Detecting Digital Injection To Counter Deepfake Biometric Fraud 

As deepfakes have become more realistic and easier to produce, injection attacks are an increasingly common method used to spoof biometrics and it is predicted that in 2023, 20 percent of successful account takeover attacks will leverage deepfakes.

Now, in response to this threat ID R&D has introduced IDLive® Face Plus to address the growing security threat posed to institutions and consumers by deepfakes and digital injection attacks.  

ID R&D’s innovation arrives at the same time as new survey data from the company shows 91 percent of businesses acknowledge that they or their customers are concerned about deepfake fraud, with 42 percent having encountered deepfake attacks. 

Furthermore, 84 percent of the same respondents express similar concern about injection attacks, with 37 percent having firsthand exposure. More than half (51 percent) state that chatbot-enabled fraud is on their radar as a credible threat. 
  
IDLive Face Plus adds detection of digital injection attacks, where fraudsters use hardware and software hacks to substitute a biometric capture with fake digital imagery. 

It is the first known product to help ensure a proper selfie capture on both desktops and mobile devices with a frictionless approach that eliminates user abandonments caused by complicated security checks.  
“ID R&D’s innovative approach to combating deepfakes will help us stay ahead of the increasing realism of digitally-created faces without burdening people with security tasks,” commented Alexey Khitrov, CEO and Co-Founder of ID R&D. “We are laser-focused on helping our customers and partners leverage biometrics to their full potential to make their digital identity solutions not only more secure, but easy to use.”  

How It Works   

Identity verification and authentication techniques that use facial recognition rely on liveness detection to ensure that a live human face is in front of the camera during biometric capture. While presentation attacks involve “presenting” non-live imagery to the camera, such as photos on paper or digital screens, injection attacks use hardware and software hacks to bypass the camera altogether. 

Without countermeasures, fraudsters can “inject” digital facial imagery into a capture device in a way that defeats certain liveness detection measures.   

ID R&D’s “frictionless first” approach to fighting fraud continues to yield innovative solutions for their partners that avoid the pitfalls of techniques that inconvenience people and cause abandonments during onboarding and login. 
IDLive Face Plus draws upon a wealth of data and expertise in computer vision and deep neural networks while advancing the mission of making security transparent to users.  

You Might Also Read: 

Airlines Think Biometrics Will Improve Passengers' Experience:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Are Quick To Use ChatGPT 
The Dark Side Of AI »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.

Rydal Group

Rydal Group

Rydal Group is an award-winning, fully pledged communications & managed IT, Security and Energy provider supporting over 1,500 businesses across the UK.