• 9 August 2018
  • 0 replies

Userlevel 7
Badge +36

8th August, 2018  By Nicky Cappella The Stack
Summary - While DeepLocker has yet to be seen outside of the research lab, all of the tools used to create it are readily available: existing malware, and AI tools that can be trained to recognize a target.
DeepLocker malware can remain undetected for lengthy periods, inactive until presented with an AI trigger – through facial or voice recognition, or geolocation – that indicates a specifically targeted individual. When the trigger is recognized, it acts as a key, activating the dormant malware on the system.
Article Link - Read more
 Glossary Blog Back to the Malware Manifesto

0 replies

Be the first to reply!