An underestimated but no less dangerous form of cyber attack is that linked to morphing digital.
This type of aggression sees i cybercriminali stealing photos of a person, often a woman, which is then modified for use in the context of criminal actions. Photos published online by young girls or women are modified and then used in profili fake are withocial network o dating sites.
In other cases, however, the images are used to blackmail victims. The modified photos, in fact, can present the person as if she were naked, therefore potentially harmful to the person reputation of the victim. Then there is no shortage of cases of sexting e scam of various types.
Once the modified photos are obtained, cybercriminals can exploit them in attacks phishingas well as to make the strategies much more convincing social engineering.
Fraud and abuse related to morphing: how to combat this phenomenon?
The tools of photo editing today, combined with features related toArtificial intelligence, offer a lot of room for maneuver when it comes to image manipulation. Although cybercriminals can now create a realistic face practically from scratch, the theft of personal photos remains a disturbing and concrete reality.
While on the one hand this freedom allows for completely legitimate and sometimes appreciable interventions, morphing remains a potential danger, especially for women.
What makes morphing crimes very difficult is the fact that potential victims have few weapons at their disposal.
To avoid such risks you can also use watermark appropriate in the images ed avoid sharing publicly personal photos on social media. In the case of identifying fake profiles or identity cloningall platforms worthy of the name offer a support service that can be contacted.