Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Deep Fake Scams On The Rise. Preparing Your Loved Ones

This was inspired by the following news article:

"Frightening new scam uses A.I. to convince loved ones are being held at gunpoint" 

CNY Central: Frightening New Scam Uses A.I.


“Deep Fakes” are a type of scam that use artificial intelligence (AI) and large language models (LLM) to create fake videos, images, or audio recordings that appear to be real. These scams can be used to manipulate people into believing something that isn’t true, such as a friend or loved one being held for ransom. Abhorrent thought i know. The technology behind “Deep Fakes” is constantly evolving and improving, which makes it increasingly difficult to distinguish between real and fake content. Scammers can use this technology to create convincing fake content that can be used to spread misinformation, steal personal information, or even extort money from unsuspecting victims.

It’s important to be aware of the risks associated with “Deep Fakes” and to take steps to protect yourself and your loved ones. Some ways to stay safe include being cautious about what you share online, verifying the authenticity of any content before sharing it, and using reputable sources for news and information. Additionally, if you or your loved ones plan to travel abroad or to areas that are known to have organized criminals operating, it might be a good idea to develop “safe words” or “safe phrases” in advance of the trip. These can be as simple as mentioning “hay fever” and should be low-key but stand out to whomever is receiving the message. They can be used to determine the authenticity of a call, video, or other communication.

I hope this helps you and the ones you love. 


John 

Anticipating the future by looking backwards.

Anticipating the future by looking backwards. 




As we look to the new year and the potential futures that will manifest in 2024 we should also take a moment to look for any threat actor trade craft differences or evolution that we’ve seen during 2023. Cybersecurity threats are constantly evolving and becoming more sophisticated and diverse. According to various reports, some of the noticeable differences in the threat actors’ behavior and techniques in 2023 are:


Increased use of artificial intelligence (AI) and deepfake technology: Threat actors are leveraging AI and deepfake technology to create more convincing phishing emails, impersonate legitimate users or entities, bypass biometric authentication, and generate fake audio or video content to manipulate or extort their targets. 


More targeted and customized attacks: Threat actors are conducting more research and reconnaissance on their potential victims, using social engineering, open-source intelligence, and data breaches to gather information and tailor their attacks accordingly. They are also choosing their targets based on their industry, size, location, or vulnerability. 


More collaboration and specialization among threat actors: Threat actors are forming alliances and partnerships with each other, sharing tools, techniques, and resources to increase their efficiency and effectiveness. They are also specializing in different aspects of the attack lifecycle, such as reconnaissance, exploitation, persistence, exfiltration, or ransomware delivery.


More innovation and adaptation to the changing environment: Threat actors are constantly developing new ways to evade detection and response, such as using encryption, obfuscation, polymorphism, or fileless malware. They are also adapting to the changing IT landscape, such as the shift to cloud, remote work, and IoT devices, and exploiting the new vulnerabilities and opportunities they present.


Threat actors in 2024 will absolutely continue evolving in diversity, complexity, and technological capabilities. The nature of their activities dictate that. Organizations can prepare for these events by following some best practices, such as:

Establishing a robust cybersecurity policy that outlines the measures, roles, and responsibilities for enhancing cybersecurity effectiveness. 

Securing the perimeter and lot connections with firewalls, encryption, VPNs, and other technologies to prevent unauthorized access and data breaches. 

Employing a people-centric security policy that educates and empowers employees to recognize and report cyber threats, and to follow security guidelines and protocols. 

Controlling access to sensitive data and resources with identity and access management (IAM) solutions, and implementing the principle of least privilege. 

Managing passwords wisely with strong and unique passwords, password managers, and multi-factor authentication (MFA). 

Staying informed and updated on the latest cyber threats, trends, and solutions by attending cybersecurity conferences and events. 

Implementing a proactive and resilient incident response plan that can quickly detect, contain, analyze, and remediate cyber incidents, and minimize the impact and damage.