Thursday, January 21, 17:33
Home security How dangerous is it to steal our biometric data?

How dangerous is it to steal our biometric data?

After one security breach, we definitely have the ability to change our PIN, the code our access or even some verification questions we have asked. But we can not change our face. Imagine one intruder to steal the biometrics of one user and use them for illegal activities.

biometric data

The providers of the biometric sector know that they are very protective sensitive information, so they should be very careful so that this does not happen.

The Ministry of Homeland Security of USA, has recently come into conflict with biometric data providers, who are supposed to be good at data protection, perhaps better than most site vendors.

However, despite what they claim, we know that the safety it can never be given or absolute.

And a security file that includes a user's face will also include a number of other sensitive information. You do not need to enrich this data to look convincing. This is one of the reasons why medical records have become such a common target for them hackers.

Face recognition technology is definitely in development. THE China has experimented extensively with it, using machine learning, and many other countries have entered into this game.

Singapore, for example, applies a national identity based on the face of its citizens.

Of course with our constant exposure to SOCIAL MEDIA one could say that it is not so terrible to move our face.

But if a user's biometric data, including his face, can be used to interact digitally with a growing number of businesses and organizations, it can actually ruin his real life.

For example, one could steal this information, use it for one scam or for others malicious actions and appear to have been carried out by the person from whom the information was stolen.

For the above reasons the safety of biometrics is particularly important and should be taken seriously by providers.



Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement



Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...

Microsoft: "Zero trust" protects against sophisticated hacking attacks

According to Microsoft, the techniques used by the hackers of SolarWinds, were sophisticated but common and preventable. To avoid future attacks ...