Blog Posts Tagged with "Biometrics"
August 07, 2012 Added by:Electronic Frontier Foundation
The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...
August 02, 2012 Added by:Electronic Frontier Foundation
Among all the various biometric traits that can be measured for machine identification, the iris is generally regarded as being the most reliable. Yet Galbally’s team of researchers has shown that even the method traditionally presumed to be foolproof is actually quite susceptible to being hacked...
July 12, 2012 Added by:Headlines
The document is the next step toward updating Federal Information Processing Standard (FIPS) 201. Among its requirements are that all PIV cards contain an integrated circuit chip, a personal identification number and protected biometric data—a printed photograph and two electronically stored fingerprints...
May 14, 2012 Added by:Electronic Frontier Foundation
In India, a massive effort is underway to collect biometric identity information for each of the country’s 1.2 billion people. The incredible plan has stirred controversy in India and beyond, raising serious concerns about the security of individuals’ personal data...
May 04, 2012 Added by:Headlines
Researchers at the NIST have developed a new protocol for communicating with biometric sensors over wired and wireless networks, called WS-Biometric Devices (WS-BD), allows desktops, laptops, tablets and smartphones to access sensors that capture biometric data using web services...
August 15, 2011 Added by:Headlines
Unlike other authentication systems, the breach of biometric data is difficult to remedy. Users can not simply alter the authenticating data used to access secure networks, as one would with usernames and passwords - the data is permanently and uniquely identifiable to the individual user...
May 02, 2011 Added by:Brent Huston
Adding something you are to something you have and something you know makes it much more difficult to spoof identity, but still doesn’t render it impossible. And imagine the inconvenience. Seems like way too much just to protect some financial data or health information, huh?
March 03, 2011 Added by:Ben Rothke
Vascular pattern recognition is one of many available biometric authentication technologies. VPR, like many biometric technologies, has the potential to increase security and protect privacy. But that can only be done if the biometric solution is properly deployed...
February 02, 2011 Added by:Robert Siciliano
In the US, the government has attempted to standardize the identification process once and for all with the REAL ID Act, which will likely be squashed under Homeland Security Secretary Janet Napolitano, who has proposed a repeal of the act...
November 18, 2010 Added by:Guy Huntington
There has been a significant increase in the use of biometrics for authentication. It is becoming more commonly used to purchase groceries, to gain access to premises, passing through passport control and for logging on to computers. There are some dangers with this trend...
May 02, 2010 Added by:K.S. Abhiraj
This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...
April 16, 2010 Added by:Aaron Simmons
New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics. So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS). Each one of these has its pro’s ...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013