MIT tech review

The world’s top deepfake artist is wrestling with the monster he created

Hao Li has spent his career perfecting digital trickery. Now he’s working to confront the problem of increasingly seamless off-the-shelf deception. It’s June in Dalian, China, a city on a peninsula that sticks out into the Yellow Sea a few hundred miles from Beijing in
/
MIT tech review

MIT – Facebook paid people to listen to voice recordings, too

It’s the fifth big tech company forced to admit to the practice this year. The news: Facebook paid contractors to listen to, and transcribe, audio clips generated by people using its Messenger app, according to Bloomberg. They were not told where the clips were recorded, or how
/

ThreatMetrix Quarterly Fintech Cybercrime Report 2017

Fintech Cybercrime Report 2017

ThreatMetrix has released its latest quarterly cybercrime report based on cybercrime attacks from October to December 2016, detailing trends across financial services and eCommerce, with a global study of traffic patterns and emerging threats.

Financial Services Key Trends

  • FFIEC mobile banking payment and guidance is forcing US financial institutions to better manage risk, while PSD2 has European financial service providers agitated. Furthermore, insider threats are notorious in many prominent financial service breaches.
  • Mobile usage for banking login and transacting is increasing rapidly with 55% of financial services transactions coming from mobile devices.
  • 80 million attacks were detected using stolen or fake credentials.
  • A 250% growth of financial service mobile transactions was noted year-on-year.
  • Banks are embracing mobile growth, and 55% of financial services transactions are mobile; Many banks are offering full-service apps, however, rejection rates for transactions are high.

eCommerce Key Trends for 2016

  • A higher volume of cross-border transactions is noted with the global village economy gaining strength and popularity. A severe disadvantage is an increase in online fraud.
  • With a 51% increase in transactions blocked year-on-year and twice as many transactions rejected as processed, systems are working overtime to protect users from threats.
  • Up to 90% of some retailers’ traffic is attributed to Bot attacks.
  • 75 million transactions were rejected this quarter with rejections of 11% of account creations, 6.4% of account logins, and 5.1% of payments.

The Threat Landscape

  • The US, UK, Germany, France and Brazil feature in the top five attacking nations, but emerging economies such as India, Qatar, Morocco, and Tunisia are showing strong attack growth too.
  • Strong attacking economies tend to attack similar economies.
  • In the last quarter, identity spoofing persisted in FinTech with a slow but steady growth in device spoofing and a slight decline in IP spoofing and Bots.
  • Digital mobility of global connected users increased with a quarter of transactions cross-border.
  • Device spoofing remains a top threat.
  • Mobile transaction grew globally by 130% year-on-year with highlights in both developing and developed countries.

Keeping the digital world safe and secure is an increasingly difficult job; security experts are relying on holistic approaches to digital identities to differentiate fraudsters from legitimate customers, and pulling in innovative applications of behavioral analytics and machine learning to better identify high-risk behavior.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

Numeraire Cryptocurrency

Digital Cashless Society: Dystopian Nightmares or Utopian Dreams

Digital Cashless Society A truly digital cashless society was long the realm of dystopian nightmares (or utopian dreams depending on how you look at it), ...
Steve Prentice CloudTweaks

Why Certification Matters for Cloud Service Providers

Certification for Cloud Service Providers The concept of “cloud” has become more of a norm for companies and organizations worldwide. Most now use cloud service ...
Rise Ransomware

The Rise of Ransomware

Ransomware IT security company KnowBe4 has issued a warning regarding a new strain of ransomware called VirRansom, which “utilizes both ransomware and parasitic virus features," ...
Mobile security

It May Not Be Sexy, But Strict Compliance Delivers The Freedom To Innovate

Compliance and Business Innovation When the U.S. based non-profit organization RHD | Resources for Human Development decided to move its operations into the cloud, one ...
BBC Tech

Gadgets can be hacked to produce ‘dangerous’ sounds, says researcher

/
Many modern gadgets can be hacked to produce deafening and disorienting sounds, research has revealed. Security researcher Matt Wixey found a range of devices had little protection to stop themselves ...
Breached Data

New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

/
It has been coming for some time, but now the major breach of a biometric database has actually been reported—facial recognition records, fingerprints, log data and personal information has all ...
MIT tech review

The world’s top deepfake artist is wrestling with the monster he created

/
Hao Li has spent his career perfecting digital trickery. Now he’s working to confront the problem of increasingly seamless off-the-shelf deception. It’s June in Dalian, China, a city on a ...