Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Dark Side - New Ways AI is used in Social Engineering.

34:32
 
Share
 

Manage episode 433648433 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

NEW! Text Us Direct Here!

Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes.

Have a Guest idea or Story for us to Cover? Text Us today. Click the link above and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. The Silent Threat of AI Deepfakes (00:00:00)

2. Underestimating the Risk: Business Leaders and Deepfakes (00:01:02)

3. The Rise of Deepfake Face Swap Attacks on ID Verification Systems (00:02:03)

4. The Need for Employee Training on Deepfake Attacks (00:02:55)

5. The Unreliable Nature of ID Verification Systems (00:04:25)

6. Adopting Robust Approaches to Combat AI-Generated Deepfakes (00:06:10)

7. Real-Life Examples of Deepfake Fraud (00:07:19)

8. The Terrifying Truth About Synthetic Media (00:10:40)

9. The Challenge of Detecting Deepfakes (00:14:55)

10. The Chilling Reality of Deepfake Fraud (00:17:06)

11. The Techniques Behind Deepfake Creation (00:19:49)

12. Implementing AI-Driven Detection Systems (00:22:43)

13. The Importance of Verification and Vigilance (00:25:31)

14. The Ongoing Fight Against Deepfake Fraud (00:29:03)

203 episodes

Artwork
iconShare
 
Manage episode 433648433 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

NEW! Text Us Direct Here!

Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes.

Have a Guest idea or Story for us to Cover? Text Us today. Click the link above and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. The Silent Threat of AI Deepfakes (00:00:00)

2. Underestimating the Risk: Business Leaders and Deepfakes (00:01:02)

3. The Rise of Deepfake Face Swap Attacks on ID Verification Systems (00:02:03)

4. The Need for Employee Training on Deepfake Attacks (00:02:55)

5. The Unreliable Nature of ID Verification Systems (00:04:25)

6. Adopting Robust Approaches to Combat AI-Generated Deepfakes (00:06:10)

7. Real-Life Examples of Deepfake Fraud (00:07:19)

8. The Terrifying Truth About Synthetic Media (00:10:40)

9. The Challenge of Detecting Deepfakes (00:14:55)

10. The Chilling Reality of Deepfake Fraud (00:17:06)

11. The Techniques Behind Deepfake Creation (00:19:49)

12. Implementing AI-Driven Detection Systems (00:22:43)

13. The Importance of Verification and Vigilance (00:25:31)

14. The Ongoing Fight Against Deepfake Fraud (00:29:03)

203 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide