Fraudsters use AI voice manipulation to steal £200,000

Cyber criminals have used artificial intelligence (AI) and voice technology to impersonate a UK business owner, resulting in the fraudulent transfer of $243,000 (£201,000). In March this year, what is believed to be an unknown hacker group is said to have exploited Read More …

‘CamuBot’ Banking Malware Ups the Trojan Game with Biometric Bypass

CamuBot is a unique malware targeting Brazilian bank customers that attempts to bypass biometric account protections. Brazilian bank customers are being warned of malware dubbed CamuBot that hides in plain sight and presents itself as a required end-user security module Read More …

UK Tax Agency Collects 5.1M Biometric Voice IDs, May Violate GDPR

Her Majesty’s Revenue and Customs (HMRC) in the UK is under investigation by that country’s regulator over the collection of more than 5 million biometric voice IDs. The Information Commissioner’s Office (ICO) is investigating the tax agency’s practice, which may Read More …

Behavioral biometrics missing from cybersecurity

Recently, there’s been an uptick in the adoption of the NIST Cybersecurity Framework, a set of guidelines aimed at helping organizations improve their overall cybersecurity process. In December 2017, NIST released the second draft of its framework. Among the updates were two Read More …

connect:ID 2018 reveals exciting new plans to put next-generation identity solutions in the spotlight

  connect:ID will be held April 30 – May 2, 2018 at the Walter E. Washington Convention Center, Washington, DC. A rapidly expanding event, connect:ID is expected to attract 1,300 identity professionals and 100+ industry and government exhibitors. This year, connect:ID Read More …

Kurat võtku! Estonia identifies security risk in almost 750,000 ID cards

The Estonian government has discovered a security risk in its ID card system, potentially affecting almost 750,000 residents. “When notified, Estonian authorities immediately took precautionary measures, including closing the public key database, in order to minimise the risk while the Read More …