article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 78
article thumbnail

How Deep Are We in these Fakes?

SecureWorld News

The 2023 deepfake videos, photos, and calls are as accurate as a chameleon trying to blend in with a bowl of Skittles. Let's watch an example of this deepfake video: By a show of hands, how many people can say this is not the real Morgan Freeman, Tom Cruise, and Mark Zuckerberg? No one, right? million yuan ($5.95

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

I also emphasized that companies need to urgently review their employee access protocol, writing that companies must “ make it a point to do continuous employee training to help your teams avoid being duped by phishing and malware tactics.” It might make us feel safer and more secure in our connected world. Ransomware, Security

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Malvertising acts as a vessel for malware propagation. Scammers and malware operators are increasingly adept at mimicking popular brands in their ad snippets, which makes it problematic for the average user to tell the wheat from the chaff. It's also imperative to verify website authenticity before interacting with its content.

article thumbnail

Navigating security challenges in communication platforms: Insights from Interpillar

Dataconomy

As cybercriminals become more sophisticated in their methods, companies must implement multi-factor authentication and other security measures to prevent unauthorized access to user accounts. Secure Real-Time Transport Protocol (SRTP) The company also recommends using SRTP for real-time communication, e.g. for voice and video calls.

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

Using AI/ML, deepfakes can generate audio, video, or photographic content that imitates real people—and they can do so with frightening accuracy. Fake YouTube and TikTok videos are already a common sighting. Most modern cybersecurity systems are geared against malware, ransomware, and brute-force attacks.

article thumbnail

Ransomware’s Number 1 Target? Your Kid’s School

SecureWorld News

Specific ransomware and malware strains affecting schools. Aside from ransomware, malware has also been a problem for K-12 schools. Though not as prevalent as ransomware and malware, there have been reports of DDoS attacks on schools, as well as video conference interruptions by cyber actors.

Malware 64