spoofing

 

Optical fingerprint sensors: Q&A with Jason Chaikin of Vkansee

Last summer, fingerprint sensor firm Vkansee posted a video demonstration exposing an overwhelming vulnerability of today’s current sensory technology in…

 

UAB researchers find that automated voice imitation can spoof voice authentication systems

A research team at University of Alabama at Birmingham has discovered that voice impersonation can be applied to trick both…

 

Biometrics Institute releases top 10 vulnerability questions paper

The Biometrics Institute released its new guiding paper, “Top 10 Vulnerability Questions”, to its members and key stakeholders, which helps…

 

Alipay executive says biometrics will replace passwords within three years

At a presentation at the Digital Commerce Summit in Shanghai, Alipay VP Jason Lu predicted that biometric verification for mobile…

 

Professor says iris recognition gives smartphone users more options to protect devices

Stephanie Schuckers, a Clarkson University professor in engineering science and director for the Center for Identification Technology Research (CITeR), said…

 

Can facial recognition systems be spoofed using high quality video?

Facial authentication security methods used by banking and other apps can be easily spoofed using a high quality video of…

 

Idiap Research Institute to host tutorials on spoofing, BEAT platform

The Idiap Research Institute announced it is hosting a tutorial on spoofing and anti-spoofing during the International Conference on Biometrics,…

 

Spoofing iris recognition technology with pictures

In a recent report by Forbes, Chaos Computer Club security researcher Jan “Starbug” Krissler highlighted the vulnerabilities behind some iris-scanning…

 

German researcher reverse-engineers a fingerprint using photos

A German researcher from European hackers association Chaos Computer Club recently demonstrated a method to fool standard biometric security software…

 

TouchID fingerprint spoofing tactic can be used to gain access to iPhone 6

The same TouchID fingerprint spoofing tactic that allows fraudsters to gain access to Apple’s iPhone 5s can also be used…

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics