DeepLocker

  • 9 August 2018
  • 0 replies
  • 71 views

Userlevel 7
Badge +36
 


  
8th August, 2018  By Nicky Cappella The Stack
 
Summary - While DeepLocker has yet to be seen outside of the research lab, all of the tools used to create it are readily available: existing malware, and AI tools that can be trained to recognize a target.
 
DeepLocker malware can remain undetected for lengthy periods, inactive until presented with an AI trigger – through facial or voice recognition, or geolocation – that indicates a specifically targeted individual. When the trigger is recognized, it acts as a key, activating the dormant malware on the system.
 
Article Link - Read more
 Glossary Blog Back to the Malware Manifesto

0 replies

Be the first to reply!

Reply