White Paper

Presentation Attacks, Deepfakes and Morphs

It has always been of vital importance to protect the sensitive and valuable assets of organizations and their customers from outside threats and unwanted access. In today’s world, this is even more pronounced with identity theft at an all-time high level and data breaches increasing by 17%1 since 2020 alone.

Passwords have typically formed the backbone of most access security authentication methods, but with 61% of data breaches taking place as a result of weak or stolen passwords2, organizations are looking for more secure alternatives. Biometric authentication, which takes advantage of a person’s unique physical characteristics to grant access to secure information or assets, virtually eliminates the problems associated with password-based authentication methods, providing organizations with a much more secure alternative.

With a shift from password-based to biometric authentication now taking place to improve security, however, outside hackers and malicious parties have attempted to follow suit with new attack methods designed to thwart these increased security measures and gain access fraudulently. These methods include presentation attacks, deepfakes and morphs, and their rise in frequency has resulted in heightened awareness and fear about them. Thankfully, many misconceptions exist around these methods and how much of a threat they truly pose. Organizations armed with information on each of these evolving threats can effectively protect themselves and assure customers and interested parties that their assets remain secure.

Download PDF here if you are having trouble viewing.