Recent Trends in Long Term Care Insurance

How to Host Awesome Holiday Office Parties

Increase In Deepfake Attacks and How Enterprises Can Prepare

fraudsters used AI to mimic a CEO’s voice. This incident happened in March 2019, when criminals impersonated a chief executive’s voice to direct a payment of $243,000.

Cybercriminals are able to execute social engineering attacks by accessing readily available information online. They can research a business, employees and executives. The criminal will even use an actual event picked from social media – for instance, a financial director who is just returned to work from a holiday – to sound more legitimate.

This emerging security threat is also made possible by the development of video editing software that can swap faces and alter facial expressions. Such developments have enabled deepfakes to fool biometric checks (like facial recognition) to verify user identities.

The deepfake cybersecurity threat has become such a concern that the Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) cautioning companies of the possible use of fake content in a newly defined cyberattack vector referred to as Business Identity Compromise (BIC).

How to be Prepared and Protect Against Deepfakes

Deepfake videos and images can be recognized by checking for unnatural body shape, lack of blinking in videos, unnatural facial expressions, abnormal skin color, bad lip-syncing, odd lighting, awkward head and body positioning, etc. However, cybercriminals keep evolving and creating more convincing deepfakes.

Other measures introduced to combat deepfakes include creating solutions that detect deepfakes. There also was an introduction of deepfake legislation in the National Defense Authorization Act (NDAA) in December 2019.

Unfortunately, this has not been enough, and enterprises have the task of helping reduce the impact of these attacks. The following measures can help:

  1. Use anti-fake technologies
    Businesses should explore automated technologies that help identify deepfake attacks. They should also consider watermarking images and videos.
  2. Enforce robust security protocols
    Implement security protocols to help avoid deepfakes, such as automatic checks for any procedure involving payments. For instance, putting systems that allow verification through other mediums.
  3. Develop new security standards
    As security threats keep evolving, so should security standards within a company. For instance, introduce new security standards involving phone and video calls.
  4. Training and awareness
    Enterprises should enforce regular training and raise awareness among employees, management, and shareholders on the dangers of deepfakes to businesses. When all involved parties are trained to identify deepfake social engineering efforts, this will help reduce the chances of falling victim.
  5. Keep user data private
    Deepfake attackers use the information found in public domains such as social media. Although not a failsafe procedure, company profiles can be made private. Users also should avoid adding or connecting with strangers they don’t know and posting too much personal information online.
  6. Disinformation response policy
    Some deepfake incidents are out of control for an enterprise, such as fake videos purporting to be from top management. However, establishing a disinformation response plan will help in cases of a reputation crisis. This should include monitoring and curating all multimedia output – which will help present original content to the public as authentic content.

Conclusion

Deepfake is an emerging cybersecurity concern that requires enterprises to be aware of its potential threats and stay prepared. Although it might be possible to identify a poorly generated deepfake with the naked eye, the technology continues to advance. In response, countermeasures must keep pace.

Shoring up Protections for Sexually Abused Children, the Mentally Ill in Crises, and a Benefit Increase for Disabled Veterans

How Cost Accounting Helps Businesses Measure Performance

Should You Upgrade Your Homeowners Insurance?

Top Side Hustles

$200 to $1,000 a week. Pretty easy and cool, right?

Rent an Extra Room Through Airbnb

While this might require some prep like buying extra towels and toiletries, as well as communicating with customers, you can make a lot in the long run. It might take a couple of months to get up and running, but you can bring in around 7 percent to 12 percent of your property value per year.

Help with Finances

If you have a background in accounting or finances, you might start up a business doing someone’s books, taxes or other services that have to do with money and/or budgeting. You can make from $20 to $100 an hour. Be sure to check with your city and state to find out what licenses and certifications you need.

Walk Dogs

Yes, dog walking can bring in more than you think. And you’ve probably seen these hearty souls on the sidewalks, sometimes with more than one furry friend in tow. If you live in a big city, there’s ample opportunity to make this work: you can make between $10 and $100 per day. And this is just a ballpark estimate. Plus, you’ll get your steps in. It’s healthy both fiscally and physically.

Write Resumes and Cover Letters

With all the job seekers out there, you could make a good chunk of change doing this. And you don’t necessarily need to be a writer. If you have a background in HR, recruitment or you’ve worked as a hiring manager, you’ll be ready to go. Hesitant about all that punctuation? One word: grammarly.com. This app will help you navigate all those writing questions you might have that inevitably come up when you’re composing. The average you might earn is somewhere in the neighborhood of $500 or more.

One Thing to Note

If you make more than $600, you must report it to the IRS. If you see that your side hustle is booming, if you start making thousands or tens of thousands of dollars a year, you might want to start a business. You could enjoy additional tax write-off opportunities so you can keep more of what you earn.

So start exploring, hang those shingles and watch the extra dough come rolling in.

Sources

https://careersidekick.com/side-hustle-ideas/

https://time.com/nextadvisor/financial-independence/best-side-hustles/

https://www.ridester.com/how-much-can-you-make-a-week-with-instacart/#:~:text=As%20an%20Instacart%20shopper%2C%20you,orders%20will%20earn%20more%20money.

Risk of Browser Extensions and How to Stay Safe

recent study by Talon, a digital security company, most Chrome Web Store extensions (62.43 percent of extensions) require dangerous permissions, including permission to read or change user data and activity. This means that an extension can see the sites visited, keystrokes, login credentials and private data, such as payment card details.

Since this information is readily available on a user’s web browser, cybercriminals can use a malicious extension to collect the data for their gain. At the same time, the data collected is sold without user consent or knowledge and used by third-party data brokers to send users tailor-made ads.

Although not all browser extensions are a security risk, some might be built to impersonate legitimate extensions, especially those from third-party resources. In other cases, legitimate extensions have been compromised or bought by a developer who uses them for malicious purposes.

Some browser add-ons are built to download malware onto your device, redirect search traffic to malicious websites or download ad ware and Trojan horse viruses.

The extensions can automatically update without requiring any action from a user. This means that if a legitimate extension is compromised, it can be used to install malware without user knowledge. Even secure extensions are prone to attacks or can be compromised, enabling attackers to gain access to data stored by browsers.

Additionally, malicious extensions can be built to bypass fraud detection by official Web stores. For instance, in 2020, Google removed over 500 extensions from its web store that violated policies, with some already having infected users and stolen their data. This followed the discovery of some malicious extensions that users had already downloaded.

A recent report released by Kaspersky, a cybersecurity firm, shows just how dangerous malicious add-ons are. After the firm analyzed data from January 2020 to June 2022, it discovered that over this time frame, 4.3 million users were attacked by adware hiding in browser extensions. This put adware as the highest representative of browser extension risks, with malware coming second. The report also indicates that Kaspersky products prevented more than 6 million users from downloading adware, malware or riskware disguised as browser extensions.

Such figures from just one cybersecurity firm are worrying, considering the study focused only on users that use their security solutions. This creates a need for users to be more vigilant when using browser extensions.

How to Make Sure Browser Extensions Are Safe

There are various ways to help reduce the risks posed by browser extensions:

  1. Ensure the extension is from an official web store. Since these extensions can also be compromised, it is best to find out more information about the developer.
  2. Check reviews as they help to know what other users think of the extension and if there have been any complaints. However, users should be cautious of identical comments or too many 5-star reviews, as these could be fake.
  3. Check whether the extension is updated regularly. An extension last updated many years ago might not be reliable.
  4. Review extension permissions for each extension.
  5. Check that you are not installing clones of the original extension. For instance, if you search for an extension, you can find other similar ones that look legit.
  6. Uninstall browser extensions that you don’t recognize or those you no longer need.
  7. Use browsers that have the features you want.
  8. Install reliable antivirus software that will help spot malicious activities or applications.

Conclusion

Browser extensions play an important role in the user browsing experience. Although not all extensions are dangerous, users must conduct due diligence to ensure they install legitimate extensions.

Productive Month Passing Domestic Manufacturing and Prescription Drug Allowances, Climate and Gun Violence Mitigation, and Veteran Burn Pit Healthcare Legislation

2020 Vs 2021 Vs 2022 Federal Income Tax Brackets