Friday, October 22, 2021

Three Trends in Cybersecurity to Watch

person using laptop

At Blue Cross Blue Shield, Wayne Nordstrom performs infrastructure and applications vulnerability scanning. He was previously the senior desktop engineer at Suffolk University in Boston. Wayne Nordstrom has an AS in cybersecurity from Cape Cod Community College and is currently studying for a BS in networks and cybersecurity at the University of Maryland.

As technology continues to evolve, so does the global cyberthreat landscape that businesses must navigate. Here are three areas worth watching in the years ahead.

Attacks on cloud services
Embracing cloud-based computing technology has many benefits, such as increased efficiency and reduced operational costs. If not adequately maintained or configured, cyber attackers can exploit the vulnerabilities and disrupt business.

Artificial (AI) intelligence integration
As the frequency and intensity of cyberattacks grow, AI can help under-resourced or overstretched security teams cope. By helping to analyze massive quantities of data, AI supplies teams with threat intelligence and boosts response times.

More automotive hacking
Modern vehicles are loaded with automated software that aids in engine timing, cruise control, airbags, door lock, and communication technologies. Self-driving autos use even more complex systems. All these are opening the door for more automotive hacking.



from WordPress https://ift.tt/3G8nk81
via IFTTT

Wednesday, October 6, 2021

How to Spot a Deepfake

A senior vulnerability risk manager at Blue Cross Blue Shield, Wayne Nordstrom researches cybersecurity trends and emerging technology. Among others, Wayne Nordstrom focuses on coming up with solutions to fight cyber fraud.

One of the latest methods by which scammers and hackers commit cyber fraud is using the technology deepfaking, which can digitally manipulate a person’s appearance and identity. The most famous deepfakes belong to popular personalities, morphing their faces to someone else’s as they make an impression. A more sinister use of the technology has also emerged, with scammers using the algorithmic technology to produce more subtle deepfakes to manipulate victims.

These deepfake scams can take a variety of forms, from blackmail to extortion schemes. However, researchers have found a few ways to spot a deepfake, even with the naked eye. The tell-tale sign, studies show, is the pupils of a deepfaked image. While other features can be approximated by the algorithm, even high-quality deepfakes have trouble maintaining a clear, round shape for a person’s pupils, leading to said pupils having a distorted or ragged edge.

There are some issues with this detection method, not least that some real people have irregular pupils due to genetic factors but also that all the research on the signs of deepfakes is in the public domain. Like the readily available deepfake technology, the manual on how to spot them is in the hands of those who would use it to manipulate others. This has led some researchers to worry that deepfake algorithms could be improved by referencing research on their weaknesses, thus requiring new detection techniques to be discovered.



from WordPress https://ift.tt/3mzezLs
via IFTTT