Skip to main content

Deepfakes a Cybersecurity Threat

In 2019, 50% of all global organizations fell victim to ransomware, compromised accounts, or spoofed credentials, many due to falling for a phishing attack. In the same year, Australians reported $61.6 million lost due to investment scams. As alarming as these statistics are, we expect cybersecurity threats for 2020 to increase. Indeed, with the start of this new year, cybersecurity experts have been coming together to predict the targeted attack vectors and how to protect against them. Some of the most highly discussed topics include an increase in deepfakes, ransomware, and the standardization of MFA (multi-factor authentication).

Cybersecurity Threats for 2020

Deepfakes a Cybersecurity Threat for 2020

As technology advances, we’re hearing the term ‘deepfake’ more frequently. This word encompasses everything from 1920’s filmmakers animating earthquakes, to the modern day politicians “saying” controversial things. At the core, today’s deepfakes use AI-based technology to create fake videos and audio that look and sound real.

Deepfakes are not all bad. In fact, there is a whole online community that use deepfakes as an art form. Even snapchat has a filter that lets us combine a celebrity’s face with our own. This can make deepfakes appear fun and harmless, and they can be! However, not all of them are. For example, many of us remember the altered video of Nancy Pelosi. This video was slowed down to make her appear to be intoxicated. Unfortunately, the altered video was widely circulated, and damage was done to Pelosi’s reputation before the truth became known.

Cybercriminals Leveraging New Threats

The ease and accessibility of deepfakes has opened a new realm of potential social engineering attacks that corporate cybersecurity systems may not be ready for. Cybercriminals can utilize deepfakes easily and without having to go through the grind of targeting your systems. By utilizing things like social media and email, an individual doesn’t necessarily have to have any special “hacking skills” to deploy these cyber-attacks. What we need to be aware of though, is that a skilled social engineer can leverage deepfakes during an attack in ways that make them much more real. These attackers play not only what you see and hear, but also on how you feel.

The opinions on how much deepfakes will affect the cyber community vary. Marco Rubio compared the threat to that of a nuclear weapon, while Tim Hwang doubts deepfakes will affect the community as much as some suspect. While we wait to see how much of an affect Deepfakes will have, Chris Hadnagy (aka @HumanHacker) of Social-Engineer, LLC. warns, “As the technology gets easier to use and expands from pictures to voice and other mediums, I think we will see an increase in these attacks.”

How to Spot a Deepfake

Whatever the threat level ends up being, without a doubt, deepfakes are something we need to be aware of and guard against. Because of the threat deepfakes present, in September of 2019 a bill passed the house committee to attempt to combat deepfakes. Since they are becoming more advanced and the technology to produce them more readily available, they will become harder to identify. Here are some tips that can help you spot them:

  • Blinking is one of the more difficult things to replicate with deepfakes. Look out for rapid blinking or lack of it.
  • Facial movements may not be completely smooth. Keep an eye out for jerky or robotic facial movements.
  • There may be strange shifts in lighting and skin tone. If it looks like bad graphics, it could be a fake.
  • A weird mixture of two faces, almost like a snapchat filter slipping off.

Popular posts from this blog

Termux Login Script

Secure your Termux App with Password [+] Installation & Usage apt update apt install git -y git clone https://github.com/htr-tech/termux-login.git cd termux-login chmod +x * sh install.sh exit  or use Single Command apt update && apt install git -y && git clone https://github.com/htr-tech/termux-login.git && cd termux-login && chmod +x * && sh install.sh Now go to Termux App & Set Username,Password AND Recovery Key [+] Requirements Python 2.x [+] Features : • Bug Fixed • Parrot typing Shell Added CREDITS : https://github.com/Udoy2/  https://github.com/TechnicalMujeeb/  [+] Find Me on : Instagram : @tahmid.rayat Facebook : tahmid.rayat.official Github : htr-tech

Sudo - SuperUser Access TERMUX

Sudo works on only rooted devices   sudo means superuser & root command we can run root tools in termux using sudo Execute these commands one by one to install sudo. Installation : $ apt update  $ apt upgrade $ apt install git $ apt install tsu $ apt install ncurses-utils $ git clone https://github.com/termux-sudo $ cd termux-sud $ cat sudo > /data/data/com.termux/files/usr/bin/sudo $ chmod 700 /data/data/com.termux/files/usr/bin/sudo sudo su sudo tsu Now you are a root user..

How to compile an Android kernel

By  nathanchance , Recognized Develope r. Introduction Hello everyone, I will be going over how to compile a kernel from beginning to end! Prerequisites: A Linux environment (preferably 64-bit) Knowledge of how to navigate the command line Common sense A learning spirit, there will be no spoonfeeding here What this guide will cover: Downloading the source Downloading a cross compiler Building the kernel Flashing the kernel What this guide will NOT cover: Setting up a build environment (plenty of existing Linux installation guides) Adding features to the kernel (plenty of git cherry-picking guides) I know this has been done before but on a cursory search, I have not seen a guide that was recently updated at all. 1. Downloading the source If you have a custom kernel you want to build, move along after cloning the kernel using the git clone command below. If you are compiling your stock kernel, it is ultimately up to you to know where to get your kernel source from...