#vein-recognition

[ follow ]
Apple
fromComputerworld
1 day ago

Apple preps for the face race

Apple is testing four designs for smart glasses, aiming for superior aesthetics and performance compared to competitors.
#facial-recognition
Privacy professionals
fromEngadget
1 day ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
fromTechCrunch
1 month ago
Privacy professionals

Meta plans to add facial recognition to its smart glasses, report claims | TechCrunch

Privacy professionals
fromEngadget
1 day ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
fromTechCrunch
1 month ago
Privacy professionals

Meta plans to add facial recognition to its smart glasses, report claims | TechCrunch

#meta
Privacy technologies
fromWIRED
1 day ago

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

Over 70 advocacy organizations demand Meta halt face recognition plans for smart glasses due to privacy and safety concerns.
Privacy technologies
fromWIRED
1 day ago

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

Over 70 advocacy organizations demand Meta halt face recognition plans for smart glasses due to privacy and safety concerns.
#identity-management
fromThe Hacker News
6 days ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#ai-fraud
Information security
fromComputerworld
2 weeks ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromComputerworld
2 weeks ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Europe news
fromwww.theguardian.com
1 week ago

Biometric checks stalled again for cross-Channel travellers

Passengers crossing from the UK to France will not face new biometric checks despite the EU's entry-exit system deadline approaching.
E-Commerce
fromFast Company
1 week ago

Visa says AI could start making purchases for you. Not everyone wants that, but here's how close we are

AI is influencing consumer purchases and acting on behalf of shoppers in commerce.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#ai
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromMedium
3 weeks ago
Psychology

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Psychology
fromMedium
3 weeks ago

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
Privacy professionals
fromSilicon Canals
1 week ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromBanray
1 week ago

BanRay.eu - Your face is not inventory

Meta's camera-equipped glasses compromise privacy by recording individuals without consent, turning them into data for AI training.
Healthcare
fromNextgov.com
3 weeks ago

CMS seeks to expand tech-driven fight against Medicaid fraud

CMS uses innovative technologies and AI-driven fraud detection to prevent improper payments, saving over $2 billion through its Fraud Defense Operations Center launched in March 2025.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Mental health
fromInfoQ
1 month ago

From Symptom Checkers to Smart Chatbots: The Role of AI in Virtual Care

Online health searches create two critical problems: unnecessary emergency visits for minor conditions and missed recognition of genuine medical emergencies, both causing harm and inefficiency.
#generative-ai
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromTNW | Health-Tech
1 month ago

Cedars-Sinai's AI beats specialist models at reading heart scam

EchoPrime, a video-based vision-language model, analyses echocardiogram footage and generates a written report of cardiac form and function. Its findings were published in Nature (volume 650, pages 970-977) in February 2026, under the title 'Comprehensive echocardiogram evaluation with view primed vision language AI.'
Medicine
#facial-recognition-technology
Privacy technologies
fromwww.bbc.com
1 month ago

Police to trial handheld facial recognition devices

London Metropolitan Police will trial handheld facial recognition devices capable of identifying people on the spot during a six-month pilot with 100 devices.
Privacy technologies
fromwww.bbc.com
1 month ago

Police to trial handheld facial recognition devices

London Metropolitan Police will trial handheld facial recognition devices capable of identifying people on the spot during a six-month pilot with 100 devices.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
#cybersecurity
Artificial intelligence
fromTheregister
4 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Business intelligence
fromBusiness Matters
1 month ago

The Growing Importance of Digital Identity in the Financial System

Clear business identity through standardized digital identifiers like LEI reduces financial risk, enables faster compliance checks, and supports trust across international commerce.
Business intelligence
fromSecuritymagazine
1 month ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
Privacy technologies
fromTechzine Global
1 month ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
Healthcare
fromAxios
1 month ago

The era of Doctor AI is already here

Millions use ChatGPT for health advice daily despite clinical deployment debates, creating a reality where AI is already widely used for direct-to-consumer medical guidance outside formal healthcare systems.
Information security
fromSecurityWeek
4 weeks ago

Robotic Surgery Giant Intuitive Discloses Cyberattack

Intuitive Surgical suffered a targeted phishing cyberattack resulting in unauthorized access to internal business applications and customer data, but robotic systems and manufacturing operations remained unaffected.
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Information security
fromTheregister
1 month ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
#ring-verify
Information security
fromwww.theguardian.com
1 month ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
fromSnowBrains
2 months ago

Ski Resorts are Turning to A.I. to Prevent Ticket Fraud - SnowBrains

Using A.I. for detecting ticket fraud follows the recent trend of A.I. making its way into snow sports. Recently, competition organizations like X Games and the International Ski and Snowboard Federation (FIS) have experimented with using A.I. to assist with judging contests. Brands are also using A.I. to assist with creating graphics for their skis and snowboards. And it does not look like the A.I. train is slowing down any time soon.
Snowboarding
Medicine
fromMail Online
1 month ago

'Smart T-shirt' could detect hidden heart conditions and save lives

A sensor-stitched smart T-shirt worn up to a week can detect inherited heart conditions and use AI analysis to flag risks to doctors.
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
fromTechCrunch
2 months ago

Here's the tech powering ICE's deportation crackdown | TechCrunch

Cell-site simulators ICE has a technology known as cell-site simulators to snoop on cellphones. These surveillance devices, as the name suggests, are designed to appear as a cellphone tower, tricking nearby phones to connect to them. Once that happens, the law enforcement authorities who are using the cell-site simulators can locate and identify the phones in their vicinity, and potentially intercept calls, text messages, and internet traffic.
US politics
Information security
fromSecuritymagazine
1 month ago

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
US politics
fromWIRED
2 months ago

CBP Signs Clearview AI Deal to Use Face Recognition for 'Tactical Targeting'

U.S. Customs and Border Protection will pay $225,000 for a year of Clearview AI face-recognition access to billions of scraped images for intelligence and targeting.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Artificial intelligence
fromBenzinga
2 months ago

Searching Social Media By Face Instead Of Name? Here's What Face2Social Is Really Doing

Face2Social locates people across social platforms by matching faces in publicly available images, overcoming unreliable names and usernames.
Artificial intelligence
fromSecurityWeek
2 months ago

Why We Can't Let AI Take the Wheel of Cyber Defense

Pair human expertise with AI; avoid fully autonomous closed-loop defenses because data imperfections create single points of systemic failure and require transparency.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
#live-facial-recognition
fromSecuritymagazine
2 months ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
Privacy technologies
fromFast Company
1 month ago

Why using facial recognition on your phone could leave you vulnerable

Biometric phone unlocking is convenient but can be compelled by authorities or exploited by others, making passcodes a safer option.
fromWIRED
2 months ago

ICE and CBP's Face-Recognition App Can't Actually Verify Who People Are

Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify people in the streets and was deployed without the scrutiny that has historically governed the rollout of technologies that impact people's privacy, according to records reviewed by WIRED. The Department of Homeland Security launched Mobile Fortify in the spring of 2025 to "determine or verify" the identities of individuals stopped or detained by DHS officers during federal operations, records show.
Privacy technologies
Privacy technologies
fromFlowingData
1 month ago

Meta planning facial recognition with glasses

Meta plans to add facial recognition to outward-facing smart-glass cameras that record what users look at, creating significant privacy and trust concerns.
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Information security
fromSecurityWeek
1 month ago

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Venice Security raised $33 million to launch an adaptive privileged access management platform providing just-in-time access and immediate revocation across hybrid enterprise environments.
fromTheregister
2 months ago

ATM flashes a port or two for the enterprising hacker

When we talk about installation, we're usually referring to Windows 2000 turning up on a ticket machine, Windows 7 showing its face where it isn't welcome, or even Windows 10 having a moment on an information display. Today's bork, however, is a bit different. Spied by an eagle-eyed Register reader, this installation is all about the hardware: a router connected to an ATM to provide connectivity.
Information security
Privacy technologies
fromNautilus
2 months ago

Your Boss Could Monitor Your Heart Rate With Spy Tech

Millimeter-wave radar and off-the-shelf biometric sensors can enable covert heart-rate, presence, and emotional-state monitoring through work computers, raising significant workplace privacy risks.
fromArs Technica
2 months ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
[ Load more ]