No more posts
ce-este-deepfake.png

Deepfake is something very interesting and at the same time something very terrifying. This means a video that shows us a person who in fact………….isn't really the person that we see.

The most famous Deepfake is the one from 2018, where an actor named Jorden Peele makes a deepfake that shows President Obama as the protagonist of a video broadcast on YouTube. It was downright incredible and it set the tone for the alert that other people might do this in the future, but the purpose was an evil one.

This video was made by combining multiple footage with multiple moments showing President Obama in the frame. From here it was possible to combine a set of gestures and visual emotions that, together with a good vocal imitation, generated a fake video or a so-called deepfake.

Moving on to the year 2022, see that this "weapon" is put into practice. The news tells us that the mayor of Berlin had a video call with the mayor of Kyiv, only that the latter...wasn't really him in the footage. It seemed to be him in the video, he had a similar voice, but it was all a deepfake, for political purposes and to receive undue amounts of money. Digital warfare is already being used and we have been warned about it since 2018 by a comedian. How ironic, considering the same previous quality of the current president of Ukraine.

Can we spot a Deepfake?

According to a security report by AVG, report released in late June 2022, there are a few signs that a video is deepfake:

  • strange blinking – it seems that the people appearing in a deepfake video did not correctly generate the natural ability to blink (in the video with Obama, the blinking part seems quite well done, although everything is on a blurred background);
  • facial movement that is jerked – because the digital man is built from video frames from many different scenes, the image can "jump", and that would obviously spoil the naturalness of the facial movement;
  • color tone shift – again, due to the set of frames from different days and times of the character, some movements (although suitable as a mime) may even in a micro-gesture display a different natural color tone from footage supposedly taken in a controlled setting with constant light;
  • a strange mix of several facial expressions – with more complex facial expressions, a combination of adjacent frames could appear that simply betrays the video compilation used for the deepfake.

Is this important to know? Categorical! These technologies open new horizons in the world of Scams and can evolve in countless ways both for the purpose of political destabilization and in ways of stealing economic data or harming individuals. Time shows us that nothing is impossible in the field of Technology and the Internet, so it remains for us to be the first and most vigilant!


24.05.22-atacurile-ransomware-au-inchis-o-scoala-din-SUA.jpg

A very serious type of cyber attack is the ransomware attack. As the name suggests, it involves a hacker gaining an advantage against you and demanding a sum of money from you to stop the attack.

Lincoln College in the United States of America, a school with a history of 157 years, has not withstood two things: The Covid Pandemic and Ransomware Attacks. According to the Malwarebytes blog, in December 2021, this school, which was already suffering from low enrollment in its classes due to the Pandemic, was attacked by hackers and the school's data was encrypted. In order for the information to be decrypted, the hackers demanded various sums of money from which the Lincoln school paid a ransom for the data at a price of just under 100,000 US dollars, according to CBS News. However, the school remains closed and a donation strategy is being attempted to restart the engines, but the future doesn't look too bright for them.

As strategies to apply against such attacks, Malwarebytes recommends measures such as:

  • authentication through several factors (confirmation, e-mail, pin, phone number...);
  • installing an antivirus on the computer system;
  • updating software, to avoid security breaches;
  • regular back-up of files;
  • training for employees, regarding the field of IT security.

03.05.22-Top-10-masuri-de-a-te-feri-de-hackeri-in-2022.jpg

Hacking means many things. From complex cyber attacks and specific software to online bluffs and tricks. Both are equally important if they work. Let's see a top of measures that our company thinks you can put into practice in your company or in your everyday life!

1. INSTALL AN ANTIVIRUS

The first and most relevant tip is to have an antivirus installed on your Laptop, PC or even on your Phone. There are many free options, but you can increase your security considerably with paid software. Such a license for an international name costs you under 200 lei per year, or you can find it in our domestic online stores at prices starting from only 24 lei/year. This will protect your device even when you click on a problematic link, or at least greatly reduce your chance of getting infected from such a link.

2. DO NOT CLICK JUST ANY LINK. ESPECIALLY AT WORK!

Many hackers get into your system by sending email. It's relatively simple: You don't know the e-mail address or the recipient, don't access the e-mail or click on the link in it!

At work it is more difficult to avoid some emails if you have a large volume of correspondence with other people, but for that you need to have a good anti-virus and a good anti-malware. Another trick to find out if a recipient is real, is the email address from which this email is sent. If you receive an email from Altex.ro, but the address is mail@altex.serviciialtex.ro or anything else of this kind, it is clear that the real .ro domain is not sending you this email. Another tip here is not to mix your work computer with your personal stuff and your personal websites (fashion, shopping, gaming, whatever...).

3. USE STRONG PASSWORDS

It is difficult to use complex passwords, but it is not impossible. Do you remember how in the 90s we memorized a lot of phone numbers? So it is possible!

If you have a Hotel and it is called Arica and your e-mail address is receptie@hotelarica.ro, do not put the password hotelarica2022 in this e-mail! For two reasons. First, it is easy to guess. Second, a hacking software can guess any password, but that's in a few hours, or in a few centuries. Seriously! Depending on the complexity of the characters, these softwares react differently. So a password like “eEf6^8#bhd@” would be perfect, but if you want to remember it, choose something like “Cont123Hotel$$”. It's not very hard to remember at all, but it's almost impossible for hackers to crack and definitely impossible to guess.

4. SOCIAL ENGINEERING

Another type of hacking has a more human and personal factor. For example, The Accident Method it's social hacking. Someone calls you, pretends to be someone else, tricks you into giving them money. Analyze well when someone approaches you by e-mail to ask for personal data about you or the company, and never give too personal information over the phone! A bit of instinct of paranoia, would help!

5. UNLICENSED SOFTWARE

Although some software is expensive, installing it without a license can cost you more. Many such programs downloaded from untrusted sources can come bundled with viruses. Some programs are "crafted" not to ask for a license, but to be somehow better-optimized for certain functions, but this unauthorized modification of the software itself can leave holes in security through which a skilled hacker can slip. Windows with a lifetime license for 1 device can cost you under 100 lei. Without a license it will almost certainly be a windows that will give errors, that will not connect properly and that will not be defended by updates to future ingenious methods used by hackers.

6. NO ONLINE SHOPPING FROM NO-NAME SITES

According to the electronic stock exchange Nasdaq, by the year 2040, 95% of shopping is expected to be done online. It's a big risk for those not used to this environment.

There are many offers that are fake on the internet and you can usually tell by the extremely low price. At the bottom of a website, there should be a page called Terms and Conditions. Here you need to find information about the name of the LLC behind the business. Did you find? Do not stop! Also search on Google. See if it appears as a real company and then see some reviews. You can't strictly rely on some reviews, but many confirm the existence of a real sales process. You can say that you only lose 50 lei and you don't care. You will also lose your amount and other amounts on the card and the card itself and your email address and all your identity! Remember the credit by ID mania? credit-cu-buletinul?

7. DON'T KEEP YOUR NFC TURNED ON

We return to the hacking sphere and mention this possibility as well. Many wonder what the world would have been like if Nikola Tesla was rich. He was the first to think of the possibility of wireless energy transfer, and he was not mistaken!

In Romania, this fashion is still not worn much, but it exists. On the bus, in line for beer at the festival...someone can walk around with a portable and modified POS. It can steal money from the card registered in your phone when you have this connection on. Turn it off if you're not at the store! It's more inconvenient to start it every time, but at the same time, you're also locking your car when you're just pulling into the gas station to pay for gas, right? It also turns off bluetooth and turns off mobile data, if we're still talking about Efficiency. Mostly because it will keep your phone battery in better working condition.

8. NO WEIRD PLUGINS ON WEBSITES

Turning our face to novice web developers building their own projects, we also mention this. As a rule, customers ask for various website functions that only a programmer can do for a lot of money or that a plugin does for free.

Use plugins as official as possible and recommended-officially by big names. The more reviews the better. If not, they may contain viruses as well, or they may suddenly crash, taking your site down with them. Also, don't forget regular Updates to these plugins!

9. NO YAHOO MAIL

Another classic tip, from 2013 onwards: No Yahoo mail! You don't want yourname@yourdomain.com? Okay! Gmail works too! But not Yahoo! It has been far too affected by hacker attacks, and having a company email on Yahoo is, from our point of view, a supreme audacity! An interesting tool is the website haveibeenpwned.com. You enter your email address and find out if it's been compromised.

10. USE TWO EMAILS

Here's a revolutionary idea that many of us wish we had known about way back! Are you tired of someone from the company writing to you on e-mail and not finding this message among dozens of received spam? Create two emails!

One should be the "serious" one that you give to family, friends, business partners and solid and credible businesses such as Facebook, Whatsapp, eMag, Altex... The other should be the "scandal" e-mail that you enter it on newly discovered sites, semi-obscure clothing sites (which you should definitely check out), gaming sites, and more. By the way, for Spam you know you can unsubscribe at the bottom of such emails, right? Or, maybe you like to be informed about offers day by day. Everyone with their own style! The idea is not to be disturbed without your consent!

These are "in short" some security and safety tips online, but also offline. Write us on our Facebook page if you also apply these tips in your everyday life!




About us

Online marketing agency with over 15 years of experience in complex projects. We create online platforms, online stores, websites, mobile applications, blogs, social media promotion, Google Ads campaigns, photography, graphics, networking, customized software, IT.

Binario Digital Expert SRL

CUI 45591144




CONTACT

Call now

Contact us for a FREE evaluation of your project.

0754 932 937office@binario.ro