Biometrics galore

April 2014 News & Events

Before I get onto this month’s editor’s note, have you received your CCTV Handbook 2014 with Hi-Tech Security Solutions? You should have. It’s awesome and you shouldn’t miss it. If your Handbook was not bundled with this issue, please contact [email protected] to get a copy.

Biometrics and specifically fingerprint biometrics have been with us for a long time and have mostly been ignored as a security mechanism in the mass market. The reasons for this are many, including ignorance, misinformation, and the belief that today’s biometrics are still the same devices of years ago that could be fooled by a photocopy of a fingerprint.

Other, more reasonable reasons include the difficulty in reading some people’s fingerprints and the difficulty in matching prints in certain conditions. There are many other reasons too. I’m currently doing a dissertation on the potential of using biometrics to reduce the opportunities for certain types of cybercrime and it is amazing to see people’s opinions of biometrics as well as some of the studies done on the topic.

A while ago Apple released a new iPhone, which was pretty much like any other iPhone except for a fingerprint reader in the home button. I’ve written on this and the hysterics which followed before, but safe to say someone quickly revealed that they had hacked the Apple reader – which is not too difficult if you have a huge budget and a nice clear copy of the person’s fingerprint to work with.

The latest news is that Samsung’s new phone will also have a fingerprint reader – one that you slide your finger over – much like many laptops have today. I’m told these are less secure than the readers that scan your whole finger at once, but I’ll leave that to the experts.

The difference between Apple’s release and Samsung’s is that you can only access your App Store with your biometric iPhone, whereas Samsung delivered the news of its new biometric model (the S5) along with news of a deal with PayPal. This deal will allow you to pay for goods online via swiping your finger over the reader. How cool is that!

I believe this is the time for biometrics to come into its own and change the way we authenticate ourselves in various areas of our lives. The password is really, finally on the way out. I have no doubt, however, that it’s going to fight to the bitter end, undoubtedly assisted by those still maintaining passwords are easy and free. (See an RSA white paper titled 'Are Passwords Really Free?' if you want to see what it costs to keep your business on passwords.)

But it may not be a total win for biometrics. We have a short article on the FIDO Alliance (Fast IDentity Online) this month and its awesome plan to make authenticating ourselves online far more secure, and it allows other forms of authentication as well (not passwords, they’re so 1985). If you’re interested in identity management or authentication in any sphere of business, you should take a look (fidoalliance.org). As a matter of interest, FIDO software is behind the Samsung/PayPal deal.

However, back to this issue. You’ll notice that we have quite a healthy focus on data security and securing your infrastructure this month. Is it too much? Too little? Irrelevant? Too non-technical? Send your comments and criticisms of this issue and the CCTV Handbook 2014 to [email protected]

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
Mobile credentials taking off
Technews Publishing SMART Security Solutions Paxton Secutel Technologies Access Control & Identity Management
Mobile smartphone access is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...