Skip to main content

DeepLocker


LLiddell
Forum|alt.badge.img+36
 


  
8th August, 2018  By Nicky Cappella The Stack
 
Summary - While DeepLocker has yet to be seen outside of the research lab, all of the tools used to create it are readily available: existing malware, and AI tools that can be trained to recognize a target.
 
DeepLocker malware can remain undetected for lengthy periods, inactive until presented with an AI trigger – through facial or voice recognition, or geolocation – that indicates a specifically targeted individual. When the trigger is recognized, it acts as a key, activating the dormant malware on the system.
 
Article Link - Read more
 Glossary Blog Back to the Malware Manifesto

0 replies

Be the first to reply!

Reply