Hidden dangers of biometric authentication devices
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
31 articles
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
What two-factor authentication types are out there, and which ones should be preferred.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
What multi-factor authentication is, why you should use it, and what “factors” there are.
Digital-only badges, COVID tests every 72 hours, mandatory FFP2 masks, and other signs of the new normal at MWC21.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Mobile World Congress 2019 recapped: 5G, Internet of Things, ultrasonic fingerprint sensors, and artificial intelligence.
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress
Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
Mobile World Congress is always about smartphones. But if you stop looking for them and take a look from a different angle — you’ll find a lot of other stuff.
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
From the moment of the biochip injection I was repeatedly asked the same, almost Shakespearean, questions: “Once I decide to become a cyborg, how will my current routine change? What’s
Today we will relate a Kaspersky Lab implantation experiment to a comprehensible, and culturally relevant concept – the use of Jedi Force™. This might surprise you, but with the current