Category Archives: Security

Fake deepfake video by Mark Zuckerberg posted on Instagram embarrasses social network

Can Instagram try to delete a very credible fake Zuckerberg video that told me? Social networks make sure not.

“Imagine: One person has complete control over the data stolen by billions of people, all their secrets, their lives, their future. I owe it all to Spectre. The ghost told me that whoever controls the data can control the future. ”

This statement by Mark Zuckerberg was posted in an Instagram video. If it is true, it may be cold later, but this is only the result of clever use of artificial intelligence.

Art work

In fact, it’s artists Bill Posters and Daniel Howe, co-authored with advertising agency Canny. For example, the latest research by researchers at Princeton University and Stanford University in the United States shows that it uses “deepfake” technology, which can develop at high speed. The video hijacked a 2017 interview about Russia’s possible interference in the US presidential election.

The poster, Howe and Canny didn’t try it, as they had posted Deepfake videos of Donald Trump and Kim Kardashian.

What does Instagram do?

But in the case of Mark Zuckerberg’s video, the problem is twofold. The video not only led him to make false statements (unfortunately, ridiculous and unnoticed), but also posted on Instagram. The social network belongs to Facebook and is therefore also managed by Zuckerberg.

For Instagram, the temptation to delete videos without any warning can be great. However, an Instagram spokesperson told the motherboard: “We will treat this content the same way we treat all misinformation on Instagram.” If a third-party information verifier indicates that it is false, it will be in the Explorer recommendations section and Filter it in the related Tags page. ”

Instagram has learned that it would be unfair to apply Ace to content that has a close impact on its business compared to other false information circulating on its network. In terms of brand image, this will be disastrous.


They trick companies by simulating CEO voices with AI

Scammers mimic the CEO’s voice with deep-fake. Almost perfect scam.

A British energy company has been the victim of an unprecedented and complex variant of the “Presidential Scam.” Keep in mind that this scam involves impersonating the head of the company and prompting an emergency transfer to a mob-controlled bank account. In this case, the scammer relied on artificial intelligence systems to perform a nearly perfect simulation of the voice of the German parent company’s CEO, which was disclosed by the Wall Street Journal and relayed by Gizmodo. In the field of artificial intelligence, this simulation is also called “deep forgery”.

The victim was questioned by the insurance company Euler Hermes, who explained that the artificial voice mimicked not only his boss’s German accent, but his voice. Needless to say, the poor man nodded immediately and ordered the transfer of 220,000 euros to a bank account in Hungary within an hour. The giants were then transferred to Mexico and then to other unknown destinations. Euler Hermes said this was the first time he had encountered an artificial intelligence-based scam. May not be the last.

Millions of Android smartphones infected with adware hidden in hundreds of applications

More than 100 apps currently available on the Play Store are hiding adware already installed on millions of devices.

White Ops, a company specializing in cybersecurity, has published a study showing that 100 applications available on the Google Play store and downloaded by more than 4.6 million devices contain adware that broadcasts ads (Even if the app in question is closed).

Millions of infected smartphones

The new malware features silent advertisements on the user’s own device and pop-up advertisements on the user’s device. All affected applications share a code library called “Soraka” (from which the malware got its name) and a variant called “Sogo”.

Among the malicious applications discovered by White Ops is Best Fortune Explorer, an application released last September. Passed unhindered without being affected by antivirus scanning and already accounted for more than 170,000 downloads.

Adware overlooked in the Play Store

The mode of operation of Soraka is quite sophisticated. The code found in these infected apps indicates that a filtering system has been installed to determine if certain conditions have been met to display unwanted ads on the user’s device.

The advertisement page is not displayed immediately after installing the fake app. Soraka waits a bit before triggering to avoid detection by various antivirus scanning tools. When the user unlocks the screen, the ad still appears, but there are no open applications, which confuses the problem and prevents the user from identifying the underlying application. 1 2 3 4 5 6 7 8 9 11 b c d g h I k l m n o p q r s t r so x

In addition to a detailed description of how this adware works, White Ops publishes on its website a list of 104 Android applications (unfortunately little known) affected by Soraka.


Source :
White Ops