I really liked this article. I have covered various highly involved cyber attacks over the last few months, deepfakes, hacking cars, air–gap attacks but as it describes in this article, you can use technology to steal those credentials or you can just ask nicely for them: Phishing works so well …
The Deepfake threat
As computing power increases and the ability of cloud platforms and software to create realistic deepfake impersonations of people improves, so does the increased use of such techniques by threat actors – of course. Here are a couple of articles looking at the technology and the threat: Seeing is disbelieving: …
Because It’s Friday – how old are deepfakes?
There is plenty of news around about deep fakes – we have all seen the fake videos of various politicians and celebrities saying things they never would. But when was the first deep fake carried out: xkcd: Deepfakes Here is a deepfake from the past that made the news: Piltdown …
Continue reading “Because It’s Friday – how old are deepfakes?”
Deepfake attacks on online payment processes
This is an excellent article, on TechRepublic, that is looking at how AI and deepfakes are compromising online payment processes: Protecting payments in an era of deepfakes and advanced AI | TechRepublic