ReportWire

Tag: Internet Security

  • Deepfakes are Lurking in 2024 — Here's How to Unmask Them | Entrepreneur

    Deepfakes are Lurking in 2024 — Here's How to Unmask Them | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    As artificial intelligence (AI) takes the world by storm, one particular facet of this technology has left people in both awe and apprehension. Deepfakes, which are synthetic media created using artificial intelligence, have come a long way since their inception. According to a survey by iProov, 43% of global respondents admit that they would not be able to tell the difference between a real video and a deepfake.

    As we navigate the threat landscape in 2024, it becomes increasingly vital to understand the implications of this technology and the measures to counter its potential misuse.

    Related: Deepfakes Are on the Rise — Will They Change How Businesses Verify Their Users?

    The evolution of deepfake technology

    The trajectory of deepfake technology has been nothing short of a technological marvel. Deepfakes were characterized by relatively crude manipulations in their infancy, often discernible due to subtle imperfections. These early iterations, though intriguing, lacked the finesse that would later become synonymous with the term “deepfake.”

    As we navigate the technological landscape of 2024, the progression of deepfake sophistication is evident. This evolution is intricately tied to the rapid advancements in machine learning. The algorithms powering deepfakes have become more adept at analyzing and replicating intricate human expressions, nuances, and mannerisms. The result is a generation of synthetic media that, at first glance, can be indistinguishable from authentic content.

    Related: ‘Biggest Risk of Artificial Intelligence’: Microsoft’s President Says Deepfakes Are AI’s Biggest Problem

    The threat of deepfakes

    This heightened realism in deepfake videos is causing a ripple of concern throughout society. The ability to create hyper-realistic videos that convincingly depict individuals saying or doing things they never did has raised ethical, social, and political questions. The potential for these synthetic videos to deceive, manipulate, and mislead is a cause for genuine apprehension.

    Earlier this year, Google CEO Sundar Pichai warned people about the dangers of AI content, saying, “It will be possible with AI to create, you know, a video easily. Where it could be Scott saying something or me saying something, and we never said that. And it could look accurate. But you know, on a societal scale, you know, it can cause a lot of harm.”

    As we delve deeper into 2024, the realism achieved by deepfake videos is pushing the boundaries of what was once thought possible. Faces can be seamlessly superimposed onto different bodies, and voices can be cloned with uncanny accuracy. This not only challenges our ability to discern fact from fiction but also poses a threat to the very foundations of trust in the information we consume. A report by Sensity shows that the number of deepfakes created has been doubling every six months.

    The impact of hyper-realistic, deepfake videos extends beyond entertainment and can potentially disrupt various facets of society. From impersonating public figures to fabricating evidence, the consequences of this technology can be far-reaching. The notion of “seeing is believing” becomes increasingly tenuous, prompting a critical examination of our reliance on visual and auditory cues as markers of truth.

    In this era of heightened digital manipulation, it becomes imperative for individuals, institutions, and technology developers to stay ahead of the curve. As we grapple with these advancements’ ethical implications and societal consequences, the need for robust countermeasures, ethical guidelines, and a vigilant public becomes more apparent than ever.

    Related: Deepfakes Are on the Rise — Will They Change How Businesses Verify Their Users?

    Countermeasures and prevention strategies

    Governments and industries globally are not mere spectators in the face of the deepfake menace; they have stepped onto the battlefield with a recognition of the urgency that the situation demands. According to reports, the Pentagon, through the Defense Advanced Research Projects Agency (DARPA), is working with several of the country’s biggest research institutions to get ahead of deepfakes. Initiatives aimed at curbing the malicious use of deepfake technology are currently in progress, and they span a spectrum of strategies.

    One front in this battle involves the development of anti-deepfake tools and technologies. Recognizing the potential havoc that hyper-realistic synthetic media can wreak, researchers and engineers are tirelessly working on innovative solutions. These tools often leverage advanced machine learning algorithms themselves, seeking to outsmart and identify deepfakes in the ever-evolving landscape of synthetic media. A great example of this is Microsoft offering US politicians and campaign groups an anti-deepfake tool ahead of the 2024 elections. This tool will allow them to authenticate their photos and videos with watermarks.

    Apart from that, industry leaders are also investing significant resources in research and development. The goal is not only to create more robust detection tools but also to explore technologies that can prevent the creation of convincing deepfakes in the first place. Recently, TikTok has banned any deepfakes of nonpublic figures on the app.

    However, it’s essential to recognize that the battle against deepfakes isn’t solely technological. As technology evolves, so do the strategies employed by those with malicious intent. Therefore, to complement the development of sophisticated tools, there is a need for public education and awareness programs.

    Public understanding of the existence and potential dangers of deepfakes is a powerful weapon in this fight. Education empowers individuals to critically evaluate the information they encounter, fostering a society less susceptible to manipulation. Awareness campaigns can highlight the risks associated with deepfakes, encouraging responsible sharing and consumption of media. Such initiatives not only equip individuals with the knowledge to identify potential deepfakes but also create a collective ethos that values media literacy.

    Related: ‘We Were Sucked In’: How to Protect Yourself from Deepfake Phone Scams.

    Navigating the deepfake threat landscape in 2024

    As we stand at the crossroads of technological innovation and potential threats, unmasking deepfakes requires a concerted effort. It necessitates the development of advanced detection technologies and a commitment to education and awareness. In the ever-evolving landscape of synthetic media, staying vigilant and proactive is our best defense against the growing threat of deepfakes in 2024 and beyond.

    [ad_2]

    Asim Rais Siddiqui

    Source link

  • Why the Online Dating Experience Needs to Change | Entrepreneur

    Why the Online Dating Experience Needs to Change | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    In today’s world, online dating has become the norm for many singles looking for love. However, despite the growing popularity of dating apps, many problems still plague the industry. From ghosting to toxic behavior, online dating can be a frustrating and exhausting experience for many users. In this article, we explore why we need a new online dating experience and how it can revolutionize how we connect with others.

    Turn dating apps from a chore into a thrill

    A study by Singles found that 78.37% of adults have experienced online dating burnout. We got used to spending more time since the pandemic’s beginning, but it takes its toll on everyone’s mental health and overall online dating excitement. Instead of mindlessly swiping through profiles, dating apps might incorporate gamification elements that can increase user engagement and help foster more authentic connections. By adding games or challenges, users can interact with each other in a playful and non-intimidating way, helping to break the ice and create a more relaxed atmosphere.

    Additionally, interesting prompts can help spark conversation and allow users to showcase their personality and interests beyond just a few photos and a bio. These elements can ultimately lead to more meaningful connections and a more positive overall dating experience.

    Related: 7 Ways Dating Apps Are Lying To You

    Silent treatment, leaving (dating apps) users disconnected and frustrated

    Dealing with sudden silence or breadcrumbing is a common frustration for dating app users, with 43% of dating app users in the United States reporting having been ghosted at least once. Breadcrumbing is also prevalent, with 22% of respondents reporting that they have experienced it.

    To address these issues, dating apps have introduced new features. For example, some apps use machine learning algorithms to detect potentially offensive or inappropriate messages, while others offer read receipts to let users know when their messages have been read. By implementing such features, dating apps are helping to reduce the negative experiences that users often encounter on their platforms.

    Get it right, or avoid being matched with a wrong type

    Matching with the wrong type of person is a common problem on dating apps. Often, the issue lies in how users portray themselves on their profiles. A survey conducted at the end of 2022 found that nearly 47% of respondents had lied on their dating profiles. The solution to this problem is for dating apps to encourage users to be more authentic and showcase their true lifestyle. For example, some dating apps have a feature that allows users to upload videos to their profiles, giving potential matches a better sense of who they are.

    Related: Online Dating Scammer Steals $1.8 Million from His Victims

    Toxic behavior is lurking around every corner

    Many online dating users are experiencing harassment or verbal abuse. According to a survey by Pew Research Center, 41% of women have experienced online harassment. Dating apps need to come up with solutions to stop it. This can include introducing reporting features, moderating user-generated content and collaborating with organizations that promote online safety.

    Shield yourself from fraud and outsmart scammers

    Scammers are a growing problem on dating apps, with many users falling victim to fraud. As reported by the Federal Trade Commission, romance scams resulted in $1.3 billion in losses in 2022 — median $4400. The solution to this problem is for dating apps to introduce better verification processes. This can include verifying users’ identities through social media or requiring users to take a selfie to prove they are who they say they are. For example, a combination of a phone number-only registration with a photo verification can narrow fake profiles to the minimum.

    Related: Your Identity Could Be Used in Online Dating Scams. Here’s How to Protect Yourself

    Is online dating on the verge of failing or blossoming?

    In conclusion, the world of online dating is constantly evolving, but many of the problems that plague existing dating apps persist. These issues can lead to frustration, disappointment, and even harm. We need a new online dating experience that prioritizes fun, authenticity, safety, and connection. Whether through gamification, better communication formats or more authentic user profiles, there are ways to create a better online dating experience for all. By recognizing and addressing the common problems of dating apps, we can create an environment that fosters healthy relationships and real connections. The time has come for a change in the online dating landscape, and we’re excited to be a part of it.

    [ad_2]

    Marina Anderson

    Source link

  • The $8 Trillion Risk: Why Investing in Cybersecurity Will Save You Future Pain and Risk | Entrepreneur

    The $8 Trillion Risk: Why Investing in Cybersecurity Will Save You Future Pain and Risk | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Today’s cyber threat landscape is elaborate, fast-paced and continuously evolving. The complexity of such threats has raised the predictions that the total cost of cybercrime will exceed $8 trillion by the end of 2023. It includes, for example, the money stolen by cybercriminals, the subsequent investments in security tools and services, and the money spent on ancillary activities such as staffing, remediation, legal fees, fines and more.

    So, why do many organizations still fail to see cyber hygiene or even cybersecurity as a boardroom priority, even in 2023? Many business leaders, especially small to medium-business leaders, fail to perceive themselves as targets. From their perspective, spending more on cybersecurity is a wasted effort, and those resources can be used elsewhere.

    On average, companies worldwide only allocate around 12% of their IT budget to IT security! Thus, persuading the boardroom to invest in cyber hygiene can be challenging. However, while it is hard to implement and even harder to maintain, these habits, security practices and solutions help make the world safer. And that is where every organization needs to start.

    Related: Why Is Cybersecurity Important for Your Business? Neglecting It Could Be Your Downfall.

    Reviewing the numbers

    Looking back at just a year, cyberattacks worldwide have shown a 38% increase in 2022 compared to 2021. The attack on the Australian health insurance provider Medibank, the data breach on the Los Angeles Unified School District (LAUSD) or even the social engineering hack on games company Rockstar are just a few of the thousands of data breaches happening all over the world.

    Interestingly, these breaches, like most, could have been prevented with good cyber hygiene. Furthermore, the examples I chose demonstrate that attackers seem unconcerned with a company’s size, location or industry. Yet, even with cyber threats like data breaches, phishing scams and ransomware, cybersecurity investments fall short.

    Over the last few years, we’ve made great strides in security, especially following the global pandemic. Still, a study conducted by Foundry shows that 9 out of 10 security experts still believe their organizations are not prepared to address the risks of a cyber-attack.

    Related: 5 Ways to Protect Your Company From Cybercrime

    Investing in cyber hygiene: a checklist

    So, what can we do? Establishing a strong and resilient cybersecurity architecture demands deploying security measures on multiple fronts such as data, devices, employees and network. Any elementary security architecture must include solutions to enforce strong password policies, protect data in transit and at rest, identify and protect against attacks and regularly back-up mission-critical data. This seems excessive, especially considering how limited the budget is. Yet, acquiring as many tools as possible within your financial limits shouldn’t be your final objective. The most effective strategy results from selecting the appropriate collection of tools after carefully assessing one’s demands and the current level of security precautions. The solutions I’d suggest include the following:

    • Identity and access management (IAM) solutions to ensure the right user is linked to the right resources
    • Unified endpoint management (UEM) solutions for securing endpoints and managing, patching and updating operating systems and applications
    • Extended detection and response (XDR) or Endpoint detection and response (EDR) solutions to detect and mitigate new and existing vulnerabilities
    • Remote browser isolation (RBI) for a safer browsing experience
    • Firewall as a service (FWaaS) to protect the perimeter less network border
    • Additionally, a combined implementation of Zero Trust Network Access (ZTNA) or Software Defined–WAN (SD-WAN) can provide faster connections, improve latency and secure your remote workers.

    Also, it would be wise to select solutions that already have established interconnections among them. This would offer more centralized and seamless access, thereby reducing the workload on your IT administrators and saving you from recruiting larger teams.

    Alternatively, some vendors offer multiple tools in a combined package. For example, Cisco Umbrella offers RBI, SD-WAN, and much more, Hexnode provides IAM and UEM capabilities, and Okta gives you both ZTNA and IAM. Make sure to carefully examine such vendors and the integrations between them before finalizing your architecture. In my experience, customers have always preferred a consolidated approach because, economically or due to staffing, they can’t handle the complexity of multiple solutions.

    Related: The Correlation Between Covid-19 and Cybercrime

    Roadblocks along the way

    We are all aware that the financial facet of any venture will inevitably be difficult. Assuming that the aspects mentioned above identify with your company’s objectives, the following query would most likely be regarding the return on investment. It might be challenging to locate the facts and data needed to identify the advantages of cybersecurity hygiene. I would suggest reviewing the financial implications of previous data breaches and comparing those numbers against the investment cost. You will discover that the latter dwarfs the former sum.

    Another hurdle is the monotony associated with good security hygiene. A robust security architecture requires periodic observation, maintenance and upgrades. This is often a bit boring, especially for non-tech-savvy investors, entrepreneurs and leaders. Additionally, the repetitious nature might cause inaccuracy and personnel exhaustion. The only solution is to clearly communicate the necessities of cyber hygiene and make them understand that security is an ongoing process rather than a one-time stop. Also, using tools to automate tasks and setting reminders can help employees stay on track without it being a bother.

    The recession bound to happen this year will surely put an even tighter hold on the already stretched budget. However, being the victim of a cyberassault during such trying times would be a far scarier reality. As business leaders, we must pay close attention to the hazards and repercussions of a cyberassault in our organization. Thankfully, many businesses are unwilling to face the risks associated with losing client data and having production or operations halted due to a system breach. If they do, it is either out of ignorance or a lack of a thorough understanding of the entire process.

    [ad_2]

    Apu Pavithran

    Source link

  • How to Protect Your Business Through Secure Digital Experiences | Entrepreneur

    How to Protect Your Business Through Secure Digital Experiences | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Passwords were once seen as a credible way to improve security, but with the advancing threat landscape and the increase of bad actors using easy-to-crack passwords as an entry point for far-reaching crimes, passwords have outlived their usefulness in providing the necessary level of security. From social engineering to phishing and brute-force attacks, passwords can be one piece of the security puzzle, but a multi-layered approach is now best for ultimate cyber resilience.

    A major inhibitor to password effectiveness is the inconvenience, which promotes the reuse of the same weak password across multiple accounts. A recent survey of consumers worldwide found that 61% will choose a competitor offering an easier login experience, and 59% admitted they abandoned an online experience because the login experience was too frustrating.

    In a convenience-wins world, one way to earn customer loyalty is to provide a passwordless experience where individuals aren’t burdened by the headaches of changing, managing and constantly inputting passwords while still feeling confident that their data is secure.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    Understanding passwordless

    Passwordless authentication can be delivered using multiple digital experiences, each with its own advantages, which can serve different types of users. For example:

    • Biometrics: physical characteristics captured by your device, like fingerprints or facial recognition, to verify a user’s identity.
    • Security keys: physical devices that generate one-time codes used for authentication.
    • Email magic link: sends a secure login link to your email address for seamless access.
    • QR codes: highly secure authentication that doesn’t require entering a username or password.

    The highly personal and multi-step nature of these authentication methods makes them more secure and more difficult to compromise. They’re also easier and more convenient and eliminate the need to remember multiple passwords or be tempted to reuse the same one across multiple accounts. Many of these methods can be implemented to support high-security requirements by using phishing-resistant standards (including FIDO and WebAuthN).

    Related: Passwords Are Now a Weakness — Here’s Why It’s Time to Eliminate Them.

    Tailoring authentication needs to the industry

    Retail, finance and insurance industries all have different requirements for authentication, and experiences need to be tailored to fit a range of security and consumer needs. The key is always ensuring that the online identity represents the real human it claims. This diligence is necessary for protecting against fraudulent activity and ensuring the security of sensitive information.

    Retail websites often require less complex methods, such as an email magic link. In contrast, insurance and financial websites may require more rigorous methods, such as document verification from a driver’s license or passport and biometric authentication to comply with regulatory requirements.

    Using machine learning in passwordless authentication

    One benefit of passwordless is that it can be simplified by using artificial intelligence to analyze user behavior, identify patterns, and assess risk. Using machine learning algorithms to analyze user activity and log typical (or flag atypical) behavior patterns is a good example. These patterns – such as how a user types on a keyboard, the websites they prefer to visit, or what time of day they log in – could then be used to authenticate the user without the need for a password.

    This intelligence also identifies potential threats and vulnerabilities by monitoring user activity and analyzing data. Organizations can identify patterns that may indicate a security threat or vulnerability and take action to mitigate the risk. Implementing the correct tools here can help prevent Bot and Account Take Over (ATO) attacks.

    Related: Why Physical Security For Your Business Is Just as Critical as Online Security

    Steps to creating a passwordless experience

    If you see the benefits of creating a passwordless experience for employees and customers, here is how you get there:

    1. Design a strategy that maps your customer journeys for their first visit and return visits, including which types of devices, computers, and browsers they will likely be using and how often they will be on the site. Ensure that your passwordless authentication methods are compatible with your customers’ devices and platforms.
    2. Assess the amount of identity assurance needed against the friction customers are willing to endure. Regardless of the type of website, choosing the right method is crucial. Organizations must select an authentication method that aligns with their customers’ needs and their platform’s requirements. For instance, facial recognition is a convenient option for mobile devices, while security keys are more suitable for desktop environments.
    3. Give a passwordless option, even if some customers keep passwords because they’re more comfortable with them. This allows a company to cater to a broader range of user preferences and needs. Include education on passwordless such as how it works and how to use it. Many users are accustomed to using passwords and may be hesitant to try a new authentication method. Providing clear and concise information on passwordless authentication and its security advantages can help steer customers toward this option.
    4. Use intelligence to reduce friction for a seamless user experience. Authentication should be simple and intuitive for users without requiring additional steps or creating unnecessary friction. Placing risk and context awareness toolsets in your authentication flow ensures friction is low and security remains strong.
    5. Extensively test with people who represent your user population. The people at your company are likely not the targets of your service, so be sure to test the right individuals to ensure its efficacy, compatibility and ease of use. Testing should be done with different devices, browsers, and operating systems.

    Achieving a passwordless future

    The security of a website isn’t solely dependent on the presence or absence of passwords. Other security methods, including encryption, access controls, and security protocols, also play a valuable role in website security. Still, passwordless authentication and verification are important aspects of a comprehensive security strategy.

    With the increasing security risks associated with passwords, the shift toward a passwordless future can provide significant benefits for both businesses and customers. With the right approach, passwordless authentication can become the norm for all customers as they access online accounts and services, making seamless and secure digital experiences commonplace.

    [ad_2]

    Jason Oeltjen

    Source link

  • 3 Enterprise Security Trends to Watch Out For in 2023

    3 Enterprise Security Trends to Watch Out For in 2023

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    As our planet completes yet another lap around the sun, we find ourselves looking ahead to the new challenges and opportunities of 2023. It is always exciting to peer into the unknown and predict what this new solar orbit brings.

    But if the recent years have taught us anything, it’s that such a task is, in fact, a difficult endeavor. I’m sure that none of the predictions we made at the start of 2020 could’ve prepared us for what was coming in the years that followed. So, this ritual of soothsaying we practice every year is not about focusing on the finer details, but instead, it seeks to provide an insight into the general direction the world seems to be cruising towards.

    Gartner used the phrase “seize uncertainty” as the theme for their strategic roadmap report for the coming years. It is truly an apt phrase to define 2023. The ripples caused by the boiling geopolitical tensions caused by the Russia-Ukraine issue, the brewing cybersecurity concerns and the global recession looming over the horizon point toward the uncertainties that await us.

    Because of this, enterprise security has risen to be one of the top priorities for businesses in the coming year, so here’s a take on the upcoming trends of 2023 that companies need to watch out for.

    Related: 5 Fundamental Best Practices for Enterprise Security

    1. Adaptable protection and enhanced visibility for endpoints

    Endpoints continue to be a top target for sophisticated hackers. Adversaries are now leveraging endpoints as a launching pad to conduct more lucrative assaults, such as ransomware and business email compromise, rather than simply taking sensitive data from them. Furthermore, businesses must deal with a growing number of devices, including employee-owned devices outside of corporate networks and IoT devices like virtual personal assistants that need access to company networks, services or databases. Consequently, endpoint protection platforms and endpoint management suits remain a high priority.

    The cybersecurity landscape is fluid and constantly changing. The last few years have shown a significant rise in industry-specific attacks focused on healthcare, supply chains, education, etc. This trend will likely proceed to the following year, and the industries on the weaker end of digital transformation are easy targets for cyber-attacks. In such a paradigm, solutions to detect such threats, platforms to secure and manage corporate devices and other SaaS offerings can provide visibility, protection and a streamlined management platform to take care of the myriad of endpoints being deployed.

    Related: Web3, Crypto, Cybersecurity, Rural Fintech: Trends To Look Out For In 2023

    2. Integrations, collaborations and partnerships

    The onset of the cloud and the subsequent migration towards it enabled organizations to set fluid boundaries to give customers a more inclusive solution. Every SaaS vendor is moving towards this approach to combine the strengths of multiple tools and provide a unified console for seamless management.

    An example of such a collaboration is the prominence and proliferation of SASE (Secure Access Service Edge). Introduced by Gartner in 2019, SASE is a cybersecurity concept that converges multiple network connectivity and network security solutions into a unified service delivered via the cloud. Global spending on SASE is predicted to grow $8 billion by 2023 – a clear indication of its importance and value.

    2023 will also see security and management solutions integrating Artificial Intelligence into their existing toolset. Over the past years, AI has been a significant enabler of automation in security systems. For example, intelligent threat detection systems like endpoint detection and response solutions use AI and ML to detect and respond to zero-day vulnerabilities that can harm your business. The coming year will find many solutions integrating AI technology to strengthen their security posture further.

    3. Fostering a culture of security awareness

    Developing and creating a culture of awareness around cybersecurity risks is the most crucial action to take at any firm. Employers and the workforce can no longer consider cybersecurity to be a problem that the IT department should handle. In reality, everyone’s work description in 2023 should include understanding the dangers and taking simple security measures!

    Many IT security strategies follow a reactive rather than proactive approach, which involves pumping money to recover from the attack and rebuild brand reputation. Attackers take advantage of this and target the weak links to cause damage. Phishing attacks utilize “social engineering” techniques to deceive victims into disclosing sensitive data or downloading malware onto their computers.

    Related: How to Prioritize Online Security While Working From Home

    Anyone can learn to recognize these assaults and take simple safety measures to protect themselves without needing technological expertise. In the same way, fundamental security abilities like secure password usage and learning about two-factor authentication (2FA) ought to be taught to everyone and regularly updated. If an organization wants to ensure resilience and preparation over the next 12 months, taking simple safeguards like these to promote a culture of cybersecurity awareness should be a significant aspect of their security strategy.

    Moreover, with the global economy predicting a global recession, enterprises of all sizes can expect budget cuts throughout the year. In such a situation training your employees and ensuring they have a solid understanding of cybersecurity practices can provide a strong security posture that can act as the first line of defense, protecting your business.

    As we take our first steps into 2023, every enterprise and industry should prepare for the new year and the challenges it brings with it. While predictions and trends serve as guidelines that help us navigate the coming ordeals, the history of the digital world has shown us to always prepare for the worst and expect the unexpected.

    [ad_2]

    Apu Pavithran

    Source link