According to a report by Rappler, the Philippines’ Commission on Elections (Comelec) is facing another data breach investigation after one of its computers containing biometric data of the country’s 55 million voters was stolen last month. The incident follows the National Privacy Commission (NPC) recent ruling that the Comelec should be held liable for the March 2016 database breach with Comelec chairman J. Andres D. Bautista set to face criminal charges for the negligence. Bautista has assured the public that
A database has been breached and biometric data is “in the wild”. Conceivably, this stolen data could be used by the perpetrators to hijack a user’s identity and gain fraudulent access to restricted areas, bank accounts, healthcare records — wherever biometric authentication is securing valuable assets. What can be done to render biometric data useless to any would-be impostor? The white paper “Protecting Against Criminal Use of Stolen Biometric Data” discusses numerous tactics and best practices that should be considered
Some retail stores in Kirkwood, Missouri are using facial recognition software supplied by Blue Line Technology to prevent shoplifting, according to a report by Fox2Now. “If we recognize them as a suspicious character, we follow them around and we sort of hound them out of the store,” said Christopher Thau, the owner of a store called Christopher’s. “I hate to put it that way but that’s what we do.” Since shoplifters often move from one store to the next, many
Biometrics could be the ideal tool to protect private consumer data in the cloud. In the wake of an iCloud security flaw that allowed the theft of nude photos last weekend of Jennifer Lawrence, Kate Upton, Kirsten Dunst and several other female actresses and musicians, Apple should consider integrating biometric authentication into its next iteration of iCloud security. Authentication is the process of validating users, ensuring that they are who they say they are. Solutions range from traditional alphanumeric username
Users of any computerized system should remember that there is always the potential that a technology-based system can be hacked. Hackers increasingly are able to compromise cars, smartphones and medical devices, due to the ubiquity of wireless devices and open computing development environments. Avi Rubin, a professor of computer science and director of the Health and Medical Security Lab at Johns Hopkins University, warned of the dangers of an increasingly “hack-able” world during a TED talk a couple years ago.
The medical field has been using biometrics for its patients. Now, however, Medbox Inc. is developing a biometric system to secure prescription medicines. The health industry has garnered losses amounting to more than $100 million each year because of stolen prescription drugs. To counter that, Medbox Inc. has developed a biometric kiosk that only makes medication available to authorized individuals. In addition, the kiosk records all drug retrievals, thereby creating a method to track individuals who receive the medicine, the