article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 73
article thumbnail

Digital security for the world of anywhere work

CIO Business Intelligence

When HP moved its workforce of 70,000 employees and contractors to a hybrid model, the umbrella of devices it had to protect expanded exponentially. Adaptive Endpoint Management enabled HP to rationalize its device management practices by streamlining policy management and using a corporate-ready device image.

HP 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

Individual employees often adopt shadow IT for their convenience and productivity—they feel they can work more efficiently or effectively using their personal devices and preferred software, instead of the company’s sanctioned IT resources. To access applications or data that are not available on corporate systems.

Malware 66
article thumbnail

Why Should You Manage All the Endpoints in Your Business?

Galido

Here we look at some of the reasons that show the importance of endpoints management/security. Endpoints are connected to the weakest link in enterprise data protection. With so many business applications running on your network, the hacker would have instant access to sensitive data after gaining entry into your corporate network.

Malware 94
article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO Business Intelligence

Of course, even if the ransom is paid and the key received, there’s no guarantee that other malicious code won’t remain on the devices to continue to gather data for the criminals. In all three cases, the cyber criminals are gaining access via the endpoint devices. Remote deployment of patches and updates.

article thumbnail

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Use strict access control measures for critical data. The companies received an uninstaller for the backdoor.

Malware 52
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

And the audit found that attackers did successfully introduce malware into agency systems. This year in particular NASA has experienced an uptick in cyber threats: phishing attempts have doubled and malware attacks have increased exponentially during the COVID-19 pandemic and the concomitant move to telework for much of the NASA workforce.