article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. Experts warn that biometric authentication alone is not foolproof.

Malware 76
article thumbnail

Why CIOs back API governance to avoid tech sprawl

CIO Business Intelligence

As such, he views API governance as the lever by which this value is assessed and refined. Good governance is the telemetry on that investment, from which operational and tactical plans can be adjusted and focused to achieve strategic objectives,” he says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

T-Mobile API Hack Affects Data of 37 Million Customers

SecureWorld News

T-Mobile announced on Thursday that a hacker accessed varying amounts of personal data from 37 million customers from late November 2022 until the malicious activity was detected on January 5th of this year. According to the mobile phone giant, the attacker accessed account information from postpaid and prepaid customers via one of its APIs.

Mobile 82
article thumbnail

What Is the Security of Documents and Information?

Kitaboo

Governments, organizations, and individuals grapple with numerous challenges in this environment, ranging from sophisticated cyberattacks to regulatory compliance. Standard Features of Document Security Restricted Access DRM Authentication Mechanisms Encryption IV. Table of Contents I. Why Is Document Security Important?

article thumbnail

Critical Zero-Day in Ivanti Software Used to Attack Norwegian Agencies

SecureWorld News

Earlier this week, the Norwegian National Security Authority (NSM) disclosed that a series of attacks targeting government agencies exploited a previously unknown Zero-Day vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) software, formerly known as MobileIron Core. The vulnerability also has a maximum CVSS score of 10.0,

article thumbnail

Lapsus$ hackers breached T-Mobile’s systems and stole its source code

The Verge

The Lapsus$ hacking group stole T-Mobile’s source code in a series of breaches that took place in March, as first reported by Krebs on Security. T-Mobile confirmed the attack in a statement to The Verge , and says the “systems accessed contained no customer or government information or other similarly sensitive information.”.

System 86
article thumbnail

SEC X Account Hack: SIM Swap Exposed Vulnerability

SecureWorld News

Notably, the @SECGov account had two-factor authentication (MFA) disabled due to access issues for six months before the hack. This incident, while brief, sent shockwaves through the financial world and raised concerns about the security of online platforms used by government agencies.