How ArmorVox Ensures Strict Data Security

How ArmorVox Ensures Strict Data Security

Blog
BLOG How ArmorVox Ensures Strict Data Security Angelo Gajo | December 4, 2019 | 5 minutes Auraya’s next-gen voice biometric engine ArmorVox was built with security and convenience in mind right from the very beginning. Ensuring that all data is stored securely and in compliance with the various regulatory requirements mandated by authorities around the world continues to be one of Auraya’s main strengths. Storing Data Through ArmorVox’s advanced machine learning algorithms, organisations implementing voice biometrics solutions retain total control over their customers’ voice data – and customer data can be stored in a manner that maintains compliance with data sovereignty rules. Importantly, no data is ever removed from the organisation’s control. This means organisations can choose where to store their Personally Identifiable Information (PII) and their voiceprint data. The…
Read More
How Auraya’s Voice Biometrics Technology Complies with Mastercard’s Six Key Principles to Data Practices

How Auraya’s Voice Biometrics Technology Complies with Mastercard’s Six Key Principles to Data Practices

Blog
BLOG How Auraya’s Voice Biometrics Technology Complies with Mastercard’s Six Key Principles to Data Practices Angelo Gajo | November 27, 2019 | 3 minutes Last month in October, Mastercard published their white paper report on ‘The Global Data Responsibility Imperative’. The paper outlined how MasterCard believes data can be “leveraged responsibly and securely” to help generate benefits for individuals and society. Mastercard outlined the six key principles to guide their data practices – security & privacy, transparency & control, accountability, integrity, innovation and social impact.The white paper states that while over 90% of individuals and business leaders share the universal importance of data privacy, only 25% of consumers firmly believe that companies could deliver these principles today. To maintain consumers’ trust, companies must actively maintain a high level of security as well…
Read More
Voice Assistant Enabled Devices Hacked with Light Commands

Voice Assistant Enabled Devices Hacked with Light Commands

Blog
BLOG Voice Assistant Enabled Devices Hacked with Light Commands Angelo Gajo | November 20, 2019 | 4 minutes Each year, consumers are using voice assistant enabled devices such as Amazon Alexa and Google Home more frequently. The ease of using your voice to issue commands such as locking and unlocking doors or searching things on the internet have provided consumers with great convenience. Although voice assistant technology continues to improve, there is still a missing component. These devices lack security. Recently, a group of academic researchers from University of Michigan and The University of Electro-Communications were able to hack several voice assistant enabled devices using laser-based audio injection attacks. They stated, “Light Commands is a vulnerability of MEMS microphones that allows attackers to remotely inject inaudible and invisible commands into…
Read More
USD 29 Million Stolen as Nikkei Falls Victim to Fraud

USD 29 Million Stolen as Nikkei Falls Victim to Fraud

Blog
BLOG USD 29 Million Stolen as Nikkei Falls Victim to Fraud Angelo Gajo | November 8, 2019 | 4 minutes On October 30, Japan’s largest financial media organization Nikkei released a press statement announcing that they were the recent victims of fraud. The incident happened in late September 2019 where an employee of their US subsidiary at Nikkei America, Inc. was fooled into transferring approximately $29 million of Nikkei America’s funds. The fraudster succeeded through a business email compromise (BEC) scam where he sent a phishing email posing as a Nikkei America management executive. According to David Barnhardt, Chief Experience at GIACT, the fraudster took it one step further by physically emulating the sound of his voice over the phone to match the management executive victim.  This incident highlights the fact that strong security…
Read More
Preventing Cyberattacks and Breach of Customers Trust

Preventing Cyberattacks and Breach of Customers Trust

Blog
BLOG Preventing Cyberattacks and Breach of Customers Trust with Voice Biometrics Angelo Gajo | October 30, 2019 | 5 minutes Organisations that breach the trust of its customers by losing control of their data in cyberattacks are now looking to find better ways to protect their data and their reputations. In a previous blog, we mentioned the Essential Eight cyberattack mitigation strategies and how multifactor authentication is a critical part of protecting organisations from the ever-increasing threat of cyberattacks. While voice biometrics is an excellent technology for an improved multifactor authentication, voice biometrics also addresses another part of the essential eights which is to “restrict administrative privileges”. The Essential Eights as listed by the Australian Cyber Security CentreAdministrative privileges are the ability to access and make changes in a system. If this privilege is…
Read More