facebook-domain-verification=fuwm9mzck7kmzgg4ykamyctmmivgsf Hackers target fingerprints and eyes - Lokindo Info

Hackers target fingerprints and eyes


Be careful now, installing someone else's face on a video call is very possible. Yes, with the right steps this face will look challenging. The opponent will confuse to distinguish whether the person is fake or genuine.

An application launched in 2011, can even change the face shape of a photo, where the face can be moved dynamically and real in the video. And it's unfortunate that cyber criminals hunt all types of data, namely personal data, photos, videos and even the way users try with other people. These data are usually stolen from social media. Stolen data is displayed again in other places for sale to other criminals for certain profits.

Thus it can be recognized that identity has surpassed the social media account itself. Along with the development and development of technology, so does the number of components of our online identity that can be stolen or falsified.

Researchers at Stanford University provide a solution to change facial expressions on video chat. However, what needs to be discussed is discovery used to benefit from debates, win and profit illegally.


How about the vulnerability of Biometrics

This updated fingerprint is also used to enter the fitness center, as did the American fitness center, 24-Hour Fitness. Patients from the medical center at Neywork University even showed their palms replacing their insurance cards, where the Patient Safe system would carry out a blood-pattern pattern scanner that was unique to the patient's hands.

Biometrics (meaning from Greek bios which means life and metron which means measuring) is generally the study of measurable characteristics. In the world of information technology, biometrics is relevant to the technology used for physical analysis and human behavior in authentication.

Biometric identifiers are very typical, characteristics that are used to identify individuals. Two categories of identifiers Physiological characteristics are related to body shape, and include but are not limited to: fingerprints, facial recognition, DNA, palms, hand geometry, iris recognition, and odor / aroma. Related to a person's behavior, including but not limited to: typing rhythms, gait, and voice. (Wikipedia source)

What is terrible, what if the parts of our body like fingerprints and iris are also used by hackers to commit crimes?

DNA Researchers even show the possibility of forgery. Imagine if this was implemented at the crime scene. Of course we can't make new fingerprints, irises, or DNA, right?

Things will be different if we use a password to access the internet. Difficult passwords, we can easily replace them. Likewise with credit cards made from plastic. Credit Cards can also quickly replace damaged or stolen items. Apparently, it is difficult for a difficult thing to fake biometric data.

Like fingerprints or iris scans. The bad thing is that it can be done remotely. A German biometrics specialist, Jak Krissler (who is known for his action to hack Apple's TouchID), recently discovered a way to access irises and fingerprints from high-renewed photos.

Successful biometrics still has room for improvement. We need not to implement new technology, there will be a specific protection system that will request someone's personal data. For now, we agree that you will continue to use and protect your important data in the old ways such as strong passwords and two-factor authentication technology

0 Response to "Hackers target fingerprints and eyes"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel