Remove Authentication Remove Groups Remove Malware Remove Social
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 79
article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

I also emphasized that companies need to urgently review their employee access protocol, writing that companies must “ make it a point to do continuous employee training to help your teams avoid being duped by phishing and malware tactics.” It sounds simple, but it could be a hedge against similar social engineering and phishing hacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Stop Malware Attacks and Online Identity Theft

Galido

Malware means a malicious or intrusive software application that is coded for executing on the targeted device without notifying its user or the owner. Affecting a mobile phone, a computer, a laptop, or a network server, malware interrupts computing operations, hijacks networks, or access systems. Update your browser.

Malware 68
article thumbnail

The anatomy of a Facebook account heist

Vox

While many people might think of Russian state-sponsored hacking groups when it comes to infiltrating social media platforms, there’s actually a global network of hackers participating in an underground economy where things like Facebook and Instagram accounts are commodities. Exactly how hackers go after legitimate accounts varies.

Groups 143
article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

One notorious hacking group from Iran uses particularly dirty schemes to fleece users, according to Google's Threat Analysis Group (TAG). This [APT35] is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers. Rocket Kitten successfully attacks university website.

Google 78
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

Until recently, targeted cyberattacks were primarily directed at specific groups, such as top executives, politicians, or celebrities. If you use a corporate BYOD for work, it is best to avoid using it for home entertainment activities, like playing games or browsing social networks. However, things have changed.

Network 89
article thumbnail

Digital Hunt: The Cyber Mercenary Investigation

SecureWorld News

He has spent the last 18 months tracking a cyber mercenary group across the Dark Web. This is the story of a cyber mercenary group, dubbed Void Balaur, with victims around the world. This is a group that he's been tracking for seven years now. He was about to find out what this group, now called Void Balaur , was up to.

Groups 77