PhishingBox Logo
Banner

What You'll Learn Today:

Deepfakes & Biometric Spoofing

Unmask the threat of fake identities.

More Than Good Photoshop

Deepfakes are manipulated or synthesized media, often video or audio, using advanced artificial intelligence (AI) techniques to create fabricated, fraudulent content. Here are some examples:

  • Your CEO's likeness, visually and/or audibly, presented via a phishing link sent to you from a doppelganger domain asking you to confirm information via another link provided in the email for HR.
  • A public figure, like a politician, is featured in a video online saying things he or she never said but sounds and looks real.

Biometric spoofing replicates and fakes unique biological characteristics like fingerprints, facial features, iris patterns, or voiceprints in order to trick systems to grant access to the criminal.

  • 3D printing and AI technology have dialed up the speed at which criminals can attempt these efforts.
  • Systems should check for "liveness" where applicable to eliminate the likelihood of spoofing using just a high-resolution image or mask.
Question Icon

Deepfakes are manipulated or synthesized media, often video or audio, using advanced artificial intelligence (AI) techniques to create fabricated, fraudulent content. Here are some examples:

  • Your CEO's likeness, visually and/or audibly, presented via a phishing link sent to you from a doppelganger domain asking you to confirm information via another link provided in the email for HR.
  • A public figure, like a politician, is featured in a video online saying things he or she never said but sounds and looks real.
Question Icon

Biometric spoofing replicates and fakes unique biological characteristics like fingerprints, facial features, iris patterns, or voiceprints in order to trick systems to grant access to the criminal.

  • 3D printing and AI technology have dialed up the speed at which criminals can attempt these efforts.
  • Systems should check for "liveness" where applicable to eliminate the likelihood of spoofing using just a high-resolution image or mask.

The best defense is a good offense. Layer your authentication methods with multi-factor access. And train your staff to spot crafty fakes!

Copyright © PhishingBox