-
http://rue89.nouvelobs.com/2014/12/28...te-digitale-cette-photo-suffit-256786
Vote 0
IRIS SECURITY SCANNER HACK DEPENDS UPON:
He told Forbes that the attack depends on a number of factors, such as-
Target’s eyes must had to be bright because of the way the infrared-based system his company bought for Krissler used light.
The image should be large and expanded.
Image of the iris with diameter of 75 pixels.
Print out should have a resolution of 1200 dpi
http://thehackernews.com/2015/03/iris-biometric-security-bypass.html?m=1
Vote 0
-
http://www.zdnet.fr/actualites/biomet...z-pas-changer-39823954.htm#xtor=RSS-1
Vote 0
-
http://www.zdnet.fr/actualites/biomet...s-ne-pourrez-pas-changer-39823954.htm
Vote 0
-
http://www.atelier.net/trends/article...asse-traditionnel-touche-t-fin_439312
Vote 0
-
http://www.knowtex.com/nav/empreintes...tre-identite-au-bout-des-doigts_42300
Vote 0
There's the rub. If someone steals your biometric identity, they can reuse it -- and you can't repudiate it. The system you log on to can (and should) require a second authentication factor, like a PIN, but once your biometric identity is stolen, that factor ceases to be a reliable factor ... forever.
http://www.infoworld.com/article/3060...metric-identification.html#tk.ifwsotd
Vote 0