supply chains, and services that are essential to our daily lives, often with devastating consequences. Parallel to this growing threat, cyberattacks are posing a much greater financial toll than they ever have. 

According to IBM's latest report on the Cost of Data Breach, the average cost of a data breach is rising steadily at an alarming rate. The average cost of a data breach has increased by 10% from USD 4.45 million in 2023, which is the sharpest spike ever since the beginning of COVID-19. In addition to the increasing complexity and severity of cyber incidents, organisations are under increasing pressure to respond quickly and effectively to these incidents. 

The costs associated with business breaches are increasing, ranging from direct financial losses to forensic investigations, legal fees, customer notification, and identity protection services. During the past year, these post-incident expenses had increased by nearly 11%, and there has been a growing number of regulatory penalties that have been imposed. 

Throughout the report, it is highlighted that the number of organisations that have been fined more than USD 50,000 jumped 22.7%, and the number of organisations facing penalties over USD 100,000 increased by 19.5%. Therefore, organisations should think beyond traditional cybersecurity strategies to achieve the most effective results. 

The emergence of increasingly elusive and well-equipped threat actors has made it essential for businesses to develop an adaptable, intelligence-led, and resilience-focused approach so that they can mitigate long-term damage to digital assets and protect business continuity as well. It is well known that cybercrime is a resilient ecosystem, with actors who are financially driven specialising in specific roles, such as malware development, the brokerage of initial access, or the laundering of money. 

In general, these actors often work together fluidly, forming flexible alliances but maintaining multiple partners for the same service. This means that when one ransomware-as-a-service provider or malware hub is taken down, the disruption is only temporary, and others will quickly fill in to take over. There is no doubt that this adaptability illustrates the importance of broad, coordinated strategies geared towards dismantling the infrastructure that makes such operations possible, focusing instead on removing the individuals who facilitate these operations.

Organisations, governments, and individuals must adopt a proactive security mindset based on continuous adaptation to effectively combat the rising tide of cybercrime. It is not enough to deploy advanced technologies to accomplish this; it is essential that people foster cyber literacy at all levels, build cross-sectoral alliances, and incorporate security as a part of the DNA of digital transformation as a whole.

As threat landscapes change, regulatory frameworks must evolve in tandem, encouraging transparency, accountability and security-by-design across all sectors of technology. As the global digital economy becomes increasingly reliant on digital technology, cybersecurity is becoming a strategic imperative—an investment in long-term trust, innovation, and stability that can be achieved by building a resilient cyber workforce capable of anticipating and responding to threats quickly and with agility. 

As digital dependence deepens, cybersecurity must become a strategic imperative instead of just an operational consideration. Taking no action today will not only embolden the threat actors but will also undermine the very infrastructure that is at the heart of modern society if people do not act decisively.

India’s Growing Gaming Industry: Opportunities and Privacy Concerns

 


It has been predicted that India, with its vast youth population, will emerge as one of the most influential players in the gaming industry within the next few years, as online gaming evolves into a career. According to several reports, the global gaming sector has experienced consistent growth over the past five years.

Online gaming offers a way to connect with others who share a common interest, fostering social interaction. Many players engage with games over extended periods, creating a sense of community and familiarity. For some, meeting online offers comfort and flexibility, especially for individuals who prefer to choose how they present themselves to the world.

Privacy Concerns in the Digital Era

As digital technology advances, privacy concerns have intensified across various sectors, including gaming. Online multiplayer games, the increasing value of personal data, and heightened awareness of cybersecurity threats have driven the demand for stronger privacy protections in gaming.

With annual revenues exceeding $230 billion, video games have become the world’s most popular entertainment medium, surpassing the global movie and North American sports industries combined. The gaming industry collects extensive user data to cater to consumer preferences, raising ethical concerns about transparency and consent.

Challenges in Online Gaming

While games like Call of Duty and Counter-Strike connect players worldwide, they also introduce privacy challenges. Data collection enhances gaming experiences but raises questions about whether players are informed about the extent of this practice. Concerns also arise with microtransactions and loot boxes, where spending habits may be exploited.

Players are advised to adopt privacy practices, such as using usernames that do not reveal identifiable information and avoiding sharing personal details during in-game interactions. Many games enable features like unique screen names and avatars to maintain anonymity.

Location-based features in games may also pose risks, including stalking or harassment. To safeguard privacy, players should refrain from sharing contact or personal information with others and use caution in online interactions.

Enhancing Privacy and Security

To prevent doxing risks, gamers should use unique email addresses, profile pictures, and strong passwords for each platform. They should also separate gaming identities from personal lives and regularly review privacy settings to control who can view their profiles or interact with them.

Players should avoid downloading unsolicited attachments or clicking on suspicious links, which may expose devices to malware or spyware. Vigilance in downloading files from trusted sources is essential to prevent unauthorized access to sensitive information.

Data Tracking and Ethical Concerns

Online games increasingly track player behavior through analytical tools, monitoring everything from in-game activity to chat logs. While developers use this data to enhance gameplay, it raises concerns about potential misuse, including invasive advertising or malicious profiling.

Data tracking often extends beyond games, creating a sense of mistrust among players. Personal data has become a valuable commodity in the digital economy, with gaming companies often sharing it with third parties to generate revenue. This practice raises questions about consent and transparency, with players growing increasingly wary of how their data is used.

The gaming industry has witnessed several data breaches, exposing sensitive player information and undermining trust. Stronger data protection measures, including encryption and secure storage systems, are urgently needed to safeguard privacy.

Gaming companies should implement clear privacy policies and seek explicit consent before collecting or using personal information. Transparency about data collection practices, purposes, and third-party involvement is crucial. Players should also have the option to withdraw consent at any time.

Collaborating with certified privacy professionals can help companies establish responsible data management practices. By prioritizing user privacy, gaming companies can build trust, protect their users, and maintain a positive reputation in the industry.

UK Leads Global Cybersecurity Dialogue

 


As part of a three-day meeting with 'like-minded' countries, the UK has begun a conversation aimed at tackling the growing threat of cyber attacks and how to combat them. The government intends to initiate a global dialogue with leading nations from around the world so that the best action can be taken to eradicate global cyber threats and to close the cyber skills gap globally. 

There will be a cyber summit in the UK this week, where participants from the United States, Europe, Canada, Japan, and international organizations such as the World Economic Forum and the Organization for Economic Cooperation and Development will gather to discuss matters related to cybersecurity. 

It is rather unfortunate that the meetings take place at Wilton Park in West Sussex during this time, not least because there has been a spate of attacks on NHS service providers and attempts to disrupt transport networks in the past few months. During the next three days, a group of countries, including the EU member states, Canada, and Japan, and international organizations such as the World Economic Forum (WEF), will discuss the steps that can be taken to strengthen global cybersecurity workforces, from agreeing on strategies for boosting cyber-skills to creating new professional standards for cybersecurity. 

It is important to note that these conferences are taking place as a result of several high-profile cybersecurity incidents that have taken place in recent months, including attacks on Transport for London and NHS providers, as well as a global IT outage that shut down global transportation systems. To contribute to this, the UK has commissioned a new report to be presented at the conference, in which attendees are expected to agree on key areas the US should focus on. 

As a result of the recommendations, international collaboration will be advanced to improve cyber skills to combat cybercrime and maintain cybersecurity in times of crisis. A new initiative is also being launched by the UK government as part of its immediate action plan to provide tailored support to regions across England and Northern Ireland to help them cope with the effects of Brexit. 

A move to tap local know-how will enable the move to fund initiatives that will specifically address the cyber skills needs of every local area, whether it be applying apprenticeships or introducing new approaches to cyber security for businesses.  Ahead of the new legislation, the government has declared that data centers will be designated as Critical National Infrastructure (CNI) along with electricity and water networks, which is intended to enhance the security of the UK and to enable the government to provide support in the event of a major incident. 

The support of UK cyber skills will also contribute towards the development of the £11.9 billion data security industry and enhance the British economy's ability to grow. A new scheme is also set to be launched by the UK government at the same time as the international initiative to provide tailored support across different regions of England and Northern Ireland to complement the international initiative. This announcement was made by DSIT in a statement, which stated they were hoping that by tapping into local knowledge of the cyber security needs of different regions, the move might assist them in funding initiatives designed directly to meet those needs, whether it be through apprenticeships or developing new forms of cyber security for companies.  

In Northern Ireland and England, a total of £1.3m ($1.7m) has been made available to organizations such as universities, local councils, and businesses for the provision of cyber skills training. Furthermore, funding will be available to support firms in developing cyber defence innovations across the country. Developed by Innovate UK, through which grants worth up to £150,000 ($198,000) will be awarded by March 2025 to winning applicants for the scheme, which was launched this week.

Data centres were recently designated as Critical National Infrastructure (CNI) along with energy and water systems, an initiative that will greatly improve UK security and allow the government to support the sector in the event of any critical incidents that may occur within the sector. By boosting the UK cyber skills we are also helping to stimulate the £11.9 billion ($15.7 billion) cyber security industry in the UK and ensuring the economy continues to grow. 

It was reported on Saturday that the head of the National Cyber Security Centre has co-chaired a meeting with international partners to learn how democracies can assist in protecting communities whose privacy is at risk due to cyberattacks. As part of a strategic dialogue held yesterday (Thursday 28th September) between NCSC CEO Lindy Cameron and the Director of the United States Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, representatives of the US Department of Defense and leaders of six other countries discussed the threat of transnational repression that certain civil society groups face around the world. 

Early this year, these countries – Australia, Canada, Estonia, France, Japan, New Zealand, Norway, the UK, and the United States – committed to developing a strategy to support cyber security for these communities in light of the increasing use of cyber weapons by authoritarian governments to attack them. 

Among the groups identified as being at higher risk are members of the political profession, such as MPs, journalists, academics, lawyers, dissidents, and those sanctioned by foreign governments, as well as dissident groups and members of minority groups. This dialogue, which is being held by CISA as a part of its High-Risk Community Protection initiative, enabled participants to introduce themselves to one another, outline strategies for protecting civil society online, exchange insight about the threat landscape, and agree on the need to collaborate further.

The UK government's Cyber Security and Resilience Bill is also being introduced for discussion. As a result of this Bill, is planned to strengthen the UK's cyber defences, as well as ensure that critical infrastructures and digital services that companies rely on are secure in the future.   NCSC provides several cyber security guidance documents, including practical advice for people working in high-risk jobs such as those in government or politics, that are available on their website. 

Earlier this year, the National Cyber Security Center (NCSC) released a report that discussed how commercial cyber intrusion tools - or spyware - had probably been used by some governments to target journalists, human rights activists, political dissidents, and officials of foreign governments to disrupt their operations. 

After this first Strategic Dialogue on the Cyber Security of Civil Society Under Threat of Transnational Repression had been held, the participants agreed to meet again in the future to continue to address the challenges of transnational repression that they shared during this meeting.

ChatGPT Faces Data Protection Questions in Italy

 


OpenAI's ChatGPT is facing renewed scrutiny in Italy as the country's data protection authority, Garante, asserts that the AI chatbot may be in violation of data protection rules. This follows a previous ban imposed by Garante due to alleged breaches of European Union (EU) privacy regulations. Although the ban was lifted after OpenAI addressed concerns, Garante has persisted in its investigations and now claims to have identified elements suggesting potential data privacy violations.

Garante, known for its proactive stance on AI platform compliance with EU data privacy regulations, had initially banned ChatGPT over alleged breaches of EU privacy rules. Despite the reinstatement after OpenAI's efforts to address user consent issues, fresh concerns have prompted Garante to escalate its scrutiny. OpenAI, however, maintains that its practices are aligned with EU privacy laws, emphasising its active efforts to minimise the use of personal data in training its systems.

"We assure that our practices align with GDPR and privacy laws, emphasising our commitment to safeguarding people's data and privacy," stated the company. "Our focus is on enabling our AI to understand the world without delving into private individuals' lives. Actively minimising personal data in training systems like ChatGPT, we also decline requests for private or sensitive information about individuals."

In the past, OpenAI confirmed fulfilling numerous conditions demanded by Garante to lift the ChatGPT ban. The watchdog had imposed the ban due to exposed user messages and payment information, along with ChatGPT lacking a system to verify users' ages, potentially leading to inappropriate responses for children. Additionally, questions were raised about the legal basis for OpenAI collecting extensive data to train ChatGPT's algorithms. Concerns were voiced regarding the system potentially generating false information about individuals.

OpenAI's assertion of compliance with GDPR and privacy laws, coupled with its active steps to minimise personal data, appears to be a key element in addressing the issues that led to the initial ban. The company's efforts to meet Garante's conditions signal a commitment to resolving concerns related to user data protection and the responsible use of AI technologies. As the investigation takes its stride, these assurances may play a crucial role in determining how OpenAI navigates the challenges posed by Garante's scrutiny into ChatGPT's data privacy practices.

In response to Garante's claims, OpenAI is gearing up to present its defence within a 30-day window provided by Garante. This period is crucial for OpenAI to clarify its data protection practices and demonstrate compliance with EU regulations. The backdrop to this investigation is the EU's General Data Protection Regulation (GDPR), introduced in 2018. Companies found in violation of data protection rules under the GDPR can face fines of up to 4% of their global turnover.

Garante's actions underscore the seriousness with which EU data protection authorities approach violations and their willingness to enforce penalties. This case involving ChatGPT reflects broader regulatory trends surrounding AI systems in the EU. In December, EU lawmakers and governments reached provisional terms for regulating AI systems like ChatGPT, emphasising comprehensive rules to govern AI technology with a focus on safeguarding data privacy and ensuring ethical practices.

OpenAI's cooperation and its ability to address concerns regarding personal data usage will play a pivotal role. The broader regulatory trends in the EU indicate a growing emphasis on establishing comprehensive guidelines for AI systems, addressing data protection and ethical considerations. For readers, understanding these developments determines the importance of compliance with data protection regulations and the ongoing efforts to establish clear guidelines for AI technologies in the EU.



Accurate Eye Diagnosis, Early Parkinson's Detection

A revolutionary advancement in the realm of medical diagnostics has seen the emergence of cutting-edge AI tools. This ground-breaking technology identifies a variety of eye disorders with unmatched accuracy and has the potential to transform Parkinson's disease early detection.

According to a recent report from Medical News Today, the AI tool has shown remarkable precision in diagnosing a wide range of eye conditions, from cataracts to glaucoma. By analyzing high-resolution images of the eye, the tool can swiftly and accurately identify subtle signs that might elude the human eye. This not only expedites the diagnostic process but also enhances the likelihood of successful treatment outcomes.

Dr. Sarah Thompson, a leading ophthalmologist, expressed her enthusiasm about the implications of this breakthrough technology, stating, "The AI tool's ability to detect minute irregularities in eye images is truly remarkable. It opens up new avenues for early intervention and tailored treatment plans for patients."

The significance of this AI tool is further underscored by its potential to assist in the early diagnosis of Parkinson's disease. Utilizing a foundational AI model, as reported by Parkinson's News Today, the tool analyzes eye images to detect subtle indicators of Parkinson's. This development could be a game-changer in the realm of neurology, where early diagnosis is often challenging, yet crucial for better patient outcomes.

Dr. Michael Rodriguez, a neurologist specializing in movement disorders, expressed his optimism, stating, "The integration of AI in Parkinson's diagnosis is a monumental step forward. Detecting the disease in its early stages allows for more effective management strategies and could potentially alter the course of the disease for many patients."

The potential impact of this AI-driven diagnostic tool extends beyond the realm of individual patient care. As reported by Healthcare IT News, its widespread implementation could lead to more efficient healthcare systems, reducing the burden on both clinicians and patients. By streamlining the diagnostic process, healthcare providers can allocate resources more effectively and prioritize early intervention.

An important turning point in the history of medical diagnostics has been reached with the introduction of this revolutionary AI technology. Its unmatched precision in identifying eye disorders and promise to improve Parkinson's disease early detection have significant effects on patient care and healthcare systems around the world. This technology has the potential to revolutionize medical diagnosis and treatment as it develops further.

Learn How to Use the New Bing AI Image Generator in the Edge Browser


On April 7, Microsoft made its Image Creator tool, powered by OpenAI's DALL-E 2 AI image generator, available to all Edge browser users on desktops worldwide, enabling them to create their own AI-generated images with ease. 

The Image Creator tool was previously integrated into Microsoft's Bing chatbot, which is also powered by OpenAI's ChatGPT. Microsoft's latest move allows a larger audience to access the Image Creator tool, and it's a notable achievement for the company to have beaten out Google Chrome in offering users the ability to create custom AI art directly in their web browser. 

Here's a step-by-step guide on how to access and use Microsoft's Image Creator tool in Edge: 

1. First, make sure you have a Microsoft account. If not, create one. 

2. Open the Edge browser on your desktop and click the plus icon to open the Edge sidebar. 

3. Toggle the option for Image Creator to enable it in the sidebar. 

4. Look for the Image Creator icon in the top right corner of the sidebar (it looks like a paintbrush). 

5. Click on the Image Creator icon to open a text box for entering your prompt. 

6. Enter a description of what you want to see in the text box. 

7. Now Press Enter and OpenAI's DALL-E deep learning model will generate up to four images that match your prompt. The process will take around 30 seconds to a few minutes. 

8. Also, to speed up the process significantly, you can use "boosts" earned through Microsoft Rewards, a digital currency earned through doing things in Microsoft Edge. 

9. Users trying out Image Creator for the first time will receive an initial allocation of 25 free boosts. Redeeming boosts can reduce the wait time to a few seconds. 

10. Once the AI finishes generating the images, hit "Save" to add the image to your Microsoft account's Saved Images folder, or download the ones you like to your device to use as you wish. 

11. If you are not satisfied with the image, you can edit it and notify it. Also, if you describe what you want in more detail, the AI can better understand what you're looking for and create more accurate images. 

Following the news Microsoft said in its companies blog that "this feature will help you create images that don’t yet exist, powered by the very latest DALL-E models from our partners at OpenAI, right from the Microsoft Edge sidebar. If you’ve ever found yourself in need of a very specific visual for a social post or even a PowerPoint, Image Creator can help you find exactly what you need."