Remove Authentication Remove Financial Remove Social
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 76
article thumbnail

Cisco Duo MFA Third-Party Service Provider Breached, SMS Logs Stolen

IT Toolbox

A third-party telephony provider of Cisco suffered a breach wherein they hacked into and downloaded message logs for authentication SMS messages sent for Duo Security. The stolen data puts customers at risk of social engineering attacks to trick them into revealing credentials, carrying out financial fraud, etc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Have you thought about what can be done with this device to enhance identity authentication?

article thumbnail

Four of the Biggest Financial Data Breaches of 2019

Galido

Information Technology Blog - - Four of the Biggest Financial Data Breaches of 2019 - Information Technology Blog. Perhaps not surprisingly, banks, insurance companies, and other financial-service firms are 300 times more likely to suffer from a cyber-attack than other industries. The First American Financial Corp.

Financial 100
article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

They may have a built-in user store supporting password authentication, for example. In response to cloud-based customer experiences, more focus has shifted to authentication. Modern authentication systems tend to be built around the FIDO standards of Web Authentication (WebAuthn) and Client-to-Authenticator Protocol (CTAP).

article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. Given the much more psychologically focused and methodical ways that social engineering attacks can be conducted, it makes spotting them hard to do.

article thumbnail

Seven Signs That Your Consumers are Ready for Passwordless Authentication

CIO Business Intelligence

Customer demand for passwordless authentication has grown exponentially since smartphones first began offering built-in biometric readers. A staggering 93% of consumers preferred biometric authentication to passwords — and yet so many companies still force their customers to use risky, outdated login credentials. Your first clue?