article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 74
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

Shadow IT devices and applications are often not subject to the same security controls as corporate systems. In addition, shadow IT can lead to compliance violations and malware infections. According to Randori's State of Attack Surface Management 2022 report , nearly 7 in 10 organizations have been compromised by shadow IT in 2021.

Malware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO Business Intelligence

They achieve this via several means, but one of the most common is via phishing, which typically involves convincing someone to download a piece of malware from a legitimate-looking email that will then gather login data and other sensitive info that can give the criminals access to much more within the organisation.

article thumbnail

The BYOD Problem

Cloud Musings

This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD). 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi.

Mobile 70
article thumbnail

Apple Unveils 'Lockdown Mode' to Defend Against Spyware

SecureWorld News

Configuration profiles cannot be installed, and the device cannot enroll into mobile device management (MDM), while Lockdown Mode is turned on. While Apple presents this Lockdown Mode as something that can completely protect a mobile device from a cyberattack, in reality, it's a bit more complicated than that.

Spyware 79
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

And the audit found that attackers did successfully introduce malware into agency systems. This year in particular NASA has experienced an uptick in cyber threats: phishing attempts have doubled and malware attacks have increased exponentially during the COVID-19 pandemic and the concomitant move to telework for much of the NASA workforce.

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks. You could also integrate them with other existing scanners.

Tools 84