Deep Fake and Other Social Engineering Tactics

Your CEO Isn’t Real: How to Deal With Deep Fakes
The history of deep fake technology is surprisingly long. Researchers at academic institutions have been developing deep fake tech since the early 1990s. The idea is even older, as popular science fiction—like ...
Security Boulevard

Phishing Used to Get PII, not Just Ransomware
With all of the focus on ransomware attacks, it’s easy to forget about the damage done by email phishing. Yet, new research from Vade shows that phishing has seen a meteoric rise ...
Security Boulevard

Anti-Vax Lies Spread on YouTube—Paid for ‘by Russian PR Company’
Richi Jennings | | covid-19 vaccine, Influencer Marketing, lies damn lies and PR, Russia, SB Blogwatch, social engineering, YouTube
Disinformation is rife on social media. The latest scandal is a Russian PR firm paying YouTubers to flog lies about vaccines killing people ...
Security Boulevard

Deep Fakes: The Next Big Threat
A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deep fake video. All it takes ...
Security Boulevard

Spoofed Domains Still a Persistent Threat
Teri Robinson | | credential loss, domain, Financial Services Security, typo-squatting, website spoofing
Domains impersonating companies and their brand names still pose a significant threat—research from Digital Shadows released today found that on average 1,100 fake websites are registered against individual organizations annually. And with ...
Security Boulevard

Propaganda as a Social Engineering Tool
Sue Poremba | | Deep Fake, disinformation, fake news, Misinformation, Phishing, social engineering attacks
Remember WYSIWYG? What you see is what you get. That was a simpler time in technology; you knew what the end result would be during the development stage. There were no surprises ...
Security Boulevard

Reaction to Social Engineering Indicative of Cybersecurity Culture
During COVID-19, threat actors used fear of the virus and hope of a vaccine to trick unwitting victims into downloading malware or giving up their credentials. It was a master class in ...
Security Boulevard

How Offensive AI Can Disarm Cybersecurity
As more organizations adopt AI and ML as cybersecurity controls and to detect and deter attacks, cybercriminals are devising ways to use AI as the basis of attacks. “What’s known as ‘offensive ...
Security Boulevard

How Identity Intelligence Anchors Multi-Cloud Identity Management
Frank Ohlhorst | | Access control and Identity Management, account takeover attack, ACL, choosing an IAM solution, identity and access management, multi-cloud
The growing ferocity and increasing frequency of cyberattacks create huge problems for cybersecurity teams, especially when they lack the tools to measure and manage entitlements and identities. Obviously, more must be done ...
Security Boulevard

Using IAM Solutions to Beat Deepfakes and Fraud
AI and ML technologies have made great strides in helping organizations with cybersecurity, as well as with other tasks like chatbots that help with customer service. Cybercriminals have also made great strides ...
Security Boulevard