SECURITY TIP: SECURE&TRIVIAL (3/10) – FACIAL BIOMETRICS ALREADY VULNERABLE

This entry is also available in:

The most innovative and secure measure in user identification is facial recognition.

In fact, we have normalized it so much, especially due to the pandemic and with the use in several countries of the Covid passport, that we are no longer surprised that, in order to physically access certain facilities, verify our identity on online platforms and/or pass through security or customs at an airport, we are required to approach a screen that scans our facial features. Just as we do with our cell phones.

However, cybercriminals, and especially the most wanted members of large mafias, have already devised new techniques that have made this highly identifiable and personal security measure easily vulnerable. There are software and applications, some of them even free of charge, that make it possible to superimpose two images (that of the victim and that of the cybercriminal) and thus create a new image that has the features of both, in order to be able to impersonate our identity and evade these controls.

In fact, regular users, and especially minors, can use them harmlessly and for fun, to make old photos of loved ones talk or merge the face with animals and celebrities.

Continuing with our Secure& IT Secure& Trivia, question 3 of 10, we want to check if you know or are able to find out (internet) what this new cyber attack technique is called:

  1. Spoofing
  2. Grooming
  3. Vishing
  4. Morphing
  5. Phishing

LINK TO THE RESPONSE FORM:

https://secureacademy.es/securetrivial-3-10/

HINT: All of them are phishing techniques, it is important to mark the most correct option. We recommend that you watch videos on the Internet of how it works, because it is very interesting and impressive. You should also stop to read the brief description of the other techniques, because we and our children are just as vulnerable to all of them.

We remind you again of the rules of this game, so that you can get an additional cyber gift at the end of the year:

Secure & Trivial is based on a series of practical security tips that will be issued until the end of the year (10 TIPS in total). The objective of these TIPS is to allow you to acquire a level of awareness not only by reading, but also by “doing”. At the middle and end of the game we will remind you of the previous TIPS, for those who could not answer all of them.

As in the mythical game, we have chosen to divide into “quesitos” the different modalities on which we will propose practices and ask questions, by means of an on-line form.

The people who add the most correct answers at the end of the year will receive a cyber gift from Secure & Academy , our Secure & IT Advanced Cybersecurity Training Center.

The themes are those that make up our current 360º Security concept: