article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. Experts warn that biometric authentication alone is not foolproof.

Malware 74
article thumbnail

Canada data breach exposes government personnel information

Dataconomy

The government of Canada has revealed the big “Canada data breach” that consists of information about government personnel, members of the Royal Canadian Mounted Police (RCMP), Canadian Armed Forces personnel, and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Consumers trust banks more than government for biometric security

Computer Weekly

UK citizens think banks are the best organisations to provide biometric authentication for payments

Banking 100
article thumbnail

The ultimate in convenient banking: make payments by thinking

Trends in the Living Networks

In my presentation at yesterday’s media launch of ANZ’s Banking on Australia program , I spoke about new ways of making payments using biometrics. The technology could be utilized for organizations requiring very high assurance of a person’s identity including federal/state/local government and financial institutions.

Banking 156
article thumbnail

Web 2.0 is Collapsing Under its Own Weight

Phil Windley

What started out as an easier way to do things like shop, bank, and get health care information has become increasingly complex over time. And it's not just doctors, of course, banks, government agencies, hospitals, ecommerce sites, and customer service systems all adopt these special purpose messaging systems. Bureaucracy.

Banking 50
article thumbnail

Cherokee Nation empowers its citizens with IT

CIO Business Intelligence

As a widespread community, when COVID-19 struck, Cherokee Nation’s IT services department knew it needed a way to connect citizens digitally with government services, emergency relief, COVID-19 aid, and other vital resources for support. for authentication, leaving Starr’s team with a lot of physical paperwork.

article thumbnail

Digital Experience and Security: Turning Unhappy Paths into Happy Paths for Your Customers

CIO Business Intelligence

User authentication is often an “unhappy path”. Through this lens, it’s easy to see why identity and authentication-related problems are such common causes of unhappy paths. For example, authentication systems may require additional layers of security such as SMS one-time passwords (OTPs), out-of-wallet questions, and CAPTCHA tests.