When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The future of mobilemalwareis here.
For the first time, cybercriminals are infiltrating iOS and Android devices and stealing user face scans.
Yes, you read that correctly.
Todays technology allows bad actors to spoof biometric safeguards and hijack your face.
This hack is as novel as it is terrifying and it warrants immediate action from enterprises and users alike.
The arrival of deepfake hacking
This is truly a brave new world of hacking.
The hackers do this by and heres the real innovation using AI-powered face-swapping platforms.
The result is an app scam that researchers have never seen before.
Now, it seems, hackers are turning their efforts from static images to user faces.
Unfortunately, its understandable why hackers are going down this route.
Up until this point, facial biometrics have been seen as a trusted alternative to passwords.
The authentication method is quick, convenient, and difficult to falsify.
This cunning attack shows that its indeed tough to crack but not impossible.
Founder and CEO, Hexnode.
For enterprises, this means fighting fire with fire and building robust mobile malware and biometric identification protections today.
This starts with getting a grip on theappsin your ecosystem.
A good way to do this is by creating a custom store with approved apps for corporate endpoints.
Think of it like your ownPlay Storeor App Store.
Its also vital to have strictcybersecuritycriteria when inspecting which apps do or dont make your store.
If something doesnt meet your standards, blacklist it.
Next, adhere to best practices to combat mobile malware, beginning with maintaining up-to-date devices through effectivepatch management.
Enable auto-updates, install updates promptly upon release, and automate software modifications outside of business hours.
Similarly, prioritize security scans and gadget monitoring.
Deploy a user session monitoring system to identify malware and block suspicious sessions before users share any personal data.
Finally, watch out for the telltale signs of malware infection.
This includes things like gear battery drain, unusualdatastorage, slow performance, and strange behavior.
Regular audits with a unifiedendpoint protection softwareplatform can help to uncover these machine malfunctions.
Additionally, so can anotherenterprise resource: employees.
Because social engineering is malwares main infection avenue and this case is no different.
This hack isnt capitalizing on Android or iOS vulnerabilities.
This point is worth repeating.
The entire hack relies on tricking the user.
We’ve listed the best free Android apps.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro