This is the type of cyber threat that the US is likely unprepared for, misinformation paralysing the electorate and massive amounts of fake accounts targeting its citizens, or even its institutions. READ MORE: US treasury has 'close' eye on UK economy with Kwarteng in Washington ![]() And the grandson replies, and all of a sudden, they have that information, they can use that to hack into something else." And they use a deep fake video of grandma asking a question of the grandson. "They're actually having a communication thinking, 'hey, maybe it's grandma'. And it's asking the grandson 'what's your password to this? Or what's what's your mom's maiden name', and they're actually interacting via message. Mr Egan said: ", you have grandma's fake Facebook account, which is really some AI computer in Russia or China. Real people or even artificial intelligence could steal photos and information off the web to create an account which looks like a target's friend or relative. It could be fake accounts posting misinformation on polarising issues to help divide the American people or it could even target citizens through deep fake videos and so called "spoof" accounts. This misinformation can take many shapes. And I think that they also go hand in hand." "And so, as it relates to social media and misinformation, there really is not much of anything that government is currently doing to deal with that. Mr Egan added: "The other side of it is that there's these other new frontiers that they really haven't even began to really push regulation or have solutions for. While the US is on alert for these traditional attacks, there are concerns about misinformation on social media - something which isn't well regulated. However, Mr Egan noted that the US Government was "dedicating massive resources in those areas already". Custom voice lines and expressions.The threat can come in the form of traditional cyber attacks, for example the direct denial of service attacks which brought down major websites, or even ransomware sieges which have been used to target US critical infrastructure - for example the attack of the strategic Colonial pipeline. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |