Главная
Study mode:
on
1
Intro
2
Fake Text and Information
3
Fake Voice
4
Fake Faces
5
Fraud
6
Biometrics
7
Fake Imagery
8
Fake Chat
9
Opportunities
10
Personality Insights
11
PIM
12
DeepFakes
13
Fake Traffic
14
Deep Exploit
15
Fake Network Traffic
16
Conclusion
17
Questions
Description:
Explore the world of DeepFake technology and its implications for cyber security in this 49-minute conference talk from the 44CON Information Security Conference. Delve into various aspects of synthetic media, including fake text, voice, faces, and imagery. Examine the potential for fraud and biometric manipulation, as well as the emergence of fake chat and network traffic. Discover opportunities arising from this technology, such as personality insights and PIM. Gain valuable insights into DeepFakes, Deep Exploit, and their impact on the cyber security landscape. Conclude with a Q&A session to address any lingering questions about this rapidly evolving field.

DeepFake Cyber Security Threats and Opportunities

44CON Information Security Conference
Add to list