Remove Authentication Remove Mobile Remove Report Remove Security
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. Experts warn that biometric authentication alone is not foolproof.

Malware 74
article thumbnail

Another T-Mobile cyberattack reportedly exposed customer info and SIMs

The Verge

T-Mobile has suffered another cyberattack after being rocked by a massive data breach in August. This time around, attackers accessed “a small number of” customers’ accounts, according to documents posted by The T-Mo Report. The person who took credit for the summer hack called T-Mobile’s security “awful”.

Mobile 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

T-Mobile investigating report of customer data breach that reportedly involves 100 million people

The Verge

T Mobile may have suffered a customer data breach | Illustration by Alex Castro / The Verge. T-Mobile confirmed Sunday that it’s looking into an online forum post that claims to be selling a large trove of its customers’ sensitive data. After reviewing samples of the data, Motherboard reported it appeared authentic. “We

Mobile 97
article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

million fraud reports from consumers that totaled more than $5.8 Traditional IAM, however, was built to manage internal employees, which means that the organization has control over connecting users to their real identities, birthright provisioning and device security. In 2021, the Federal Trade Commission [1] received 2.8

article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

Digitalization is a double-edged sword for banks, especially when it comes to security. As interactions and transactions become more interconnected, even the simplest processes like opening a new account or making a balance transfer become riddled with security concerns. Avaya’s research report reveals three critical ways to do so.

article thumbnail

Why Multi-Factor Authentication is Key to Modern Cybersecurity

CIO Business Intelligence

One of the best ways to ensure security? Multi-factor authentication, or MFA. Multi-factor authentication requires users to provide two or more pieces of evidence in order to gain access to a network, application, or system, and can dramatically decrease the likelihood of infiltration. IT Leadership, Security

article thumbnail

T-Mobile API Hack Affects Data of 37 Million Customers

SecureWorld News

T-Mobile announced on Thursday that a hacker accessed varying amounts of personal data from 37 million customers from late November 2022 until the malicious activity was detected on January 5th of this year. According to the mobile phone giant, the attacker accessed account information from postpaid and prepaid customers via one of its APIs.

Mobile 77