Remove Authentication Remove Banking Remove Mobile Remove Social
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 74
article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

Digitalization is a double-edged sword for banks, especially when it comes to security. As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Making Banking a More Effortless Experience

CIO Business Intelligence

Along with nearly every other industry, banking is facing greater competitive pressure than ever. As banks continue to face this reality, they’re also tasked with addressing a variety of rapidly changing issues, including those surrounding data protection, adoption of cryptocurrency, and anonymizing data (AI models). .

Banking 131
article thumbnail

The AI cat and mouse game has begun

CIO Business Intelligence

The incident involved scammers who, using publicly available videos and audio from YouTube of targeted senior executives, created deepfake representations to deceive a finance employee into executing multiple transactions to bank accounts in Hong Kong, resulting in significant financial damage to the company.

Social 78
article thumbnail

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

CIO Business Intelligence

Password-based authentication is likely the most widely used method of authenticating users to online services. Password-based authentication is used because it is easy to understand and implement. They provide multifactor authentication (MFA) without the usual burden on the user. on a user’s other online accounts.

article thumbnail

U.S. Energy Company Targeted by QR Code Phishing Campaign

SecureWorld News

The emails in the campaign purported to be from Microsoft, and they claimed that the recipient needed to update their account security settings or activate two-factor authentication (2FA)/multi-factor authentication (MFA) within 72 hours. Only scan QR codes from trusted sources.

Energy 73
article thumbnail

Gamesprite data breach revealed after 4 years

Dataconomy

The Gamesprite data breach has been revealed on social media and Have I Been Pwned and according to the information, over six million unique email addresses were exposed. Enable Two-Factor Authentication (2FA) When possible, use two-factor authentication. Here are all the details!

Data 53