SkipToMainContent

Norton UK Blog

« Back to Norton Blog

Biometrics – A Hacker’s Delight

by brian cody

With the recent news that some of the UK’s major banking companies will be offering their customers the chance to use fingerprint or voice authentication to access their bank accounts biometrics are very much in the spotlight. So, what exactly are biometrics and how could they possibly be as secure as they seem?

 

The term biometrics refers to a measurement or measure related to human characteristics, for example, in the case of an iris scanner, the device looks over your eye and quantifies the unique patterns within it to determine if it is in fact, you. The essence of it is this, computers have become intelligent enough to identify our unique biological characteristics, be it the nuances of our speech pattern or the faint outlines on the tips of our fingers, it can be done, quickly and efficiently.

Unfortunately nothing is ever hack proof, and biometrics are not an exception to this rule, voices can be mimicked, fingerprints can be stolen and iris’ can be imitated.
 

 

Voice Hacks
Speech Synthesis, or text to speech, involves using a small sample of recordings which would then enable a computer to imitate a human speaker to a high enough degree of accuracy that it would have positive reads on voice recognition fail safes. Voices can also be converted via software to alter their signal frequencies, speech characteristics and rhythm, and therefore manipulated to sound similar to the voice of a prospective target.

Fingerprint Theft
We leave fingerprints wherever we go, glasses, keyboards, door handles, and with the advent of 3-D printing, should someone wish to clone a fingerprint, providing they have a copy, it can be literally printed and stuck to the end of their finger, giving them access to your device and/or account.

Iris Replication
The iris of an eye is a complicated thing to imitate, let alone replicate, nonetheless it is now possible to generate a fake image from the iris code of a real person, an image which is complex and accurate enough to fool iris scanners.

Time and time again it has been proven that new technologies are not infallible, firewalls have been bypassed, passwords hacked and encryptions… unencrypted, there are already signs that indicate that biometrics are no different; as always, vigilance and security remain imperative.
 

This entry was posted on Wed May 11, 2016 filed under digital trends , online safety and online threats

The personal information you think is private may not be

From cybercriminals hacking into Wi-Fi connections and devices, your personal information could be exposed or worse, end up for sale on the dark web.

Norton 360 Deluxe and Norton 360 Premium now include a NEW feature Dark Web Monitoring§ Powered by LifeLock™

Learn More


§** Dark Web Monitoring is only available to German or UK residents. It defaults to monitoring your email address and begins immediately. Please sign in to your account to enter additional information for monitoring purposes..

No one can prevent all cybercrime or identity theft.

The Norton and LifeLock brands are part of NortonLifeLock Inc. LifeLock identity theft protection is not available in all countries.

Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

WANT MORE?

Follow us for all the latest news, tips and updates.