article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 72
article thumbnail

Cisco Duo MFA Third-Party Service Provider Breached, SMS Logs Stolen

IT Toolbox

A third-party telephony provider of Cisco suffered a breach wherein they hacked into and downloaded message logs for authentication SMS messages sent for Duo Security. The stolen data puts customers at risk of social engineering attacks to trick them into revealing credentials, carrying out financial fraud, etc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Have you thought about what can be done with this device to enhance identity authentication?

article thumbnail

Four of the Biggest Financial Data Breaches of 2019

Galido

Information Technology Blog - - Four of the Biggest Financial Data Breaches of 2019 - Information Technology Blog. Perhaps not surprisingly, banks, insurance companies, and other financial-service firms are 300 times more likely to suffer from a cyber-attack than other industries. The First American Financial Corp.

Financial 100
article thumbnail

Prudential Financial suffers a new data breach

Dataconomy

The Prudential data breach is confirmed In a recent disclosure, Prudential Financial announced a data breach last week, during which unauthorized parties accessed and extracted data related to employees and contractors, only to be expelled from the infiltrated systems the following day. Featured image credit: Compare Fibre/Unsplash

article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

They may have a built-in user store supporting password authentication, for example. In response to cloud-based customer experiences, more focus has shifted to authentication. Modern authentication systems tend to be built around the FIDO standards of Web Authentication (WebAuthn) and Client-to-Authenticator Protocol (CTAP).

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.