article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 74
article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stadia’s loss is Clubhouse’s gain: the social audio company has poached a longtime Google engineer

The Verge

Clubhouse has hired Justin Uberti, creator of the WebRTC standard and the Google Duo video chat app. He leaves Google after nearly 15 years at the company, where he was most recently the engineering lead for Google’s Stadia cloud gaming service and led the team that made the Stadia iOS web app.

article thumbnail

AI-generated video is here to awe and mislead

Vox

These are among a series of demo videos of OpenAI’s Sora, revealed last week, which can turn a short text prompt into up to a minute of video. The artificial intelligence model is not yet open to the public, but OpenAI has released the videos, along with the prompts that generated them. It’s not there yet. That’s diffusion.

Video 74
article thumbnail

The AI cat and mouse game has begun

CIO Business Intelligence

If you are a CIO or CISO and haven’t yet read this article – Finance worker pays out $25 million after video call with deepfake ‘chief financial officer,’ you should and then share it with your entire company. Typical tactics may involve phishing emails or deceptive social media messages designed to steal company credentials.

Social 77
article thumbnail

Romance Ruses to Watch Out for on Valentine's Day

SecureWorld News

These scams often start innocently on dating sites or social media but quickly escalate to requests for money or sensitive information. RELATED: 5 Emotions Used in Social Engineering Attacks ] Cybersecurity experts warn these tactics are becoming more advanced with the use of new technology.

Exercises 100
article thumbnail

A growing pet project: Offleash’d raises fresh cash and integrates AI to connect animal lovers

GeekWire

” The Offleash’d app ( iOS and Android ) serves as a social community for “pet parents” interested in connecting, either as friends or for dates or group events. A new version of the app released earlier this month now features live video chatting and texting. “Dating definitely is a part of that.”