article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 73
article thumbnail

Mobilized Employees Engage Buyers With A Trusted Voice

Forrester IT

Employees’ Advocacy Boosts Your Content And Customer Interactions While trust in brands has dwindled, B2B buyers hold those same brands’ employees in high regard as authentic and compelling sources of information. And they want to engage with them.

Mobile 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

They may have a built-in user store supporting password authentication, for example. In response to cloud-based customer experiences, more focus has shifted to authentication. Modern authentication systems tend to be built around the FIDO standards of Web Authentication (WebAuthn) and Client-to-Authenticator Protocol (CTAP).

article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

These fraudulent activities not only compromise wireless account access but also pose significant risks to financial accounts, social media profiles, and other online services utilizing phone numbers for multi-factor authentication (MFA).

Mobile 85
article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Have you thought about what can be done with this device to enhance identity authentication?

article thumbnail

Another T-Mobile cyberattack reportedly exposed customer info and SIMs

The Verge

T-Mobile has suffered another cyberattack after being rocked by a massive data breach in August. According to the report, customers either fell victim to a SIM swapping attack (which could allow someone to bypass SMS-powered two-factor authentication), had personal plan information exposed, or both.

Mobile 116
article thumbnail

T-Mobile investigating report of customer data breach that reportedly involves 100 million people

The Verge

T Mobile may have suffered a customer data breach | Illustration by Alex Castro / The Verge. T-Mobile confirmed Sunday that it’s looking into an online forum post that claims to be selling a large trove of its customers’ sensitive data. After reviewing samples of the data, Motherboard reported it appeared authentic. “We

Mobile 97