Skip to content
Fri. Dec 5th, 2025
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • VK
  • Whatsapp

Tech News

Technology News,iPhone Reviews,iPad Reviews

Primary Menu
  • Home
  • NEWS
  • AccessoriesBlocks
  • Insider
  • PodcastExclusive
  • APPS
  • HOW TOS
  • Daily Tips
  • Headlines
  • Home
  • Solutions for Deepfake Risks to Biometric Security
  • NEWS

Solutions for Deepfake Risks to Biometric Security

4 min read

A Hong Kong bank recently fell victim to an impersonation scam in which a bank employee was tricked into transferring $25.6 million to thieves after a video call with the bank CFO and other colleagues. But none of them were real people — all were deepfakes created with the help of artificial intelligence.

This incident illustrates how cybercriminals can use deepfakes to trick humans and commit fraud. It also raises concerns about the threats that deepfakes pose to biometric authentication systems.

The use of biometric markers to authenticate identities and access digital systems has exploded in the last decade and is expected to grow by more than 20% annually through 2030. Yet, like every advance in cybersecurity, the bad guys are not far behind.

Anything that can be digitally sampled can be deepfaked — an image, video, audio, or even text to mimic the sender’s style and syntax. Equipped with any one of a half dozen widely available tools and a training dataset like YouTube videos, even an amateur can produce convincing deepfakes.

Deepfake attacks on authentication come in two varieties, known as presentation and injection attacks.

Presentation attacks involve presenting a fake image, rendering, or video to a camera or sensor for authentication. Some examples include:

Print attacks

  • 2D image
  • 2D paper mask with eyes cut out
  • Photo displayed on a smartphone
  • 3D layered mask
  • Replay attack of a captured video of the legitimate user

Deepfake attacks

  • Face swapping
  • Lip syncing
  • Voice cloning
  • Gesture/expression transfer
  • Text-to-speech

Injection attacks involve manipulating the data stream or communication channel between the camera or scanner and the authentication system, similar to well-known man-in-the-middle (MITM) attacks.

Using automated software intended for application testing, a cybercriminal with access to an open device can inject a passing fingerprint or face ID into the authentication process, bypassing security measures and gaining unauthorized access to online services. Examples include:

  • Uploading synthetic media
  • Streaming media through a virtual device (e.g., cameras)
  • Manipulating data between a web browser and server (i.e., man in the middle)

Defending Against Deepfakes

Several countermeasures offer protection against these attacks, often centered on establishing if the biometric marker comes from a real, live person.

Liveness testing techniques include analyzing facial movements or verifying 3D depth information to confirm a facial match, examining the movement and texture of the iris (optical), sensing electronic impulses (capacitive), and verifying a fingerprint below the skin surface (ultrasonic).

This approach is the first line of defense against most kinds of deepfakes, but it can affect the user experience, as it requires participation from the user. There are two types of liveness checks:

  • Passive protection runs in the background without requiring users’ input to verify their identity. It may not create friction but offers less protection.
  • Active methods, which require users to perform an action in real time, such as smiling or speaking to attest the user is live, offer more security while modifying the user experience.

In response to these new threats, organizations must prioritize which assets require the higher level of security involved in active liveness testing and when it is not required. Many regulatory and compliance standards today require liveness detection, and many more may in the future, as more incidents such as the Hong Kong bank fraud come to light.

Best Practices Against Deepfakes

A multi-layered approach is necessary to combat deepfakes effectively, incorporating both active and passive liveness checks. Active liveness requires the user to perform randomized expressions, while passive liveness operates without the user’s direct involvement, ensuring robust verification.

Mastering AI readiness: A comprehensive guide

In addition, true-depth camera functionality is needed to prevent presentation attacks and protect against device manipulation used in injection attacks. Finally, organizations should consider the following best practices to safeguard against deepfakes:

  • Anti-Spoofing Algorithms: Algorithms that detect and differentiate between genuine biometric data and spoofed data can catch fakes and authenticate the identity. They can analyze factors like texture, temperature, color, movement, and data injections to determine the authenticity of a biometric marker. For example, Intel’s FakeCatcher looks for subtle changes in the pixels of a video that show changes in blood flow to the face to determine if a video is real or fake.

  • Data Encryption: Ensure that biometric data is encrypted during transmission and storage to prevent unauthorized access. Strict access controls and encryption protocols can head off man-in-the-middle and protocol injections that could compromise the validity of an identity.
  • Adaptive Authentication: Use additional signals to verify user identity based on factors such as networks, devices, applications, and context to appropriately present authentication or re-authentication methods based on the risk level of a request or transaction.
  • Multi-Layered Defense: Relying on static or stream analysis of videos/photos to verify a user’s identity can result in bad actors circumventing current defense mechanisms. By augmenting high-risk transactions (e.g., cash wire transfers) with a verified, digitally signed credential, sensitive operations can be protected with a reusable digital identity. With this approach, video calls could be supplemented with a green checkmark that states, “This person has been independently verified.”

Strengthening Identity Management Systems

It’s important to remember that simply replacing passwords with biometric authentication is not a foolproof defense against identity attacks unless it’s part of a comprehensive identity and access management strategy that addresses transactional risk, fraud prevention, and spoofing attacks.

To effectively counteract the sophisticated threats posed by deepfake technologies, organizations must enhance their identity and access management systems with the latest advancements in detection and encryption technologies. This proactive approach will not only reinforce the security of biometric systems but also advance the overall resilience of digital infrastructures against emerging cyberthreats.

Prioritizing these strategies will be essential in protecting against identity theft and ensuring the long-term reliability of biometric authentication.

Tags: Biometric Deepfake Risks Security Solutions

Continue Reading

Previous: Apple Muscles Up iPad Pro With M4 Silicon, Tandem OLED Display
Next: Compelling New Headphones From Heavys and Sonos

Related Stories

Qualcomm-Snapdragon-4s-Gen2.jpg New Qualcomm Chip Set To Supercharge Affordable 5G Phones 5 min read
  • NEWS

New Qualcomm Chip Set To Supercharge Affordable 5G Phones

reading-online.jpg ‘Pink Slime’ Websites Outnumber Daily Newspapers on the Internet 5 min read
  • NEWS

‘Pink Slime’ Websites Outnumber Daily Newspapers on the Internet

Apple-Intelligence-WWDC24.jpg Apple Goes All-In on a Privacy-Based AI Experience 5 min read
  • NEWS

Apple Goes All-In on a Privacy-Based AI Experience

Tim-Cook-WWDC24.jpg Apple Outdoes Google and Microsoft in AI Rollout 6 min read
  • NEWS

Apple Outdoes Google and Microsoft in AI Rollout

ewaste-computers.jpg Windows 10 End of Life Could Bury Landfills in E-Waste 5 min read
  • NEWS

Windows 10 End of Life Could Bury Landfills in E-Waste

CopilotPC.jpg The Copilot+ PCs Have Arrived: Initial Impressions 6 min read
  • NEWS

The Copilot+ PCs Have Arrived: Initial Impressions

AFTK Social

  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • VK
  • Whatsapp
  • Latest
  • Popular
  • Trending
  • best-budget-laptops-1.jpg Best laptops 2025: Premium, budget, gaming, 2-in-1, and more
    • Editor's Choice

    Best laptops 2025: Premium, budget, gaming, 2-in-1, and more

  • MS-Project.jpg If you’re working with complex projects, this $15 app makes them much simpler
    • Editor's Choice

    If you’re working with complex projects, this $15 app makes them much simpler

  • Netflix-Hintergrund-1.jpg Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers
    • Editor's Choice

    Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers

  • KDE-Plasma-Desktop-screenshot-promo-1.jpg Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead
    • Editor's Choice

    Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

  • snipping_tool_in_windows-1.jpg Windows 11’s Snipping Tool now creates DIY animated GIFs
    • Editor's Choice

    Windows 11’s Snipping Tool now creates DIY animated GIFs

  • best-budget-laptops-1.jpg Best laptops 2025: Premium, budget, gaming, 2-in-1, and more
    • Editor's Choice

    Best laptops 2025: Premium, budget, gaming, 2-in-1, and more

  • Meet Jo Jo, Body Positive Model and Cousin of Gigi
    • Headlines

    Meet Jo Jo, Body Positive Model and Cousin of Gigi

  • Finland’s Down’s model Maija makes strides on catwalk
    • Headlines

    Finland’s Down’s model Maija makes strides on catwalk

  • How to Create Adjustment Layers Based on Color
    • NEWS

    How to Create Adjustment Layers Based on Color

  • If You Have $5, Zendaya Found the Spring Collections
    • NEWS

    If You Have $5, Zendaya Found the Spring Collections

  • 5e90465d671ab.jpg Facebook plugs booming business version into Portal
    • ACCESSORIES

    Facebook plugs booming business version into Portal

  • 5e904636599e6.jpg Sony's PlayStation 5 launch set for late 2020
    • ACCESSORIES

    Sony's PlayStation 5 launch set for late 2020

  • 5e90460c39823.jpg Epic Games sued for not warning parents 'Fortnite' is allegedly as addictive as cocaine
    • ACCESSORIES

    Epic Games sued for not warning parents 'Fortnite' is allegedly as addictive as cocaine

  • 5e90459eaad1d.jpg Boeing reports another big drop in deliveries in 3Q
    • ACCESSORIES

    Boeing reports another big drop in deliveries in 3Q

  • 5e90457922df5.jpg New approach for modern power grids that increases efficiency, reduces cost
    • ACCESSORIES

    New approach for modern power grids that increases efficiency, reduces cost

Protect your privacy

Tech News List

Qualcomm-Snapdragon-4s-Gen2.jpg 5 min read New Qualcomm Chip Set To Supercharge Affordable 5G Phones
  • NEWS

New Qualcomm Chip Set To Supercharge Affordable 5G Phones

reading-online.jpg 5 min read ‘Pink Slime’ Websites Outnumber Daily Newspapers on the Internet
  • NEWS

‘Pink Slime’ Websites Outnumber Daily Newspapers on the Internet

Apple-Intelligence-WWDC24.jpg 5 min read Apple Goes All-In on a Privacy-Based AI Experience
  • NEWS

Apple Goes All-In on a Privacy-Based AI Experience

Tim-Cook-WWDC24.jpg 6 min read Apple Outdoes Google and Microsoft in AI Rollout
  • NEWS

Apple Outdoes Google and Microsoft in AI Rollout

ewaste-computers.jpg 5 min read Windows 10 End of Life Could Bury Landfills in E-Waste
  • NEWS

Windows 10 End of Life Could Bury Landfills in E-Waste

Categories

  • ACCESSORIES
  • APPS
  • DAILY TIPS
  • Editor's Choice
  • Headlines
  • HOW TOS
  • INSIDER
  • NEWS
  • PODCAST

Recent Posts

  • Best laptops 2025: Premium, budget, gaming, 2-in-1, and more
  • If you’re working with complex projects, this $15 app makes them much simpler
  • Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers
  • Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead
  • Windows 11’s Snipping Tool now creates DIY animated GIFs

You may have missed

best-budget-laptops-1.jpg Best laptops 2025: Premium, budget, gaming, 2-in-1, and more 14 min read
  • Editor's Choice

Best laptops 2025: Premium, budget, gaming, 2-in-1, and more

MS-Project.jpg If you’re working with complex projects, this $15 app makes them much simpler 1 min read
  • Editor's Choice

If you’re working with complex projects, this $15 app makes them much simpler

Netflix-Hintergrund-1.jpg Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers 14 min read
  • Editor's Choice

Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers

KDE-Plasma-Desktop-screenshot-promo-1.jpg Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead 2 min read
  • Editor's Choice

Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead

Recent Posts

  • Best laptops 2025: Premium, budget, gaming, 2-in-1, and more
  • If you’re working with complex projects, this $15 app makes them much simpler
  • Best VPN for streaming Netflix 2025: Best overall, cheap, free, and for travelers
  • Don’t toss your Windows 10 PC! Try switching to KDE Plasma instead
  • Windows 11’s Snipping Tool now creates DIY animated GIFs
  • Hundreds of Minecraft mods on GitHub are infested with hard-to-spot spyware
  • This 1440p OLED gaming monitor is just $500 today
  • Best budget gaming laptops 2025: Top affordable picks for performance
  • Airrobo PC10 robotic pool cleaner review: An effective low-budget cleaning option
  • Intel teases huge leaps for 18A, the tech behind its next-gen CPUs

Search

Tags

AI Air App Apple Apps artificial Battery Beta Boeing Data Disable Download Enable EU Facebook FaceTime Fix Free gaming Google iOS iPad iPhone Laptop Mac MacOS Media Microsoft Mode Mojave Pro Released Researchers Screen Social Store Surface Tech Testing Tips top Update Video Windows world

Tech Gallery

  • Home
  • About
  • Blog
  • Contact
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • VK
  • Whatsapp
Copyright © All rights reserved. | WPfastworld