#fingerprint-technology

[ follow ]
Apple
fromComputerworld
14 hours ago

Apple preps for the face race

Apple is testing four designs for smart glasses, aiming for superior aesthetics and performance compared to competitors.
#cybersecurity
Information security
fromThe Hacker News
16 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
16 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy professionals
fromFuturism
10 hours ago

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

Meta's Ray-Ban AI glasses face backlash for privacy violations and plans for facial recognition technology, prompting outrage from civil rights groups.
Privacy technologies
fromwww.bbc.com
1 day ago

Met looking at using AI to help child abuse cases

The Metropolitan Police is considering using AI to identify victims of online child sexual abuse and categorize imagery by severity.
#data-breach
Privacy professionals
fromTechCrunch
5 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Privacy professionals
fromTechCrunch
5 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
#ice
fromFuturism
2 months ago
US politics

ICE Is Scanning Civilians' Faces, Telling Them They're Being Entered Into a Terrorism Database

fromFuturism
2 months ago
US politics

ICE Is Scanning Civilians' Faces, Telling Them They're Being Entered Into a Terrorism Database

#facial-recognition
Privacy professionals
fromEngadget
11 hours ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
Privacy professionals
fromEngadget
11 hours ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
fromNature
1 week ago

How DNA forensics is transforming studies of ancient manuscripts

"It had its own biography, its own deep history. It seemed like an archaeological site between covers," recalls Stinson, who is now a medievalist at North Carolina State University in Raleigh.
History
Europe news
fromwww.theguardian.com
1 week ago

Biometric checks stalled again for cross-Channel travellers

Passengers crossing from the UK to France will not face new biometric checks despite the EU's entry-exit system deadline approaching.
fromSecurityWeek
3 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Privacy technologies
fromArs Technica
5 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
EU data protection
fromCN Traveller
1 year ago

Fingerprints, face scans and automated systems: What the EU's new travel rules mean for British travellers

The EU's Entry/Exit System will be implemented on April 10, requiring biometric data from non-EU nationals traveling to EU countries.
#identity-management
fromThe Hacker News
5 days ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
6 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
6 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#ai
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromwww.theguardian.com
5 days ago
Information security

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromwww.theguardian.com
5 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#digital-identity
UK politics
fromTheregister
3 weeks ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
Media industry
fromPsychology Today
3 weeks ago

Build Your Digital Detective Kit

Digital and media literacy skills are essential for all online users to navigate AI-generated content, partisan framing, and viral misinformation in today's information landscape.
#fbi
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Business intelligence
fromComputerWeekly.com
3 weeks ago

AI tools offer 'near-real-time' analysis of data from seized mobile phones and computers | Computer Weekly

Cellebrite's AI-powered Guardian Investigate platform enables police to rapidly analyze mobile device data, discover connections between datasets, track phone locations over time, and construct event timelines for major crime investigations.
Artificial intelligence
fromTheregister
3 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
US politics
fromInvestigative Post
4 weeks ago

How the government can track your movements

Federal law enforcement agencies purchase location data from internet advertisers and data brokers to track individuals' phones without traditional warrants or oversight.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#facial-recognition-technology
EU data protection
fromPrivacy International
1 month ago

Privacy International's response to the UK Home Office consultation on facial recognition technology

Privacy International advocates for strict safeguards on law enforcement biometric and facial recognition technology use, including prohibitions on live facial recognition, operator-initiated systems, and protest surveillance.
Privacy technologies
fromwww.bbc.com
1 month ago

Police to trial handheld facial recognition devices

London Metropolitan Police will trial handheld facial recognition devices capable of identifying people on the spot during a six-month pilot with 100 devices.
EU data protection
fromPrivacy International
1 month ago

Privacy International's response to the UK Home Office consultation on facial recognition technology

Privacy International advocates for strict safeguards on law enforcement biometric and facial recognition technology use, including prohibitions on live facial recognition, operator-initiated systems, and protest surveillance.
Privacy technologies
fromwww.bbc.com
1 month ago

Police to trial handheld facial recognition devices

London Metropolitan Police will trial handheld facial recognition devices capable of identifying people on the spot during a six-month pilot with 100 devices.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Business intelligence
fromSecuritymagazine
1 month ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
UK news
fromwww.independent.co.uk
1 month ago

Almost half of officers' DNA still missing from Met Police database

Nearly half of Metropolitan Police officers' DNA and over a fifth of their fingerprints are missing from elimination databases, potentially hindering criminal investigations and internal misconduct detection.
Privacy technologies
fromTechzine Global
1 month ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
Privacy professionals
fromTheregister
4 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
#digital-forensics
EU data protection
fromwww.bbc.com
1 month ago

Met DNA database missing nearly half of officers

The Metropolitan Police lacks DNA records for 46% of officers and fingerprint records for 20%, potentially compromising their ability to identify contamination at crime scenes and investigate internal misconduct.
Law
fromAxios
2 months ago

AI is reshaping police detective work, starting with cold cases

AI tools enable detectives to rapidly search and analyze large, multimodal evidence (calls, interviews, photos, social media) to accelerate cold and active investigations.
fromBusiness Insider
2 months ago

Amazon is shutting down Amazon One, its biometric palm-scan system

Amazon said it is discontinuing Amazon One, its palm-authentication service, across all retail businesses. Users will be able to continue to use Amazon One at supported retail locations until June 3, though some locations may phase the services out before this date. The services will remain available to patients for check-in at healthcare locations until further notice. Amazon One enables users to use their palms for actions such as paying at a store, presenting loyalty cards, and entering sports venues.
E-Commerce
Gadgets
fromThe Verge
2 months ago

Ring can verify videos now, but that might not help you with most AI fakes

Ring Verify attaches a digital security seal to Ring cloud downloads and confirms a video is unmodified since download; any edit causes verification to fail.
US politics
fromWIRED
1 month ago

DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies

DHS plans to build a unified biometric matching system combining face, fingerprint, iris, and other identifiers across multiple enforcement agencies.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Privacy professionals
fromTechRepublic
1 month ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Artificial intelligence
fromBenzinga
2 months ago

Searching Social Media By Face Instead Of Name? Here's What Face2Social Is Really Doing

Face2Social locates people across social platforms by matching faces in publicly available images, overcoming unreliable names and usernames.
#live-facial-recognition
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromNextgov.com
1 month ago

FBI is probing 'suspicious' breach into bureau networks

The FBI is investigating suspicious activities on its networks, potentially involving systems used for court-ordered wiretapping requests.
fromTechCrunch
2 months ago

Here's the tech powering ICE's deportation crackdown | TechCrunch

Cell-site simulators ICE has a technology known as cell-site simulators to snoop on cellphones. These surveillance devices, as the name suggests, are designed to appear as a cellphone tower, tricking nearby phones to connect to them. Once that happens, the law enforcement authorities who are using the cell-site simulators can locate and identify the phones in their vicinity, and potentially intercept calls, text messages, and internet traffic.
US politics
Privacy professionals
fromTheregister
1 month ago

Turns out most cybercriminals are old enough to know better

Middle-aged adults aged 35-44 comprise 37% of cybercrime arrests, with 25-44 year-olds accounting for nearly 60% of cases, contradicting the teenage hacker stereotype.
fromWIRED
2 months ago

ICE and CBP's Face-Recognition App Can't Actually Verify Who People Are

Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify people in the streets and was deployed without the scrutiny that has historically governed the rollout of technologies that impact people's privacy, according to records reviewed by WIRED. The Department of Homeland Security launched Mobile Fortify in the spring of 2025 to "determine or verify" the identities of individuals stopped or detained by DHS officers during federal operations, records show.
Privacy technologies
Privacy technologies
fromFast Company
1 month ago

Why using facial recognition on your phone could leave you vulnerable

Biometric phone unlocking is convenient but can be compelled by authorities or exploited by others, making passcodes a safer option.
fromZDNET
2 months ago

How to keep your PC encryption key safe - from Microsoft and the FBI

Microsoft's BitLocker is a security feature built into Windows that encrypts the entire hard drive. The idea is to protect your personal files from prying eyes in case your PC is ever lost or stolen. Decrypting the data requires a BitLocker recovery key, which is supposed to be safe from access by other people. Aah, but not so fast. Microsoft has confirmed to Forbes that it will provide your BitLocker recovery key if it receives a valid legal order.
Information security
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromSecuritymagazine
2 months ago

What Background Checks Miss: The Human Layer Behind Modern Screening

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.
Information security
fromTheregister
2 months ago

Tech support detective solved crime by checking the carpark

"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Information security
fromTechzine Global
1 month ago

Infostealer steals identity of AI agent OpenClaw

Security researchers have discovered a live infection in which an infostealer has stolen the configuration files of an OpenClaw AI agent. The attack was carried out through a broad file-theft routine that automatically searched for sensitive file extensions and specific folder names, including .openclaw. The malware was not specifically designed for OpenClaw; it arose by chance from capturing the operational context of the victim's AI assistant. What makes the attack particularly serious is the combination of stolen data.
Information security
fromArs Technica
2 months ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
[ Load more ]