Artwork

תוכן מסופק על ידי Cyber Crime Junkies. Host David Mauro.. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Cyber Crime Junkies. Host David Mauro. או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !

Deceptive Realities: Unmasking the Threat of Deep Fakes in Cybersecurity

1:14:57
 
שתפו
 

Manage episode 435679506 series 3370503
תוכן מסופק על ידי Cyber Crime Junkies. Host David Mauro.. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Cyber Crime Junkies. Host David Mauro. או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes.
Takeaways

  • Sample deepfakes are played. Can you tell? Over 85% of those tested could not.
  • Deepfake technology, created using techniques like GANs, diffusion models, and VAEs, can convincingly substitute one person's face or voice with another's.
  • The widespread availability and low cost of deepfake technology make it accessible to both legitimate businesses and threat actors, increasing the threat surface for organizations.
  • The potential for deepfakes to manipulate and deceive individuals, especially children, is a grave concern.

Chapters

  • 00:00 Introduction to Deepfake Technology and its Impact
  • 03:27 The Challenges of Detecting Deepfakes
  • 08:04 The Erosion of Trust: Seeing is No Longer Believing
  • 11:31 The Advancement of Deepfake Technology
  • 26:53 The Malicious Uses of Deepfake Technology
  • 36:17 The Risks of Deepfake Technology
  • 40:38 Limitations of Deepfake Detection
  • 47:02 Deepfakes in Different Languages
  • 56:09 The Role of Regulations
  • 01:09:34 The Catastrophic Potential of Deepfakes

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

פרקים

1. Introduction to Deepfake Technology and its Impact (00:00:00)

2. The Challenges of Detecting Deepfakes (00:06:15)

3. The Erosion of Trust: Seeing is No Longer Believing (00:06:58)

4. The Advancement of Deepfake Techno (00:12:47)

5. The Malicious Uses of Deepfake Technology (00:28:39)

6. The Risks of Deepfake Technology (00:38:58)

7. Limitations of Deepfake Detection (00:53:46)

8. The Role of Regulations (01:03:53)

222 פרקים

Artwork
iconשתפו
 
Manage episode 435679506 series 3370503
תוכן מסופק על ידי Cyber Crime Junkies. Host David Mauro.. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Cyber Crime Junkies. Host David Mauro. או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes.
Takeaways

  • Sample deepfakes are played. Can you tell? Over 85% of those tested could not.
  • Deepfake technology, created using techniques like GANs, diffusion models, and VAEs, can convincingly substitute one person's face or voice with another's.
  • The widespread availability and low cost of deepfake technology make it accessible to both legitimate businesses and threat actors, increasing the threat surface for organizations.
  • The potential for deepfakes to manipulate and deceive individuals, especially children, is a grave concern.

Chapters

  • 00:00 Introduction to Deepfake Technology and its Impact
  • 03:27 The Challenges of Detecting Deepfakes
  • 08:04 The Erosion of Trust: Seeing is No Longer Believing
  • 11:31 The Advancement of Deepfake Technology
  • 26:53 The Malicious Uses of Deepfake Technology
  • 36:17 The Risks of Deepfake Technology
  • 40:38 Limitations of Deepfake Detection
  • 47:02 Deepfakes in Different Languages
  • 56:09 The Role of Regulations
  • 01:09:34 The Catastrophic Potential of Deepfakes

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

פרקים

1. Introduction to Deepfake Technology and its Impact (00:00:00)

2. The Challenges of Detecting Deepfakes (00:06:15)

3. The Erosion of Trust: Seeing is No Longer Believing (00:06:58)

4. The Advancement of Deepfake Techno (00:12:47)

5. The Malicious Uses of Deepfake Technology (00:28:39)

6. The Risks of Deepfake Technology (00:38:58)

7. Limitations of Deepfake Detection (00:53:46)

8. The Role of Regulations (01:03:53)

222 פרקים

כל הפרקים

×
 
Loading …

ברוכים הבאים אל Player FM!

Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.

 

מדריך עזר מהיר