Remove Device Management Remove Malware Remove Report Remove Security
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 72
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

Whatever the reason, shadow IT can pose a serious security risk to organizations. Shadow IT devices and applications are often not subject to the same security controls as corporate systems. In addition, shadow IT can lead to compliance violations and malware infections. Conduct regular security audits.

Malware 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Should You Manage All the Endpoints in Your Business?

Galido

Information Technology Blog - - Why Should You Manage All the Endpoints in Your Business? “Endpoints” is a broader term used in network security. An endpoint is a device that’s connected to a network and allows two-way communication. Hence, your company needs a secure endpoint management system.

Malware 94
article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks. After all, it’s all for the security of your business!

Tools 84
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

A new security audit reveals that cyber bad actors hit the National Aeronautics and Space Administration (NASA) with more than 6,000 attacks during the last four years. And the audit found that attackers did successfully introduce malware into agency systems. 6 key areas where NASA's information security is failing.

article thumbnail

BYOD can pose privacy risks to employees

Network World

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees may be comfortable with, according to a report released today. But if the company wants to, these tools provide the ability to do a lot more, he said.

Malware 62
article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

Silas Cutler, Principal Reverse Engineer at security firm Stairwell, authored a report detailing Maui and what his team uncovered about the lesser-known ransomware variant. The report was published on June 7, 2022. For more technical information, please see the report from Stairwell. Using manually operated ransomware.