{"id":29860,"date":"2019-10-23T04:08:10","date_gmt":"2019-10-23T04:08:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/"},"modified":"2019-10-23T04:08:10","modified_gmt":"2019-10-23T04:08:10","slug":"deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/","title":{"rendered":"Deepfakes, quantum computing cracking codes, ransomware&#8230; Find out what&#8217;s really freaking out Uncle Sam"},"content":{"rendered":"<p><strong class=\"trailer\">Vid<\/strong> The US House Committee on Homeland Security grilled a panel of experts to understand how foreign adversaries could weaponise emerging technologies like AI and quantum computing in cybersecurity.<\/p>\n<p>\u201cThe rapid proliferation of new technology is changing the world,\u201d Cedric Richmond (D-LA), chairman of the Cybersecurity, Infrastructure Protection, and Security Technologies subcommittee of the DHS, said in his opening statement on Tuesday.<\/p>\n<p>\u201cUnfortunately, one man\u2019s tool is another man\u2019s weapon. Sophisticated nation-state actors like Russia, China, Iran, and North Korea have already weaponized new technologies to disrupt our democracy, compromise our national security, and undermine our economy. As technology improves, so will their ability to use it against us.\u201d<\/p>\n<p>Richmond led <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/homeland.house.gov\/preparing-for-the-future-an-assessment-of-emerging-cyber-threats\">the hearing<\/a> with Bennie Thompson (D-MS), chair of the House Homeland Security Committee. The pair were particularly concerned with Russian miscreants planting so-called <a target=\"_blank\" href=\"https:\/\/search.theregister.co.uk\/?q=deepfakes\" rel=\"noopener noreferrer\">deepfakes<\/a>, a type of fake audio and\/or visual content generated using machine-learning algorithms, to spread misinformation online to compromise the upcoming 2020 presidential election.<\/p>\n<p>The <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/02\/16\/mueller_russians_election_indictment\/\" rel=\"noopener noreferrer\">Internet Research Agency<\/a>, described as Russia\u2019s troll farm, churned thousands of bot accounts on social media platforms like Twitter to spread fake US propaganda in the 2016 election. Politicians have also recently fallen prey to deepfake attacks, where their likenesses have been manipulated to say and do things they haven\u2019t actually done. So the fear that the next wave of fake social media accounts will be generating and spreading deepfakes in the near distant future isn\u2019t too unreasonable.<\/p>\n<p>Experts are scrambling to study the effect the Kremlim&#8217;s disinformation campaign had on voters during the 2016 White House race. As part of that research effort, Twitter <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/about.twitter.com\/en_us\/values\/elections-integrity.html#data\">released a data set<\/a> containing more than ten million tweets from suspected puppet accounts last week.<\/p>\n<p>Jim Langevin (D-RI) noted that Moscow&#8217;s election campaign interference was \u201cvery well planned.\u201d Fake accounts were set up months before they were used. There was a main group that generated fake content, a second, larger, group responsible for retweeting the fake messages, and finally real people who believed and amplified the messages further by retweeting.<\/p>\n<p>Ken Durbin, a senior strategist of global government affairs &amp; cybersecurity at Symantec, who testified at the hearing, agreed. He also warned that deepfakes didn\u2019t just pose a threat to politicians, they\u2019re also potentially dangerous for enterprise companies, too.<\/p>\n<p>\u201cFake content like videos, photos, audio recordings or emails represent a serious risk to individuals as well as the organization,\u201d he said. &#8220;Imagine a deepfake of a CEO announcing a series of layoffs, or one directing an employee to wire out funds or intellectual property. It would hurt their stock price.\u201d<\/p>\n<p>The race is on for developers to come up with new strategies that can detect deepfakes. <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/09\/09\/ai_roundup_060919\/\" rel=\"noopener noreferrer\">Facebook<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/09\/30\/270919_ai_roundup\/\" rel=\"noopener noreferrer\">Google<\/a> have both compiled data sets made up of AI generated images and videos to help researchers train detection models, and some boffins are trying <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/08\/09\/deepfakes_mice\/\" rel=\"noopener noreferrer\">more esoteric<\/a> methods.<\/p>\n<h3 class=\"crosshead\"><span>Corporate espionage, and, erm quantum computing?<\/span><\/h3>\n<p>Other threats, like quantum computing, were less tangible. Google and IBM are squabbling over alleged <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/10\/22\/ibm_poopoos_google_quantum_claims\/\" rel=\"noopener noreferrer\">quantum supremacy<\/a> at the moment, though the capabilities discussed during the hearing by lawmakers feel like light years away. Publicly known quantum computers just aren&#8217;t that useful right now. Above all, China is the enemy, Thompson said.<\/p>\n<p>\u201cWe know that China has engaged in intelligence-gathering and economic espionage, and has successfully breached [government employees], navy contractors, and non-government entities from hotels to research institutions,&#8221; he said.<\/p>\n<p>&#8220;We also know that China is investing heavily in developing quantum computing capabilities, which could undermine the security value of encryption within the next decade.\u201d<\/p>\n<p>Sensitive data is typically encrypted using algorithms that scramble the information, making it difficult for adversaries to intercept and recover the data without the necessary keys. Quantum computers could hypothetically crack these encryption algorithms to decrypt classified information, but they don&#8217;t, to the best of our knowledge, exist nor will exist for some time. And in the meantime, boffins are already <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.nist.gov\/news-events\/news\/2019\/01\/nist-reveals-26-algorithms-advancing-post-quantum-crypto-semifinals\">developing<\/a> post-quantum algorithms, anyway.<\/p>\n<p>A more realistic threat, of course, are good old-fashioned phishing attacks that have been used to ransack private contractor companies, steal military secrets, or interfere with power grids. The committee also considered ransomware raids that siphoned off millions in digital cryptocurrencies, and said a lack of information sharing among agencies was an issue.<\/p>\n<p>\u201cThere are very few cases where we know what happened,\u201d Robert Knake, a senior research scientist at the Global Resilience Institute at Northeastern University, told the hearing. The culture of secrecy harms the ability for companies and for the government to defend themselves against corporate espionage.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/11\/10\/shock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Shock\"><\/p>\n<h2 title=\"Surprise, surprise, a whopping 96 per cent of them are X-rated\">Online deepfakes double in just nine months, scaring politicians \u2013 and fooling the rest of us<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/10\/08\/deepfake_videos_report\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Knake called for \u201ccollaborative defense\u201d partnerships between both business and government. \u201cThe \u2018partnership\u2019 that has been the central tenet of our national cybersecurity policy for two decades needs to evolve to real-time, operational collaboration,&#8221; he opined. &#8220;In order for that to happen, we need collaboration platforms where the members of this partnership can trust each other.<\/p>\n<p>\u201cGovernment needs to be able to trust that the intelligence it shares will be protected and only shared appropriately and securely. But private companies need the same degree of assurance when they share with the government and with each other.\u201d<\/p>\n<p>He also called for the government to make it harder for China to infiltrate private US companies in espionage attacks. For example, one important question we should ask is, after cutting China out completely, \u201ccan we maintain global supply chains?\u201d Knake said. He warned that components sold in the US, whether networking equipment or smartphones, should be manufactured stateside or in allied countries.<\/p>\n<p>Niloofar Razi Howe, a senior fellow at the Cybersecurity Initiative, New America, a US national security think tank, went further and added: \u201cTech companies that are co-conspirators with our adversaries must be regulated.\u201d <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/10\/14\/apple_china_tencent\/\" rel=\"noopener noreferrer\">Ahem take note, Tim Cook<\/a>.<\/p>\n<p>You can watch the 90-minute hearing in full below. \u00ae<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=lOQUia-b9Sw\" data-media=\"x-videoplayer\">Youtube Video<\/a><\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7801\/your-guide-to-becoming-truly-data-driven-with-unrivalled-data-analytics-performance?td=wptl1858\">Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/23\/homeland_security_ai\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We sat through this 90-minute committee hearing so you didn&#8217;t have to Vid\u00a0 The US House Committee on Homeland Security grilled a panel of experts to understand how foreign adversaries could weaponise emerging technologies like AI and quantum computing in cybersecurity.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29861,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deepfakes, quantum computing cracking codes, ransomware... Find out what&#039;s really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfakes, quantum computing cracking codes, ransomware... Find out what&#039;s really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-23T04:08:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Deepfakes, quantum computing cracking codes, ransomware&#8230; Find out what&#8217;s really freaking out Uncle Sam\",\"datePublished\":\"2019-10-23T04:08:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/\"},\"wordCount\":1011,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/\",\"name\":\"Deepfakes, quantum computing cracking codes, ransomware... Find out what's really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg\",\"datePublished\":\"2019-10-23T04:08:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepfakes, quantum computing cracking codes, ransomware&#8230; Find out what&#8217;s really freaking out Uncle Sam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfakes, quantum computing cracking codes, ransomware... Find out what's really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/","og_locale":"en_US","og_type":"article","og_title":"Deepfakes, quantum computing cracking codes, ransomware... Find out what's really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-23T04:08:10+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Deepfakes, quantum computing cracking codes, ransomware&#8230; Find out what&#8217;s really freaking out Uncle Sam","datePublished":"2019-10-23T04:08:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/"},"wordCount":1011,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/","url":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/","name":"Deepfakes, quantum computing cracking codes, ransomware... Find out what's really freaking out Uncle Sam 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg","datePublished":"2019-10-23T04:08:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/deepfakes-quantum-computing-cracking-codes-ransomware-find-out-whats-really-freaking-out-uncle-sam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Deepfakes, quantum computing cracking codes, ransomware&#8230; Find out what&#8217;s really freaking out Uncle Sam"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29860"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29861"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}