spoofing

Will 2019 be the Year Biometric Systems are Truly Tested by Hackers?

Will 2019 be the Year Biometric Systems are Truly Tested by Hackers?

“…2019 could be a year in which major hack attacks demonstrate which biometric security systems are truly effective and which are outdated, if Experian’s prediction is proven right.” Experian’s sixth annual Data Breach Industry Forecast finds biometrics in the crosshairs. Assessing the five major security threats expected for 2019, the report predicts that hackers will…

INTERVIEW: Kevin Alan Tussy, CEO, FaceTec, Talks Spoofing and Liveness Detection [PART ONE]

INTERVIEW: Kevin Alan Tussy, CEO, FaceTec, Talks Spoofing and Liveness Detection [PART ONE]

FaceTec has had a big year. The company marks a successful 2018 with some high-profile integrations of its AI-driven ZoOm 3D Face Login authentication solution, which utilizes standard 2D smart device cameras and webcams to create 3D FaceMaps with its patented ZoOm motion technology. ZoOm is now securing user logins on five continents in several industries, including…

Fake ‘Master Key’ Fingerprints Can Fool Systems Over 20% of the Time: Researchers

Fake ‘Master Key’ Fingerprints Can Fool Systems Over 20% of the Time: Researchers

“The system was developed using a generative adversarial network, a machine learning system in which one deep neural network is pitted against another, allowing the spoofing system to refine its efforts over time until it had established its highly effective DeepMasterPrints.” Researchers at New York University have developed a neural network system that they say…

Here’s How Biometric Authentication Will Be Stronger on Android P

Here’s How Biometric Authentication Will Be Stronger on Android P

Google’s developers are going to make biometric authentication stronger on Android P, the next iteration of the company’s popular mobile operating system; and in a new post on the company’s blog, Security Engineer Vishwath Mohan explains how. Essentially, Android’s managers are looking to move beyond FAR and FRR, the standard measures of an authentication mechanism’s…

BRIEF: A Big Week In Mobile Biometrics

BRIEF: A Big Week In Mobile Biometrics

It has been a particularly busy week for mobile biometrics, with industry news running the gamut from security fiascos to pioneering innovations. In some ways, the week has marked the culmination of some of the biggest trends that have been underway over the past year – the rise of facial recognition, the ongoing proliferation of…

Video Shows OnePlus 6 Facial Recognition Spoofed by Photo

Video Shows OnePlus 6 Facial Recognition Spoofed by Photo

“The spoofing also highlights the importance of liveness detection, which can involve a number of different methods of making sure that it’s the actual user in front of the phone.” OnePlus’s new flagship smartphone can be unlocked with a photo of the user’s face, and it doesn’t even need to be in color, suggests a…

iBeta Adds Anti-Spoofing Evaluations to Quality Assurance Testing

iBeta Adds Anti-Spoofing Evaluations to Quality Assurance Testing

“As biometric security has become more commonplace through consumer devices like fingerprint scanning smartphones, concerns about spoofing attacks have been on the rise” Denver-based quality assurance lab iBeta has officially expanded its biometric security testing capabilities to assess resistance to spoofing attempts. Or, to put it in more technical terms, the lab will now assess…

Researchers Warn Speaker Recognition Vulnerable to Effective Mimics

Researchers Warn Speaker Recognition Vulnerable to Effective Mimics

Researchers at the University of Eastern Finland are warning about the vulnerability of voice recognition systems to effective mimics. Their findings are outlined in a new study published in Elsevier entitled, “Acoustical and perceptual study of voice disguise by age modification in speaker verification”. Essentially, the researchers sought to see if they could fool automated…

iPhone X Face ID Spoofed By Composite Mask

iPhone X Face ID Spoofed By Composite Mask

A team of hackers say that the iPhone X’s flagship facial recognition system can be hacked. All you need is about $150, a 3D scanner, a 3D printer, makeup, some paper, and unrestrained access to the victim’s face. Vietnam-based Bkav say they used these materials to put together a composite mask that was then used…

MSU Biometrics Expert Designs Fake Finger for Sensor Spoofing

MSU Biometrics Expert Designs Fake Finger for Sensor Spoofing

Renowned biometrics expert Dr. Anil Jain is once again seeking to test the boundaries of biometric fingerprint recognition with a new experimental device. In collaboration with doctoral student Joshua Engelsma, the Michigan State University professor has developed a fake finger design to spoof fingerprint readers. As Jain explained to MSU Today, the device “mimics a…

Consumer Biometrics Month: Why Average Users Shouldn’t Worry About Spoofing

Consumer Biometrics Month: Why Average Users Shouldn’t Worry About Spoofing

A recent HSBC report cited technophobia as a key obstacle in consumer adoption of new technologies such as biometrics, and while biometry is continuing to proliferate mobile devices to the point of near-ubiquity, there is little wonder why. Successful presentation attacks make major headlines in national and international news outlets every time a hacking group…

HSBC Defends Voice Authentication System After Spoof Report

HSBC Defends Voice Authentication System After Spoof Report

A BBC reporter is drawing attention to the vulnerabilities of HSBC’s voice authentication system for customer calls, asserting that his non-identical twin brother was able to gain access to his account by mimicking his voice. Commenting on the matter, the reporter noted that the “really alarming” aspect of the fraud is that the system allowed his…

Researchers Test ‘MasterPrint’ Hypothesis

Researchers Test ‘MasterPrint’ Hypothesis

A joint team of researchers from New York University’s Tandon School of Engineering and Michigan State University’s College of Engineering are warning that the fingerprint biometrics now commonly used for mobile authentication may not be as unique as many believe. Because smartphones use only partial fingerprints and often allow for multiple users’ fingerprint data to…

NII Researcher Warns That Fingerprints Can Be Stolen from Photos

NII Researcher Warns That Fingerprints Can Be Stolen from Photos

A researcher at Japan’s National Institute of Informatics (NII) is warning that fingerprint recognition technology is now sophisticated enough that hackers could copy the patterns from photos of people giving the peace sign. In fact, Isao Echizen says he did just that, capturing fingerprint data from an individual standing only nine feet away. The claim…

Here’s What To Expect From Samsung SDS America’s Big Biometrics Webinar

Here’s What To Expect From Samsung SDS America’s Big Biometrics Webinar

Financial services is the big use case for biometrics right now, and on November 2, 2016, Samsung SDS America, in concert with Mobile ID World, will be presenting a webinar event aimed at addressing lingering concerns regarding strong authentication in today’s financial markets: FinServ in the New Age of Identity: Addressing Your Biometrics Concerns. – Register Now…

INTERVIEW: Samsung SDS America’s Approach to Biometrics

INTERVIEW: Samsung SDS America’s Approach to Biometrics

FindBiometrics President Peter O’Neill recently interviewed  Richard Lobovsky, VP of Financial Services Solutions, and Shankar Saibabu, Director of Financial Services Solutions Architecture, Samsung SDS America, Inc. The conversation is an in depth examination of Samsung SDS America’s approach to biometrics. It begins with a discussion of the company’s recently launched FIDO Certified biometric authentication solution. It goes on to…

Security Researchers Spoof Faces With 3D Models Built From Social Media Pics

Security Researchers Spoof Faces With 3D Models Built From Social Media Pics

Your face can be replicated in a virtual model and used for biometric authentication, suggests new research from a University of North Carolina team. As Wired reports, the researchers showed how this can be done at the recent Usenix security conference. They looked up digital images of volunteers on social networks such as Facebook and…

Biometrics Expert Helps Police Spoof Fingerprints for Smartphone Access

Biometrics Expert Helps Police Spoof Fingerprints for Smartphone Access

Police in the US have successfully spoofed a murder victim’s fingerprints in order to gain access to his smartphone. It’s result of a collaboration recently initiated with Michigan State University biometrics researcher Dr. Anil Jain, one of the world’s most well-respected biometrics experts. Police believed that the murder victim’s Samsung Galaxy S6 may contain clues…

Pages
  • 1
  • 2