There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis. Powered by WPeMatico
Category: cloning
Auto Added by WPeMatico
academic papers, cloning, security analysis, Security technology, security tokens, side-channel attacks, Uncategorized
academic papers, cloning, Security technology, Uncategorized, voice recognition
New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper. Powered by WPeMatico
artificial intelligence, cloning, contests, Security technology, Uncategorized, voice recognition
The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.” Powered by WPeMatico
cell phones, cloning, scams, Security technology, uber, Uncategorized
A newspaper in Malaysia is reporting on a cell phone cloning scam. The scammer convinces the victim to lend them their cell phone, and the scammer quickly clones it. What’s clever about this scam is that the victim is an Uber driver and the scammer is the passenger, so the driver is naturally busy and … Read More “Phone Cloning Scam” »