VOICE AUTHENTICATION

VOICE AUTHENTICATION

Benoit Grunemwald Cyber security expert, ESET France, in an article published in Globalsecuritymag.fr and entitled AI used by cybercriminals to thwart voice authentication, has just reacted to the discovery by computer scientists at the University of Waterloo of an attack method that would make it possible to bypass security systems using voice authentication with a success rate of almost 99%.

It is concerned about the consequences that this discovery may have when it comes to financial accounts, which it points out "often tend to offer this multifactor authentication layer", and suggests other means of authentication such as "security keys and authentication applications on the grounds that they would be more secure".

Personally, I think that any authentication system is good as long as it is not self-sufficient. In other words, any system is good as long as it is accompanied by a second authentication system, especially if this uses a different access route.

The second authentication system may also consist of another application, provided that it is not installed on the same medium as that used for the first authentication, which offers no guarantee of security if the medium is itself contaminated.

Not only must the second authentication system be used from a different medium that the user has at hand, but it must also be carried out, at the request of the party requiring it, after receipt of the first authentication.

In my opinion, the best authentication system is one that combines two-fold user intervention and a hardware element that is unique to the user and with which he or she cannot interfere.

It was for this three-element authentication system that we opted for SSP?. Secure System of Payment, PT SYDECO's mobile payment solution.

Finally, using a secure connection via a professional VPN, one that not only masks the origin of the call to bypass censorship, but also effectively protects communications, will do no harm, quite the contrary, if the VPN server itself is highly secure, as is the case with ARCHANGEL?2.0 VPN.

It's the eternal dilemma: choose security or ease. These are two attitudes that do not go hand in hand, but sacrificing security for convenience can be very costly.

Similarly, sacrificing prevention for the sake of economy is an unwise choice when you know the damage that a cyber attack can cause.

#Cybersecurity #Authentication #VPN #payment #SSP #Archangel #Sydeco


要查看或添加评论,请登录

PT SYDECO的更多文章

社区洞察

其他会员也浏览了