Saturday, October 16, 2021

US Senate Approves New Deepfake Bill

Must Read

Apple developers targeted by EggShell Backdoor

Xcode malicious projects are used to hijack developer systems and distribute EggShell custom backdoors.The malware, called XcodeSpy, is targeted...

BugTraq security mailing list closes after 27 years

BugTraq was launched in November 1993 and was one of the first mailing lists dedicated to exposing weaknesses.BugTraq, one...

Google patches Chrome zero-day vulnerability exploited in the wild

Google has released today Stable version 88.0.4324.150 of the Chrome browser for Windows, Mac, and Linux. Today's release contains...

The US bill must now pass through the House of Representatives.

US legislation mandating government study to deepfakes took a step nearer to becoming law this week after it passed the Senate by unanimous consent.

Developed by Democrat senators such as Nevada, Catherine Cortez Masto, the Identifying Outputs of Generative Adversarial Networks (IOGAN) Act acknowledges the significance of this analysis as nation-states and cyber-criminals hone their resources.

A generative adversarial system is a software program designed to be trained using real inputs (e.g. photos ) to create similar, however artificial, outputs (e.g. deepfakes),” noticed that a review of the bill.

“Especially, the NSF should encourage research on falsified or falsified content and data validity and NIST must encourage research for the development of measurements and criteria essential to hasten the progression of the technical tools to analyze the purpose and outputs of generative adversarial networks or alternative technology which synthesize or manipulate content”

Only this week, Europol, the UN, and Trend Micro cautioned in a fresh report of their malicious usage of deepfakes.

The technology offers cyber-criminals and says actors chances to extort high profile figures through other and pornographic material with their faces undermine authorities through misinformation and might also be utilized in quasi-BEC efforts to convince corporate victims to earn big wire transfers.

The latter method has been used by attackers using a sound clip, where a British CEO was duped into sending 200,000 into his attackers.

The capacity for political disturbance possibly accounts for the Senate’s unanimous approval of IOGAN.

“In 2019 a deepfake movie that went viral Malaysia included a political aide that seemed to admit to having had homosexual relations with a cabinet minister,” mentioned that the Europol report.

“Additionally, the movie contained a telephone to have the ministry investigated for alleged corruption. While the rationale behind the movie (beyond personality defamation) remains unclear, it triumphed wreak havoc and destabilize the coalition government”

Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This