article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 72
article thumbnail

Why some Palestinians believe social media companies are suppressing their posts

Vox

Algospeak” is an evasion tactic for automated moderation on social media, where users create new words to use in place of keywords that might get picked up by AI -powered filters. Below is a guide to its history, how it manifests, and what you as a social media user can do about it. What is shadowbanning?

Media 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Day two of Microsoft’s FTC trial: Court documents point to new Xbox in 2028

GeekWire

(GeekWire File Photo / Nat Levy) Microsoft plans to bring the next generation of Xbox video game consoles to market in 2028, according to documents unsealed in Microsoft’s ongoing court battle with the FTC. One of the bigger pieces of news from the case didn’t come from the testimony, however.

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.

article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

The digital injection attack A digital injection attack is when someone “injects” fake data, including AI-generated documents, photos, and biometrics images, into the stream of information received by an identity verification (IDV) platform. And the only way to do this is to leverage advanced security technologies such as mobile cryptography.

Security 103
article thumbnail

Some accused in Capitol riot reportedly tried to scrub info from their phones and social media

The Verge

Some 49 people accused of taking part in the January 6th riot at the US Capitol building have tried to erase images, videos, and texts from their phones and social media accounts, the Associated Press reported, citing a review of court records. In the days following the attack, Sen.

Media 75
article thumbnail

As mob overruns U.S. Capitol, reaction on social media turns to anger toward tech platforms

GeekWire

A Twitter warning posted on a tweeted video by President Trump on Wednesday. Capitol, attracted a riveted audience on social media on Wednesday — and backlash against some tech platforms for fostering the very actions many were witnessing. Twitter screenshot). Chaos unfolding in Washington, D.C., ” And then, around 3:30 p.m.

Media 133