Week in security with Tony Anscombe | WeLiveSecurity

Week in security with Tony Anscombe

When we hear about a breach, we assume that attackers used a fiendish exploit to breach the victim’s defenses – but is this how breaches typically occur?

When we hear about a breach, we assume that attackers used a fiendish exploit to breach the victim’s defenses – but is this how breaches typically occur? Also this week, we pondered the question, ‘is the world as we know it ready for the impact of deepfakes?’ Facebook has developed technology to confound facial recognition systems, including because they’re being misused for generating deepfakes. All this – and more – on WeLiveSecurity.com.

Discussion

Comments are closed.