How flashing a peace sign could get you hacked

A pose is struck, the peace sign flashed, and a photo is snapped. It seems innocuous, but a team of Japanese researchers warns that flashing the familiar two-finger gesture could get you hacked. Read how a innocuous peace sign photograph could get you hacked on News Week.

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond the […]

Biometrics and the Internet of Things: Carving a New Future

Read Ruchika Kulkarni explain how biometrics and Internet of Things are carving a new future in cyber and physical security on Read It Quik: Biometrics is a security mechanism that falls back upon knowing “what we are” by identifying a person based on unique physical characteristics such as fingerprints, iris, face etc. It has found […]

Executive Viewpoint 2017 Prediction: Jumio – Biometrics, Regulations and the Future of Security

2016 was a year of major change for security in financial technology. Banks and other financial institutions were made well aware of the shortcomings of password protection and even of multi-factor authentication. The Wells Fargo scandal exemplified the need for higher security standards, resulting in $190 million in damages from the two million phony accounts […]

What CISOs Need To Know Before Adopting Biometrics

Read Todd Thibodeaux explain what CISO’s need to know before implementing biometrics in their organisation on Dark Reading : Businesses have long sought a better way to balance end-user security and usability, and it’s clear the password-only model needs to change. Faced with employees who are unwilling to remember more than a handful of unique passwords […]

Why Biometric Technology Is Still Not the Absolute Replacement for Passwords

Read why Avinash Pudota says that biometric is not the ultimate technology to replace passwords on Tech Featured : A good security token is the one that distinctively corresponds to you and which nobody could know, guess or copy. This is the reason why security experts suggest us to use long and random passwords for […]

Why mobile two-factor authentication is better than biometrics

Read Craig Mathias explain why two-factor authentication is better than biometrics on Tech Target : Teamed with physical security, integrity management, encryption and authorization, authentication is one of the key elements in any good security strategy. Traditional authentication methods are based on a single element or factor. For example, I can say “my name is Craig.” Yes, […]

California to mull biometric standards in data breach law

A California lawmaker has proposed that a standard be established for businesses to protect personal consumer information including location and biometric data. Assemblyman Mike Gatto (D) wants to revive an old privacy bill, adding new standards for businesses to use reasonable security procedures and practices if they hold or maintain personal information, reports Bloomberg Law. […]

Developing a Security Strategy: Leveraging Biometrics, Video Resolution and Analytics

Read Mark Bonde’s article on how firms could leverage biometrics, video resolution and analytics to provide better physical security to their campus on Campus Security : Over the past decade, the physical security technology landscape has evolved rapidly as the IT industry has developed products with greater computing capability and at lower costs. This has […]

As Biometric Scanning Use Grows, So Does Security Risk

Without you necessarily realizing it, your unique attributes — or “biometrics” — are being used to verify your identity. Every time you unlock your smartphone, use a fingerprint scanner at the airport, or upload a photo with facial recognition to Facebook, your physical attributes are scanned and scrutinized against a template. Read how hackers are managing […]