Power BI Fundamentals - Create visualizations and dashboards from scratch
Coursera Plus Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a groundbreaking research study conducted at Brigham Young University that explores the emerging threat of AI-powered voice cloning in phishing attacks through this 19-minute conference talk. Discover how cybercriminals are leveraging artificial intelligence to clone specific individuals' voices for sophisticated vishing (voice phishing) campaigns that can deceive targets by impersonating trusted contacts. Examine the methodology and findings of this novel research that tested the effectiveness of cloned voice attacks in real-world scenarios. Understand the psychological and technical factors that make these AI-enhanced social engineering attacks particularly dangerous and difficult to detect. Explore practical safeguards, detection methods, and defensive strategies that individuals and organizations can implement to protect themselves against this evolving form of cybercrime. Gain insights into the broader implications of voice cloning technology for cybersecurity and the future landscape of social engineering attacks.
Syllabus
DEF CON 33 - Cloned Vishing : A case study - Katherine Rackliffe
Taught by
DEFCONConference