People are now conditioned to believe that fingerprints are unique and are much safer than passwords. In many ways, this is true. But what is less well-known is a notebook manufacturer’s choice in fingerprint sensors can potentially lead to the theft of your fingerprint image, giving the thief the master-key to all your devices and your company enterprise.
There are two types of fingerprint sensors in the notebook market today: those... Read more
Many of us remember those stretch-of-the-imagination science-fiction movies and TV shows in which people were screened by facial and iris scans to access otherwise-off-limits locations. While these futuristic depictions of technology have found success in some government and commercial applications, its use for consumers is still in its infancy.
By contrast, fingerprint authentication has been readily adopted on consumer flagship... Read more
One of the many advances being made in smartphones and tablets is the progression to a “whole-device” display. Some models already have full-width displays with little or no bezel or ink area on the sides. The next step will be a nearly full-height display; “nearly” that is, because while the home button will be gone, there will still need to be a front-facing camera.
The use of biometrics for user identity has become increasingly... Read more
Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more
Wealth attracts criminals like honey attracts bears. It should come as no surprise, then, that the wealth of information and services accessed through fingerprint authentication would be “honey” to the bad guys out there, intent on using such access for illicit purposes. Among their methods is spoofing – the act of fabricating fingerprints for use on... Read more