VOICE AUTHENTICATION
Benoit Grunemwald Cyber security expert, ESET France, in an article published in Globalsecuritymag.fr and entitled AI used by cybercriminals to thwart voice authentication, has just reacted to the discovery by computer scientists at the University of Waterloo of an attack method that would make it possible to bypass security systems
It is concerned about the consequences that this discovery may have when it comes to financial accounts, which it points out "often tend to offer this multifactor authentication layer
Personally, I think that any authentication system is good as long as it is not self-sufficient. In other words, any system is good as long as it is accompanied by a second authentication system
The second authentication system may also consist of another application, provided that it is not installed on the same medium as that used for the first authentication, which offers no guarantee of security if the medium is itself contaminated.
Not only must the second authentication system be used from a different medium that the user has at hand, but it must also be carried out, at the request of the party requiring it, after receipt of the first authentication.
In my opinion, the best authentication system is one that combines two-fold user intervention and a hardware element that is unique to the user and with which he or she cannot interfere.
领英推荐
It was for this three-element authentication system that we opted for SSP?. Secure System of Payment, PT SYDECO's mobile payment solution.
Finally, using a secure connection via a professional VPN
It's the eternal dilemma: choose security or ease. These are two attitudes that do not go hand in hand, but sacrificing security for convenience
Similarly, sacrificing prevention for the sake of economy is an unwise choice when you know the damage that a cyber attack can cause.