HackDig : Dig high-quality web security articles for hacker

A week in security (October 14 – 20)

Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomwar
Publish At:2019-10-21 16:50 | Read:663 | Comments:0 | Tags:A week in security amazon Dark Web domestic abuse domestic a

A week in security (October 7 – 13)

Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Dom
Publish At:2019-10-14 23:20 | Read:558 | Comments:0 | Tags:A week in security amazon body cams bots chrome cybersecurit

Vimeo sued for storing faceprints of people without their say-so

byLisa VaasYou didn’t tell me that you’re collecting and storing my faceprint, you didn’t tell me why or for how long, you didn’t get my written OK to do it, and you haven’t told us how long you’re retaining our biometrics or how we can get you to nuke them, another Illinois resident has said in yet another proposed facial
Publish At:2019-09-26 06:05 | Read:693 | Comments:0 | Tags:Law & order Machine Learning Privacy AI Artificial intellige

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:3608 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Hackers demonstrated that it is too easy to bypass the Samsung S8 iris scanner.

Hackers demonstrated that it is very easy to bypass the Samsung S8 iris scanner by using a camera, a printer, and a contact lens. Security experts have once against bypassed mobile Biometric system installed on a mobile device, the Samsung S8 model. Hackers used a camera, a printer and a contact lens to bypass the iris scanner installed on the Samsung S8. So
Publish At:2017-05-24 01:50 | Read:2976 | Comments:0 | Tags:Breaking News Digital ID Hacking Mobile Security biometric a

Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo

Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their face … or their image. It looks like a film already seen, an IT giant presents a new product and hackers defeat its security measures. This time we are speaking of the Samsung Galaxy S8 and Galaxy S8 Plus, that has been presented at the Unpacked
Publish At:2017-03-31 10:25 | Read:2975 | Comments:0 | Tags:Breaking News Hacking biometric authentication facial recogn

AI Is Tapping Into Intelligent Video Analytics and Transforming Security

Surveillance cameras have become a common sight pretty much anywhere you go. From banks to retail outlets and airports to malls, cameras are placed mainly to monitor the area and check for signs of security threats. This has traditionally been done with security personnel monitoring what the cameras are sending back, often in a tightly controlled security ro
Publish At:2016-09-19 18:20 | Read:3202 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI facial

How to extract PIN from any selfie, is biometrics secure?

The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,” is biometrics secure? The German researcher Jan Krissler, aka Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image” … and much mo
Publish At:2015-10-19 04:20 | Read:2985 | Comments:0 | Tags:Breaking News Digital ID Hacking authentication biometrics f

Can Selfies Be the Next Multifactor Authentication Method?

Earlier this summer, MasterCard announced a new multifactor authentication option for its cardholders: the selfie. Customers will soon be able to incorporate a selfie and facial recognition software into their accounts. The pilot program starts in the fall and will incorporate fingerprint scanning as well as facial recognition. Users will need to download an
Publish At:2015-08-28 01:55 | Read:2890 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Facebook’s astonishing AI algorithm in Facial Recognition

Facebook developed an astonishing algorithm for facial recognition considered as the latest Artificial Intelligence step, it’s name is PIPER. Artificial Intelligence has been playing an important role to offer better and outstanding features in applications and a lot of computer giants and agencies have spent huge amount
Publish At:2015-06-25 23:50 | Read:4317 | Comments:0 | Tags:Breaking News Digital ID Security Social Networks Facebook f

Android 5.0 Lollipop Upgrades Encryption, Application Control

Google, like most technology companies in this climate, is fighting for the security and privacy of its users’ data on several fronts. With a mobile application ecosystem that invites trouble and government demands for user content and information continuing to rise, Google decided with Android 5.0, also known as Lollipop, to try to turn the tables in
Publish At:2014-10-30 22:15 | Read:2302 | Comments:0 | Tags:Cryptography Government Mobile Security Privacy Android Andr

China Develops Facial Recognition Payment System with Near-Perfect Accuracy

In an intent to move one step forward from others, China is planning to launch a facial recognition payment application with near-perfect accuracy that enables users to authorize their online transactions just by showing a picture of themselves.Chinese researchers from the Chongqing-based research institute have developed a facial recognition system that can
Publish At:2014-09-10 10:30 | Read:3562 | Comments:0 | Tags:Chinese Devices facial recognition Facial Recognition Paymen

Facial recognition software leads to arrest after 14-year manhunt

A US child sex abuse suspect hiding out in Nepal who was on the run for 14 years has been caught using facial recognition technology.According to a statement posted by the Federal Bureau of Investigation (FBI) on Tuesday, Neil Stammer, 48, of New Mexico, was caught hiding under the alias "Kevin Hodges" after a photo from 1999 was circulated on a reissued wan
Publish At:2014-08-15 09:04 | Read:3059 | Comments:0 | Tags:Featured Law & order Privacy child abuse facial recognition


Share high-quality web security related articles with you:)


Tag Cloud