Goto

Collaborating Authors

 hackers


The terrifying rise of 'voice cloning' scams: How hackers can use AI to replicate your voice before placing fake panicked calls to friends or family pleading them to send money

Daily Mail - Science & tech

Our voices are just about as unique as our fingerprints - so how would you feel if your voice was cloned? A new type of deepfake known as voice cloning has emerged in recent months, in which hackers use artificial intelligence (AI) to simulate your voice. Famous faces including Stephen Fry, Sadiq Khan and Joe Biden have all already been victims of voice cloning, while one unnamed CEO was even tricked into transferring 243,000 to a scammer after receiving a fake phone call. But how does it work, and just how convincing is it? To find out, I let a professional hacker clone my voice - with terrifying results.


How Hackable Are Cars?

#artificialintelligence

Here are the most common car hacks and how manufacturers can better protect their cars from them. Vehicle hacking refers to all the ways in which hackers can exploit weaknesses in a vehicle's software, hardware, and communication systems to gain unauthorized access. Below are a few examples of different attacks that hackers can perform on other services inside a vehicle in order to hack self-driving cars. Cyber threats include ransomware, a hacker who gains access to your car's infotainment system, and even a hacker who can remotely control your car. With the help of electronic accessories and software, a determined hacker can intercept or block your remote control signal, break into your car's software, and even remotely control your car.


Hackers Used to Be Humans. Soon, AIs Will Hack Humanity

WIRED

If you don't have enough to worry about already, consider a world where AIs are hackers. Hacking is as old as humanity. We are creative problem solvers. We exploit loopholes, manipulate systems, and strive for more influence, power, and wealth. To date, hacking has exclusively been a human activity.


What Will Happen When a Facial Recognition Firm is Hacked

#artificialintelligence

Technology has become advanced with time and it will only be getting smarter. Biometric technology, specifically facial recognition, is among them that has transformed the security approach worldwide. With advances in camera technologies and the proliferation of smartphones, facial recognition is relentlessly gaining rapid momentum. However, as this technology has a tremendous impact from a cybersecurity perspective, it also has a security flaw. It raises concerns throughout its reliability and effectiveness.


Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices

#artificialintelligence

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge. Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials -- such as tables -- to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without the need to be in line-of-sight." In doing so, it's possible for an attacker to interact with the devices using the voice assistants, hijack SMS two-factor authentication codes, and even place fraudulent calls, the researchers outlined in the paper, thus controlling the victim device inconspicuously. The research was published by a group of academics from Michigan State University, Washington University in St. Louis, Chinese Academy of Sciences, and the University of Nebraska-Lincoin. The results were presented at the Network Distributed System Security Symposium (NDSS) on February 24 in San Diego.


Challenges and Risks of AI In Cybersecurity

#artificialintelligence

Artificial Intelligence is seen by many as the latest solution to a growing threat: the rise of cyber attacks in recent years. Machine learning and other AI applications can be embedded within algorithms in basically any software. Given the fact that today's world pretty much runs digitally, AI seems to be the answer to cybercrime damages that will cost the world $6 trillion every year by the time we reach 2021. However, while AI can exponentially boost cybersecurity, it can also make the task even more complex. AI can be used and modified by hackers, who are always eager to evolve and use the last available tech in the market to cause harm.


FBI warns hackers can use smart home devices to 'do a virtual drive-by of your digital life'

Daily Mail - Science & tech

Smart home devices are designed to make our lives easier, but they also make it easier for hackers to infiltrate our lives. The FBI has sent out a warning that'hackers can use those innocent devices to do a virtual drive-by of your digital life.' The US intelligence agency urges users to regularly change passwords, check for firmware updates and never have two devices on the same network. Digital assistants, smart watches, fitness trackers, home security devices, thermostats, refrigerators, and even light bulbs are all on the list of devices that can be infiltrated by cybercriminals. And if these devices, among other smart home technology, are not properly protected, they can be used by hackers to'do a virtual drive-by of your digital life.' Samsung are developing an interactive kitchen that includes a fridge, oven and TV.


How hackers are using Deepfakes to trick people Packt Hub

#artificialintelligence

Cybersecurity analysts have warned that spoofing using artificial intelligence is within the realm of possibility and that people should be aware of the possibility of getting fooled with such voice or picture-based deepfakes. Deepfakes rely on a branch of AI called Generative Adversarial Networks (GANs). It requires two machine learning networks that teach each other with an ongoing feedback loop. The first one takes real content and alters it. Then, the second machine learning network, known as the discriminator, tests the authenticity of the changes.


Hackers Can Use Lasers to 'Speak' to Your Amazon Echo

#artificialintelligence

In the spring of last year, cybersecurity researcher Takeshi Sugawara walked into the lab of Kevin Fu, a professor he was visiting at the University of Michigan. He wanted to show off a strange trick he'd discovered. Sugawara pointed a high-powered laser at the microphone of his iPad--all inside of a black metal box, to avoid burning or blinding anyone--and had Fu put on a pair of earbuds to listen to the sound the iPad's mic picked up. As Sugawara varied the laser's intensity over time in the shape of a sine wave, fluctuating at about 1,000 times a second, Fu picked up a distinct high-pitched tone. The iPad's microphone had inexplicably converted the laser's light into an electrical signal, just as it would with sound.


Hackers used fake job website to scam jobless US veterans

#artificialintelligence

In certain countries, the populace holds a deep bond with their armed forces. Reasons such as patriotism, giving back and love for freedom can often be attributed to such emotions and this holds true for the USA as well. Therefore, its own way, The U.S Chamber of Commerce hosts an online website at "hiringourheroes.org" to help armed forces veterans find jobs. However, attackers seem to have found ways to bend this to their advantage. Exploiting the impact and need of the site, recently, a pretender website with the URL of "hiremilitaryheroes[.]com" was discovered distributing malware by prompting users to download an application for computers based on the Windows OS.