Deepfake Technology: Implications for the Future

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

It has been over a year since Jordan Peele made a video warning us of the impending spike in deepfake technology. In the video, Peele uses ML technology and his legendary Obama imitation to effectively ventriloquize Obama. He effectively makes it appear as if Obama is saying outlandish statements. Since the video’s release, we have … Read more

Mobile Security: Safeguarding Your Information

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Mobile Security, phone getting hacked, web, hands on phone, malware

Mobile security is a relatively new field in the world of cybersecurity. The rise of mobile computing calls for an increased vigilance in regards to our personal information. Smart phones and the like are now the standard. In fact, according to the Pew Research Center, 95% of Americans own a cellphone of some kind. The … Read more

Malicious Apps: For Play or Prey?

Author(s):

Josh Henry, ,

Malicious Apps, hand holding phone with a warning sign on it, red background

Malicious Apps Today’s society is adapting to excessive use of cell phones and personal data stored in them. Federal laws have been changed to protect citizens from police authorities rummaging through our cell phones without the proper documentation. Considering that criminals have much less trouble adapting than lawmakers, they are usually one step ahead and … Read more

What is a Firewall and How Does it Work?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cords plugging into a system firewall

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules to ensure security. Firewalls establish a barrier of protection between a trusted network and a foreign network. They are one … Read more