Yet Another Biometric: Bioacoustic Signatures

Sound waves through the body are unique enough to be a biometric: "Modeling allowed us to infer what structures or material features of the human body actually differentiated people," explains Joo Yong Sim, one of the ETRI researchers who conducted the study. "For example, we could see how the structure, size, and weight of the bones, as well as the… Continue reading Yet Another Biometric: Bioacoustic Signatures

When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

Knowing who your users are today is more important than ever. This explains, in part, why integrating biometric usage into identity and access management (IAM) appears appealing. Throw in some artificial intelligence (AI) to help manage all these data points, and the future of biometrics looks pretty wild. The appeal of using biometrics for identity […]

The post When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics appeared first on Security Intelligence.

Continue reading When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

“Secure in your thoughts” – malware memories and brain passwords in the Stroke of Genius podcast

I’m in the latest episode of the “Stroke of Genius” podcast, which looks at passwords and how researchers are exploring ways to use brain patterns as a way to unlock devices.
I’m on hand to describe the workings of some notoriou… Continue reading “Secure in your thoughts” – malware memories and brain passwords in the Stroke of Genius podcast

“Secure in your thoughts” – malware memories and brain passwords in the Stroke of Genius podcast

I’m in the latest episode of the “Stroke of Genius” podcast, which looks at passwords and how researchers are exploring ways to use brain patterns as a way to unlock devices.
I’m on hand to describe the workings of some notoriou… Continue reading “Secure in your thoughts” – malware memories and brain passwords in the Stroke of Genius podcast

Biometrics: Preparing for a Passwordless Future

Forward-looking organizations are turning to biometrics to prepare for a passwordless future In today’s digital world, people can accomplish anything they need to online, from banking to shopping. Yet, the popular authentication for this online activi… Continue reading Biometrics: Preparing for a Passwordless Future

How can we eliminate passwords given the problems with biometric authentication?

I’ve read articles suggesting that passwords will eventually go the way of the dinosaur only to be replaced by biometrics, PINs, and other methods of authentication. This piece claims that Microsoft, Google, and Apple are decreasing passwo… Continue reading How can we eliminate passwords given the problems with biometric authentication?

Are fingerprints scans susceptible to either dictionary attack or pass-the-hash-attack? [closed]

If a user scan his fingerprint, and this fingerprint (let’s say a [x,y] image) is hashed and then sent to a server that stores this hash, is the fingerprint scan susceptible to either dictionary attack or pass-the-hash attack?

Continue reading Are fingerprints scans susceptible to either dictionary attack or pass-the-hash-attack? [closed]

Does mobile biometric authentication count as Knowledge, Possession, or Inherence authentication

Apple claims in this year’s WWDC that Face ID and Touch ID count for both Possession and Inherence identity factors, because they are using Biometrics (Inherence) to access the secure element on your phone (Possession) to retrieve a unique… Continue reading Does mobile biometric authentication count as Knowledge, Possession, or Inherence authentication