With the ever-changing cyber landscape, it’s important to be up to date with the new and emerging cyber threats. Especially the ones that go under the radar…
That’s why we thought we would do a quick roundup of some of the more alternative and new-age types of cyber threats that have affected some parts of the world.
Deepfake – Hearing is believing…
The rise of Deepfake over 2019 has been meteoric.
Initially being used for comedic purposes like Donald Trump videos…
Deepfake is a technique for human image synthesis based on Artificial Intelligence.
In short, it is an exercise that maps the natural movements of a human’s face and superimposes other humans to replace the original appearance.
In 2018 FakeApp was launched and made available worldwide. This gave users the ability to create their own Deepfake videos. This has resulted in celebrity videos, revenge porn, and multiple fake news instances.
However, the latest development is that Deepfake has developed audio capabilities. With recent reports revealing that employees have been deceived by hackers using this technology.
An article by Security Intelligence has discussed how Deepfakes audio technology could be a real threat to businesses and their cybersecurity.
The Sweet Sound of Typing
New security research this year has revealed that smartphone passwords could be hacked just from the sound of typing.
Apparently, the detection could be completed in a matter of seconds. With it claimed that it can be carried out in a loud and crowded area.
So how is it done?
Users who allow apps access to control a mobile’s microphone and Bluetooth are the main culprits. Incredibly, smartphones can pick up sound waves produced from a user typing on their computer keyboard.
The acoustic signals would then be analysed to decipher which keys are struck and in which order. To figure out the user’s password.
Research by Southern Methodist University in Texas revealed that they were able to work out correct passwords at a rate of 41%. A rate which they claim would improve when cross-referenced the most commonly used passwords.
What should you do? Evaluate which apps have access to your camera, microphone, and Bluetooth.
Having a Mobile is Infectious!
Mobile phones are often a prime target for hackers, as users’ devices can often hold a lot of information related to the business they work for.
However, one of the biggest issues is users not updating and keeping protection secure on business devices. The general perception among business owners is that cybersecurity only extends to the PC’s and laptops the organization uses, this is wrong.
Not updating operating systems on mobile phones leaves a big hole in your cybersecurity. With the rise of IoT devices, it now more important than ever to make sure devices are on the latest firmware available. This will ensure your security is up to date and protecting any personal or sensitive data the device might hold.
Without regular updates, any anti-malware protection installed on the devices could become redundant.