Remove 2023 Remove Authentication Remove Mobile
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 76
article thumbnail

T-Mobile to pay $31.5M in settlement with FCC over cybersecurity data breaches

GeekWire

T-Mobile says it has made significant investments in strengthening and advancing its cybersecurity program. BigStock Photo) T-Mobile will pay $31.5 BigStock Photo) T-Mobile will pay $31.5 million in cybersecurity, in what the FCC calls “a model for the mobile telecommunications industry.”

Mobile 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 6 Google Authenticator Alternatives in 2023

Tech Republic

Looking for an alternative to Google Authenticator? Here's our comprehensive list covering the top competitors and alternatives to help you find your best fit.

article thumbnail

2023 CCaaS Trends, Insights, and Statistics to Know

CIO Business Intelligence

We know that the Contact Center-as-a-Service (CCaaS) market is growing; an increasing number of companies are choosing this flexible model to support their CX operations, and this will continue through 2023. We expect 2023 to be a watershed year for enterprise CCaaS adoption, driven by hybrid deployment.

Trends 98
article thumbnail

The changing face of cybersecurity threats in 2023

CIO Business Intelligence

Over the last eighteen months or so, a motley group of teenagers under the banner of Lapsus$ managed to hack into “unbreachable” fortresses at tech giants such as Okta, T-Mobile, Nvidia, Microsoft, and Globant using unsophisticated but creative and persistent techniques. It is impossible to know your adversaries.

Network 140
article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

These fraudulent activities not only compromise wireless account access but also pose significant risks to financial accounts, social media profiles, and other online services utilizing phone numbers for multi-factor authentication (MFA).

Mobile 91
article thumbnail

Frucor Suntory amplifies sales and service with a unified mobile app

CIO Business Intelligence

Early in my career, I stayed in an authentic ryokan inn in Kyoto. Unifying four siloed sales tools into one iOS mobile app for easy access to data Frucor Suntory’s outdated on-premises custom sales automation system scattered information across multiple tabs and locations. Digital Transformation

Mobile 114