{"id":5679,"date":"2025-11-23T02:13:36","date_gmt":"2025-11-22T19:13:36","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=5679"},"modified":"2025-11-27T02:45:58","modified_gmt":"2025-11-26T19:45:58","slug":"canh-bao-hiem-hoa-deepfake-vuot-qua-bao-mat-sinh-trac-hoc","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2025\/11\/canh-bao-hiem-hoa-deepfake-vuot-qua-bao-mat-sinh-trac-hoc\/","title":{"rendered":"Deepfake Threat Warning: Bypassing Biometric Security"},"content":{"rendered":"<p>Deepfake technology (a combination of \u201cdeep learning\u201d and \u201cfake\u201d), powered by Artificial Intelligence (AI), is taking counterfeiting to a new level, making it harder to detect than ever. While biometrics were previously considered an absolute \u201cshield\u201d, this face and voice simulation tool has now become a serious threat to global financial security and in Vietnam.<\/p>\n\n\n\n<p>Let&#039;s go together <a href=\"http:\/\/chongluadao.vn\/blog\/en\/\">Anti-Phishing<\/a> Learn about these risks and the security vulnerabilities criminals are exploiting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Dangers of Deepfake AI<\/h2>\n\n\n\n<p>Deepfake AI technology is now capable of bypassing biometrics if the security system is not deployed well. Fraudsters use Deepfake to fake faces and voices, then use stolen social media accounts to scam and lure victims into transferring money.<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_e9180f-2c:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_e9180f-2c ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_e9180f-2c ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_e9180f-2c ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_e9180f-2c ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_e9180f-2c kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_e36f79-f3 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5679_e36f79-f3 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#ff0000;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_e36f79-f3\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_money-check-alt kt-svg-icon-list-single\"><svg viewbox=\"0 0 640 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M608 32H32C14.33 32 0 46.33 0 64v384c0 17.67 14.33 32 32 32h576c17.67 0 32-14.33 32-32V64c0-17.67-14.33-32-32-32zM176 327.88V344c0 4.42-3.58 8-8 8h-16c-4.42 0-8-3.58-8-8v-16.29c-11.29-.58-22.27-4.52-31.37-11.35-3.9-2.93-4.1-8.77-.57-12.14l11.75-11.21c2.77-2.64 6.89-2.76 10.13-.73 3.87 2.42 8.26 3.72 12.82 3.72h28.11c6.5 0 11.8-5.92 11.8-13.19 0-5.95-3.61-11.19-8.77-12.73l-45-13.5c-18.59-5.58-31.58-23.42-31.58-43.39 0-24.52 19.05-44.44 42.67-45.07V152c0-4.42 3.58-8 8-8h16c4.42 0 8 3.58 8 8v16.29c11.29.58 22.27 4.51 31.37 11.35 3.9 2.93 4.1 8.77.57 12.14l-11.75 11.21c-2.77 2.64-6.89 2.76-10.13.73-3.87-2.43-8.26-3.72-12.82-3.72h-28.11c-6.5 0-11.8 5.92-11.8 13.19 0 5.95 3.61 11.19 8.77 12.73l45 13.5c18.59 5.58 31.58 23.42 31.58 43.39 0 24.53-19.05 44.44-42.67 45.07zM416 312c0 4.42-3.58 8-8 8H296c-4.42 0-8-3.58-8-8v-16c0-4.42 3.58-8 8-8h112c4.42 0 8 3.58 8 8v16zm160 0c0 4.42-3.58 8-8 8h-80c-4.42 0-8-3.58-8-8v-16c0-4.42 3.58-8 8-8h80c4.42 0 8 3.58 8 8v16zm0-96c0 4.42-3.58 8-8 8H296c-4.42 0-8-3.58-8-8v-16c0-4.42 3.58-8 8-8h272c4.42 0 8 3.58 8 8v16z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><mark true=\"true\" class=\"kt-highlight\">Global Financial Damage:<\/mark><\/strong><\/span><\/li>\n<\/ul><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deepfake incidents have increased 10x (corresponding to an increase of more than <strong>900%<\/strong>) globally from 2023\u20132025.<\/li>\n\n\n\n<li>AI-fueled fraud will cost banks and their customers up to <strong>40 billion USD by 2027<\/strong>.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_cb2cfd-e3:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_cb2cfd-e3 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_cb2cfd-e3 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_cb2cfd-e3 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_cb2cfd-e3 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_cb2cfd-e3 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_65cdeb-6b .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5679_65cdeb-6b .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#ff0000;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_65cdeb-6b\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_warning kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M3.09 0c-.06 0-.1.04-.13.09l-2.94 6.81c-.02.05-.03.13-.03.19v.81c0 .05.04.09.09.09h6.81c.05 0 .09-.04.09-.09v-.81c0-.05-.01-.14-.03-.19l-2.94-6.81c-.02-.05-.07-.09-.13-.09h-.81zm-.09 3h1v2h-1v-2zm0 3h1v1h-1v-1z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><mark true=\"true\" class=\"kt-highlight\">Current situation in Vietnam:<\/mark><\/strong><\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>In Vietnam, the dangers of artificial intelligence and Deepfake are increasing and becoming clearer. In 2024, the Department of Information Security recorded more than <strong>220,000 reports<\/strong> about online scams and fraud, mostly related to the financial and banking sectors.<\/p>\n\n\n\n<p>Even recent gang busts have shown sophisticated methods: criminals buy account information, phone SIMs, and ask account owners to <strong>face video replay<\/strong> to serve the purpose <strong>biometric hacking of bank accounts<\/strong> for the purpose of receiving fraudulent funds and money laundering.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2752\" height=\"1536\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2025\/11\/unnamed-5.png\" alt=\"\" class=\"wp-image-5680\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Where does the security hole come from?<\/h2>\n\n\n\n<p>Many users worry about whether biometric technology is \u201coutdated\u201d when AI tools can create realistic faces to bypass biometric steps.<\/p>\n\n\n\n<p>According to the leader of the Department of Cyber Security and High-Tech Crime Prevention (Ministry of Public Security), the biometric technology systems of banks are all <strong>basic guarantee to handle security issues<\/strong>. However, Deepfake technology, with the help of AI, has surpassed conventional technical measures.<\/p>\n\n\n\n<p>Cybersecurity experts have clearly pointed out the problem lies in the implementation stage:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_f14308-33:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_f14308-33 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_f14308-33 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_f14308-33 .kb-svg-icon-wrap{color:#ff0000;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_f14308-33 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_f14308-33 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_f14308-33 kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_2a0f88-41 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_2a0f88-41\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Lack of anti-counterfeit check layer:<\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_5c80da-8f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_5c80da-8f kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Experts say AI-based spoofing technology is sophisticated enough to bypass basic authentication layers like Face ID or video calls.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_b7fded-be .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_b7fded-be kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The problem, however, is not that biometric technology is \u201coutdated,\u201d but that many banks and platforms <strong>not yet deployed enough layers of anti-counterfeiting checks<\/strong> (<em>Liveness Detection<\/em> \u2013 detect real people, and <em>deepfake detection<\/em>).<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_e648a5-24 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_e648a5-24\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Exploiting application loopholes:<\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_d44e13-ca .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_d44e13-ca kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Some identity authentication solutions today are easily fooled by still images, videos, or Deepfakes. Part of the reason is that these solutions do not meet quality standards.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_15da2b-97 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_15da2b-97 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The bad guys can <strong>exploiting app loopholes and biometric fraud<\/strong> without the need for sophisticated AI technology.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_b861ea-d1 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_b861ea-d1 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Some banking apps have been cracked due to poor security, which can then be used by criminals. <strong>a portrait photo to bypass biometrics<\/strong>.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Recommendations from experts<\/h2>\n\n\n\n<p>To deal with this criminal technology race requires careful coordinated action from both organizations and users:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_eb0093-07:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_eb0093-07 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_eb0093-07 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_eb0093-07 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_eb0093-07 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_eb0093-07 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_bb91c6-6e .kt-svg-icon-list-single{color:#198754 !important;}.kt-svg-icon-list-item-5679_bb91c6-6e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;color:#198754;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_bb91c6-6e\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_building kt-svg-icon-list-single\"><svg viewbox=\"0 0 448 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M436 480h-20V24c0-13.255-10.745-24-24-24H56C42.745 0 32 10.745 32 24v456H12c-6.627 0-12 5.373-12 12v20h448v-20c0-6.627-5.373-12-12-12zM128 76c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12V76zm0 96c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40zm52 148h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12zm76 160h-64v-84c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v84zm64-172c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40zm0-96c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40zm0-96c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12V76c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><mark true=\"true\" class=\"kt-highlight\">On the part of Banks and Organizations<\/mark><\/strong><\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Banks and credit institutions need to <strong>regularly update new developments<\/strong> to detect vulnerabilities. Most importantly:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_dc41f5-0c:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_dc41f5-0c ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_dc41f5-0c ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_dc41f5-0c ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_dc41f5-0c ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_dc41f5-0c kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_33403a-39 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_33403a-39 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Upgrade <strong>multi-layer authentication system<\/strong>, combining AI against Deepfake.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_1b47c4-64 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_1b47c4-64 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">When implementing online customer identity authentication solutions (eKYC), applications <strong>must have anti-counterfeiting function for Deepfake and still images<\/strong>.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_1cdd19-69 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_1cdd19-69 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Need to increase risk warning for users.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_491401-83:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_491401-83 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_491401-83 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_491401-83 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_491401-83 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_491401-83 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_96d74a-22 .kt-svg-icon-list-single{color:#198754 !important;}.kt-svg-icon-list-item-5679_96d74a-22 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;color:#198754;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_96d74a-22\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_person kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-1.1 0-2 1.12-2 2.5s.9 2.5 2 2.5 2-1.12 2-2.5-.9-2.5-2-2.5zm-2.09 5c-1.06.05-1.91.92-1.91 2v1h8v-1c0-1.08-.84-1.95-1.91-2-.54.61-1.28 1-2.09 1-.81 0-1.55-.39-2.09-1z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><mark true=\"true\" class=\"kt-highlight\">On the User Side<\/mark><\/strong><\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Protecting your personal information is your first line of defense.<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_5fc8a2-ab:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_5fc8a2-ab ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_5fc8a2-ab ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5679_5fc8a2-ab ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5679_5fc8a2-ab ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5679_5fc8a2-ab kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5679_26a656-7e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_26a656-7e kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Multi-channel verification:<\/strong> When receiving a request to transfer money or sensitive information via Deepfake call\/video, <strong>use another communication channel<\/strong> (known phone number, SMS text) to verify directly with that person.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_e516cc-20 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_e516cc-20 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>DO NOT SHARE:<\/strong> Do not share your password, OTP code, or identification information with any unauthenticated individuals\/organizations.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5679_da6b67-0f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5679_da6b67-0f kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Beware of strange links:<\/strong> Avoid accessing strange links of unknown origin or with unusual promotional\/offer content.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1, .wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1[data-kb-block=\"kb-adv-heading5679_8c0b98-c1\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1[data-kb-block=\"kb-adv-heading5679_8c0b98-c1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5679_8c0b98-c1[data-kb-block=\"kb-adv-heading5679_8c0b98-c1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5679_8c0b98-c1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5679_8c0b98-c1\">Remember, <strong><mark true=\"true\" class=\"kt-highlight\">Technology is only truly effective when both organizations and users act cautiously and proactively.<\/mark><\/strong>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Deepfake technology (a combination of \u201cdeep learning\u201d and \u201cfake\u201d), powered by Artificial Intelligence (AI), is taking counterfeiting to a new level, making it harder to detect than ever. If in the past, biometrics were considered an absolute \u201cshield\u201d, now, [\u2026]<span class=\"screen-reader-text\"> from Deepfake Threat Warning: Bypassing Biometric Security<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":5681,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7,10],"tags":[],"class_list":["post-5679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canh-bao-pho-bien","category-chieu-tro-lua-dao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=5679"}],"version-history":[{"count":1,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5679\/revisions"}],"predecessor-version":[{"id":5682,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5679\/revisions\/5682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/5681"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=5679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=5679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=5679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}