{"id":489,"date":"2021-02-17T13:29:11","date_gmt":"2021-02-17T13:29:11","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=489"},"modified":"2021-02-17T13:29:11","modified_gmt":"2021-02-17T13:29:11","slug":"deepfaking-it-the-new-cybersecurity-frontier","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/","title":{"rendered":"Deepfaking it: the new cybersecurity frontier"},"content":{"rendered":"<p>A few weeks ago, on a routine company video call, one of the tech groups decided to prank the boss and five of them turned up looking like\u00a0him.<\/p>\n<p>\u201cIt was very spooky. They used a publicity still of me and the person in the publicity still was blinking, moving his head, smiling, talking, saying things I don\u2019t say, but it was me,\u201d Andrew Bud, chief executive of biometric authentication provider iProov,\u00a0recalls.<\/p>\n<p>Over the past couple of years, deepfakes \u2013 manipulated videos or audio recordings that appear to show individuals doing or saying things they never did or said \u2013 have started to emerge. Most feature celebrities or political figures, with some created purely for amusement value and others vehicles for misinformation.<\/p>\n<h2 id=\"h-deepfake-threat-to-businesses\">Deepfake threat to businesses<\/h2>\n<p>However, new types of deepfake have now entered the frame with the aim of committing fraud. Indeed, the use of deepfake video and audio technologies could become a major cyberthreat to businesses within the next couple of years, cyber-risk analytics firm CyberCube warns in a recent <a href=\"https:\/\/insights.cybcube.com\/social-engineering-cybercube-report\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a>.<\/p>\n<p>\u201cImagine a scenario in which a video of Elon Musk giving insider trading tips goes viral, only it\u2019s not the real Elon Musk. Or a politician announces a new policy in a video clip, but once again it\u2019s not real,\u201d says Darren Thomson, head of cybersecurity strategy at CyberCube.<\/p>\n<p>\u201cWe\u2019ve already seen these deepfake videos used in political campaigns; it\u2019s only a matter of time before criminals apply the same technique to businesses and wealthy private individuals. It could be as simple as a faked voicemail from a senior manager instructing staff to make a fraudulent payment or move funds to an account set up by a\u00a0hacker.\u201d<\/p>\n<p>In fact, such attacks are already starting to occur. In one high-profile example in 2019, fraudsters used voice-generating artificial intelligence software to fake a call from the chief executive of a German firm to his opposite number at a UK subsidiary. Fooled, the UK chief executive duly authorised a payment of $243,000 to the\u00a0scammers.<\/p>\n<p>\u201cWhat we\u2019re seeing is these kinds of attacks being used more and more. They\u2019re not overly sophisticated, but the amount of money they\u2019re trying to swindle is quite high,\u201d says Bharat Mistry, technical director, UK and Ireland, at Trend\u00a0Micro.<\/p>\n<p>\u201cI was with a customer in the UK and he was telling me he\u2019d received a voicemail, and it was the chief information officer asking him to do something. Yet he knew the CIO of the organisation was on holiday and would never have phoned. There was no distinguishing factor, so you can see how clever it\u00a0is.\u201d<\/p>\n<p>Attacks such as this follow the same pattern as traditional business email compromise scams, but with vastly more sophistication.<\/p>\n<p>\u201cWe\u2019ve seen all these cloud technologies, things like analytics, machine-learning and artificial intelligence, and deepfakes are just an extension of that technology, using the tech in an abusive manner,\u201d says\u00a0Mistry.<\/p>\n<p>Source: Ranconteur<\/p>\n<p><a href=\"https:\/\/www.raconteur.net\/technology\/cybersecurity\/deepfaking-cybersecurity\/\">Read the Full Story Here<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few weeks ago, on a routine company video call, one of the tech groups decided to prank the boss and five of them turned up looking like\u00a0him. \u201cIt was very spooky. They used a publicity still of me and the person in the publicity still was blinking, moving his head, smiling, talking, saying things [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deepfaking it: the new cybersecurity frontier - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfaking it: the new cybersecurity frontier - Community\" \/>\n<meta property=\"og:description\" content=\"A few weeks ago, on a routine company video call, one of the tech groups decided to prank the boss and five of them turned up looking like\u00a0him. \u201cIt was very spooky. They used a publicity still of me and the person in the publicity still was blinking, moving his head, smiling, talking, saying things [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-17T13:29:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/\",\"name\":\"Deepfaking it: the new cybersecurity frontier - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg\",\"datePublished\":\"2021-02-17T13:29:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg\",\"width\":1280,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepfaking it: the new cybersecurity frontier\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfaking it: the new cybersecurity frontier - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/","og_locale":"en_US","og_type":"article","og_title":"Deepfaking it: the new cybersecurity frontier - Community","og_description":"A few weeks ago, on a routine company video call, one of the tech groups decided to prank the boss and five of them turned up looking like\u00a0him. \u201cIt was very spooky. They used a publicity still of me and the person in the publicity still was blinking, moving his head, smiling, talking, saying things [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-02-17T13:29:11+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/","name":"Deepfaking it: the new cybersecurity frontier - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg","datePublished":"2021-02-17T13:29:11+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-cottonbro-5103886.jpg","width":1280,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/deepfaking-it-the-new-cybersecurity-frontier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Deepfaking it: the new cybersecurity frontier"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=489"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/489\/revisions"}],"predecessor-version":[{"id":491,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/489\/revisions\/491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/490"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}