article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 74
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

In addition, shadow IT can lead to compliance violations and malware infections. According to Randori's State of Attack Surface Management 2022 report , nearly 7 in 10 organizations have been compromised by shadow IT in 2021. This means that they are more vulnerable to attack, and any data stored on them is at risk.

Malware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks. These would provide them detailed reporting as well.

Tools 84
article thumbnail

BYOD can pose privacy risks to employees

Network World

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees may be comfortable with, according to a report released today. But if the company wants to, these tools provide the ability to do a lot more, he said.

Malware 62
article thumbnail

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Trustwave called the backdoor GoldenSpy, issuing a warning about the threat. The companies received an uninstaller for the backdoor.

Malware 52
article thumbnail

Why Should You Manage All the Endpoints in Your Business?

Galido

Prevent Device Misuse and Unproductivity. Application security and device management are central to the endpoint security solution. The endpoint protection system incorporates a device control technology. The technology protects the endpoint devices against malware coming from external devices.

Malware 94
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

And the audit found that attackers did successfully introduce malware into agency systems. This year in particular NASA has experienced an uptick in cyber threats: phishing attempts have doubled and malware attacks have increased exponentially during the COVID-19 pandemic and the concomitant move to telework for much of the NASA workforce.