The latest edition of the ISMG Security Report highlights how thieves can use “deep fake”photos in an attempt to steal cryptocurrency.
In this report, you’ll hear (click on player beneath image to listen):
- ISMG’s Jeremy Kirk outline new ways that images can be manipulated to circumvent cryptocurrency exchange access controls;
- Diana Kelley and Sian John of Microsoft provide details of their upcoming session at the RSA Conference on “data gravity”;
- ISMG’s Mathew Schwartz offer an analysis of why mega-breaches are likely to continue.