CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Cyber101 CyberTips

CyberDecoded: Decoding Deepfake

Reading Time: 1 min read
in Cyber101, CyberDecoded, Deepfake

A deepfake is a video, photo, or audio recording that seems real but has been manipulated with AI.

Deepfake videos commonly swap faces or manipulate facial expressions. The main AI technology used to create deepfakes is called Generative Adversarial Networks (GAN) GANs generally produce more convincing deepfakes but are more difficult to use.

Deepfakes are becoming more sophisticated, and more difficult for humans to detect. They’re becoming more dangerous too. Cyber criminals create fake personas and deepfake voices to commit financial crimes.

Everything from stock prices to celebrity reputations can be negatively impacted. However, deepfakes, can have legitimate applications in the areas of education, journalism, art and more.

For example, Dali Museum in St. Petersburg, Florida brought artist Salvador Dali back to life using deepfakes. Like any other technology, deepfakes can be used for good or bad ends.

Tags: Adults Cyber DecodedCyber ProfessionalsCyber Professionals VideosCyberdecodedCybersecurityDeepfakedeepfake-decodedDeepFakesDeepfakes VideosExecutives Videos
ADVERTISEMENT

Related Posts

Cursor dynamics – Definitions

Cursor dynamics – Definitions

January 25, 2023
Speech recognition – Definitions

Speech recognition – Definitions

January 25, 2023

Swipe dynamics – Definitions

January 25, 2023
Mouse dynamics – Definitions

Mouse dynamics – Definitions

January 25, 2023

More Articles

Incidents

Oil terminals in Europe hit by a cyberattack

February 3, 2022
Alerts

Phishing Campaigns featuring Ursnif Trojan on the Rise

June 10, 2022
Definition

Access point

November 28, 2020
Book

The Cybersecurity Playbook

October 23, 2020

“A couple years ago, the prime distribution channel for spyware…”

May 7, 2021
Alerts

Microsoft Fixes Actively Exploited Zero-Day Flaw

September 14, 2022

WatchTower Threat Hunting Podcast

June 30, 2022
Course

Introduction to Cybersecurity for Teachers

April 26, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.