This week:

3 – Deep fakes could lead to deep trouble

2 – “Privacy By Design” is a pipe dream

1 – The next phishing email you receive could be from a friend or colleague


 

3 – Deep fakes could lead to deep trouble

“Security researchers have issued a warning for anyone searching online for a deepfake naked image generator.”

Summary: A notorious cybercrime gang is using an AI image generator that creates nude images to trick users into downloading malicious software. The gang is combining advanced AI tools with traditional phishing techniques, and as soon as the victim downloads the malicious software, it attempts to steal sensitive data (e.g. passwords) and compromise the victim’s device.

So what? If one of your staff members uses a device that they also use for their work to search online for deep fakes , they may get you all into deep trouble.

Source: Forbes (via Secure The Village)


 

2 – ‘Privacy By Design’ is just a pipe dream

“This bill would require a vehicle manufacturer to terminate a person’s access to remote vehicle technology [..] upon a completed request from a driver.”

Summary: A new law has come into force in California requiring car manufacturers to allow drivers to terminate remote access to their vehicle. It forms part of improvements in the protection granted to domestic abuse victims. to prevent abusers from tracking victims or manipulating controls of the vehicle.

So what? ‘Privacy By Design’ means creators build privacy into the design of their products and services. It’s clearly just a pipe dream when we need a law before car manufacturers will provide drivers with a mechanism to block remote access to their vehicle. Are the profits generated by all of this surveillance capitalism really so large that the privacy of the drivers isn’t given a second thought?

Source: Website of the State of California and LedgyScan (via Risky Business)


 

1 – The next phishing email you receive could be from a friend or colleague

“In the period from April to June 2024, 44% of attacks were sent from internally compromised accounts, with 8% originating from an account within the organization’s supply chain.”

Summary: Cyber criminals are using many techniques to get around our cyber security defences. A growing trend is for them to hack into an account of a friend or colleague, so you are more likely to trust any emails they send to you from this hacked account.

So what? Ensuring your friends and colleagues secure their email accounts with strong (i.e. long and unique) passwords and other layer of protections (e.g. a security codes generated on an app on their phones) doesn’t just improve their security. It improves yours too.

Source: Infosecurity Magazine (via Secure The Village)