Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Check Point: virtual information is destructive to be reckoned with

2024-04-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)12/24 Report--

Through the implementation of artificial intelligence technology in the system, cyber criminals continue to improve their ability to fabricate and manipulate information.

Recently, short videos replacing English oral shapes and dialogues for domestic TV series characters and language programs have suddenly become popular on Douyin, Kuaishou and other major platforms. For a time, fluent "London accent" figures of the three Kingdoms and unconflicting English stand-up crosstalk attracted the attention of many netizens by relying on the similar voice lines and tight mouth shape. These short videos are one of the results of the increasing popularity of generative artificial intelligence tools such as ChatGPT. The advent of artificial intelligence (AI) has led the Internet to a "post-truth" era, making it more difficult to tell the true from the false, and cybercriminals are using these tools to create more complex threats.

Check Point ®Software Technology Co., Ltd. (Nasdaq: CHKP), the world's leading provider of cyber security solutions, found that about 3% of companies worldwide experienced blackmail software attacks in the first three quarters of 2023, a significant increase over the same period last year. With the help of artificial intelligence and organized blackmail software groups, cyber threats are not only increasing, but also more complex, efficient and difficult to detect. Although cyber attacks usually involve data destruction and theft, cyber criminals often create confusion and spread virtual information by falsifying data and impersonating the identities of others.

In recent years, the word "virtual information" has attracted much attention and is regarded as one of the main network security risks. Attackers may manipulate information in order to access and steal sensitive information about companies and government agencies.

Cyber criminals are still using deep forgery technology to obtain sensitive information.

One of the most common ways to obtain this information is phishing, in which attackers fake other people's identities and forge e-mails or text messages. Phishing attacks are becoming more and more confusing by using machine learning techniques to optimize phishing emails.

Cyber criminals also use deep forgery technology to steal sensitive information. As mentioned at the beginning of this article, they can make fraudulent activities more authentic by falsifying videos and images, and even use deeply forged voice calls to commit fraud. Blackmail software attack is one of the most rampant threats in recent years, and the upgrade of network attack means has increased its destructive power. Last year, the number of ransomware attacks increased by more than 37%, with more than $5 million in ransom.

In view of this, it is imperative to take corresponding defensive measures to help contain the threat posed by this new technology and to provide users with the necessary tools to distinguish between true and false information. To this end, Check Point recommends that users:

1. Use authentication as a line of defense: implementing multiple authentication, such as dual authentication and the use of biometric technologies such as facial recognition or fingerprints, is essential to prevent advanced cyber attacks based on artificial intelligence.

two。 With zero trust as the core: just as it is best to vaccinate patients in advance to prevent infectious diseases, as far as network security is concerned, it is best to detect and prevent cyber attacks in advance to prevent them from infecting the network. Real-time threat detection solutions help identify abnormal traffic patterns, and threat intelligence helps proactively intercept malware and prevent it from invading the network. The purpose of the zero trust principle is to never trust everything in the network before verification.

3. Use a combination of cyber security and artificial intelligence: artificial intelligence is now critical to responding to threats more effectively. These artificial intelligence integrated solutions can detect anomalies more quickly, thus responding as soon as possible and reducing damage.

4. Always update: patch fixes are an important part of effective protection against blackmail software attacks, as cybercriminals usually look for newly discovered vulnerabilities in available patches and then target systems that have not been patched.

5. Cyber security training: the entire team should receive basic training on cyber security measures to understand the risks posed by cyber threats in order to find clues in a timely manner.

Wang Yuelin, technical director of Check Point in China, said: "with the increasing intensity of cyber attacks that use artificial intelligence technology to steal, manipulate and spread virtual information, enterprises need to take positive action in the face of the new security situation. Enterprises must adopt proactive strategies to prevent threats, invest in the implementation of network security measures, and deploy artificial intelligence solutions in their systems. Cyber attacks will become more frequent and efficient, while fraud will become more complex and cunning. Enterprises must formulate reliable network security policies and constantly review them to update them in a timely manner, so as to ensure prevention-oriented security protection capabilities. "

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report