• Latest
  • All
  • News
  • Business

Biometric Security – Little Known Exploits

Aug 16, 2018
How to create multiple email filters in ProtonMail free plan

How to create multiple email filters in ProtonMail free plan

May 14, 2022
6 Benefits of Outsourcing Your Business’s Design and Development Projects

6 Benefits of Outsourcing Your Business’s Design and Development Projects

May 13, 2022
How IoT, Autonomous Cars and Smart Cities Will Develop

How IoT, Autonomous Cars and Smart Cities Will Develop

May 10, 2022
Apple Virus Guide: How to Get Rid of a Virus on Your iPhone

How to transfer photos from iPhone to Computer

May 10, 2022
How Does Data Analytics Improve Security Systems?

How Does Data Analytics Improve Security Systems?

May 4, 2022
Discovery Phase For Software Development: How Much Does It Cost?

Discovery Phase For Software Development: How Much Does It Cost?

May 4, 2022
Smart Contract Programming Languages in Blockchain

Smart Contract Programming Languages in Blockchain

May 4, 2022
How Does an Elasticsearch Application Work?

How Does an Elasticsearch Application Work?

May 3, 2022
How To Take Care of Files on Your Computer

The Many Benefits That External IT Support Provides For All Businesses.

May 2, 2022
In Order To Avoid Business Downtime – You Require IT Consulting

In Order To Avoid Business Downtime – You Require IT Consulting

May 2, 2022
Why is LEI useful?

What Are Managed IT Services and How Can They Help My Business?

May 2, 2022
6 Different Types of Social Media Platforms

6 Different Types of Social Media Platforms

Apr 28, 2022
  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy
Sunday, May 15, 2022
Tech Featured
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips
No Result
View All Result
Tech Featured
No Result
View All Result
Home News

Biometric Security – Little Known Exploits

by techfeatured
Aug 16, 2018
in News
0
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

There's a whole lot of hype surrounding biometric technology, and the indisputable convenience that it provides. These days it can be found on everything from laptop computers to bank vaults, offering speedy entry and a unique level of security.

The technology employ scanners, often linked to security equipment, to recognize biological patterns of users attempting to gain access. By this logic, if a man wanted to bypass a biometric fingerprint scanner, his fingerprint would have to match that of the correct pattern stored in the system. In other words, he has to prove he is who he claims to be.

Fingerprint and facial recognition are popular for a reason; they works well enough to satisfy their general market, and it's hard to deny their charming appeal; reminiscent of 007 on some levels. While the technology has come very far and improves on accuracy and reliability every day, it's far from perfect. This alluring class of security can be bypassed with a clever bit of ingenuity.

During an episode of Discovery Channel's Mythbusters, the shows hosts, Adam Savage and Jamie Hyneman set out to expose whether or not biometric scanners can be exploited for false acceptance. Much to the surprise of most of their viewers, as well as the Mythbusters themselves, they succeeded in their exploitation with relative ease.

Because many more advanced biometric scanner models utilize temperature and pulse reading instruments to verify the authenticity of the scan, their first attempt was rather complicated. They placed a carefully formed ballistics gel mold, crafted from the scanner owner's fingerprint, on a latex glove, licked it to simulate sweat, and opened the lock with a successful scan. By the time they had finished their testing, they proved it possible to bypass a fingerprint scanning lock with nothing but a photocopy of the owner's fingerprint!

Facial recognition is generally accepted as more advanced, and thus a more reliable measure of security than its fingerprint reading counterpart. Unfortunately, this realm of the biometrics field appears to also have its work cut out for it. At a recent Black Hat conference, a security vulnerability research team, lead by Nguyen Minh Duc, effectively shocked their audience by showing how a facial recognition scanner could have fooled using nothing but a printed picture of the owner's face.

Biometric technology certainly has incredible potential, and as it currently stands, it's an effective means of adding multiple layers of security to an advanced system. That said, however, this illustration of its loopholes point out how far the field must go to absolutely sew up its imperfections.

Tags: BiometricExploitssecurity
ShareTweet

For any queries, you can reach us at [email protected]

Latest Posts

  • How to create multiple email filters in ProtonMail free plan
  • 6 Benefits of Outsourcing Your Business’s Design and Development Projects
  • How IoT, Autonomous Cars and Smart Cities Will Develop
  • How to transfer photos from iPhone to Computer
  • How Does Data Analytics Improve Security Systems?
Tech Featured

© 2022. All Rights Reserved.

Navigate Site

  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips

© 2022. All Rights Reserved.