Biometricsecurity

12.28.18
Hackers defeat vein authentication by making a fake hand
12.28.18

Hackers defeat vein authentication by making a fake hand

Security researchers used 2,500 pictures of a hand to create an exact model out of wax.

View
01.31.18
Bournemouth bars have begun accepting a smartphone app as ID
01.31.18

Bournemouth bars have begun accepting a smartphone app as ID

Yoti means you can leave your passport and driving licence at home.

View
A newsletter a day keeps the FOMO at bay.
Just enter your email and we'll take care of the rest:
Now available on your smart speaker and wherever you get your podcasts: Apple Podcasts  |  Spotify  |  Google Play  |  iHeart Radio
10.18.17
Apple responds to Sen. Al Franken’s Face ID concerns in letter
10.18.17

Apple responds to Sen. Al Franken’s Face ID concerns in letter

It's dished more details on encryption, data-sharing, and its neural network.

View
09.14.17
Apple questioned about Face ID security by the US Senate
09.14.17

Apple questioned about Face ID security by the US Senate

Senator Al Franken has written Tim Cook a letter with his concerns.

View
07.23.12
BioSoles know you're you within three steps, deter shoe bandits
07.23.12

BioSoles know you're you within three steps, deter shoe bandits

It's no secret that everyone has a unique swagger -- so much so it can be used for identification....

View
02.20.12
Fujitsu's super-slim, super-powerful phones could come to Europe
02.20.12

Fujitsu's super-slim, super-powerful phones could come to Europe

We've been enviously eyeing Fujitsu's super-thin, super-powerful phones for a very long while. At...

View
10.13.10
Biometric ear scanning developed as a comical alternative to iris, fingerprint scans
10.13.10

Biometric ear scanning developed as a comical alternative to iris, fingerprint scans

The field of biometrics is a never-ending spectacle of palm readers, fingerprint and iris scanners,...

View
07.15.10
Aegis Bio grows to 640GB of fingerprint-protected storage
07.15.10

Aegis Bio grows to 640GB of fingerprint-protected storage

Apricorn specializes in the fine art of making people believe their data is worth stealing and charg...

View
02.20.10
Typing 'cadence' used to identify authorized database users, lock everyone else out
02.20.10

Typing 'cadence' used to identify authorized database users, lock everyone else out

We'll admit to having shared a few login credentials amongst friends here and there in our younger...

View

Sponsored Links