Are We Experiencing the End of Biometrics?

Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data.
The interface between physical and software security, verified by unique personal identifiers like iris scans, fingerprint scans, or voice verification, seemed to render biometrics invulnerable to the types of attacks that systems of either variety were susceptible to independently.
Earlier this year, an Arizona mother received a late-night ransom call with her 15-year-old daughter pleading in distress on the other line.
It was an AI-generated clone of her daughter's voice print generated from snippets of audio and used to create a fake recording with enough fidelity that even the child's mother could not tell the difference.
We saw a remarkable surge in the frequency and quality of deepfakes last year.
The increasing availability of biometric data makes these types of scams relatively easy to execute.
Threat actors can mine IoT-connected devices like video databases for iris, fingerprint, and facial recognition data - think of a typical office environment where a person might pass a high-resolution camera multiple times a day for several months.
As the technology evolves rapidly, attackers can now insert the deepfake right into the video feed, avoiding some of the liveness checks that biometric systems offer.
For this reason, securing video surveillance systems and the data they generate will be crucial in the upcoming year.
IoT devices are among the largest unsecured attack surface for most modern organizations.
As cybercriminals become increasingly clever and sophisticated, lax IoT security poses a greater risk than ever before.
These issues, combined with advances in artificial intelligence and quantum computing, have the potential to break biometrics.
Organizations must make strong, proactive investments in improving their security posture to stay ahead of the evolving threat landscape.
As attackers use AI to find and exploit vulnerabilities, IT and security teams should leverage AI at every level of defense to act as a force multiplier, aggregating and prioritizing data, identifying likely attack paths, revealing lateral access, highlighting back doors, and compiling potential remediation actions.
The cloud era ushered in the decline of the traditional security perimeter, and the shift to remote work amid the Covid-19 pandemic delivered its last rites.
Zero trust should be the default position for all organizations - meaning that each user is continually verified not only based on their credentials, but on the data they're accessing.
A sophisticated zero trust capacity can identify and confront unauthorized access faster than any traditional security protocol.
Regardless of the method of attack, zero trust enables organizations to regulate network access to a granular degree in real time, limiting the risk of any unauthorized access.
While the end of biometric security has deep implications for organizations across industry and government, there are concrete actions leaders can take to protect against the threats that will emerge in the gap.
By expanding the use of AI in cyber defense, along with investing in tools to achieve a comprehensive zero trust network state, organizations can defend against these threats and evolve with threats in the era of AI and quantum computing.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Sun, 10 Mar 2024 22:13:06 +0000


Cyber News related to Are We Experiencing the End of Biometrics?

Is Facial Biometrics the Future of Digital Security? - Facial biometrics brings about a revolution in digital processes, granting businesses a competitive edge while meticulously safeguarding privacy. Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions ...
1 year ago Cysecurity.news
Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs - Researchers have figured out how to compromise three of the most common fingerprint readers used by today's PCs. With support from Microsoft, analysts from Blackwing Intelligence attempted to subvert the biometric security offered by three sample ...
1 year ago Darkreading.com
Are We Experiencing the End of Biometrics? - Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data. The interface between physical and software security, verified by unique personal identifiers like iris scans, fingerprint scans, or ...
1 year ago Cybersecurity-insiders.com
The future of biometrics in a zero trust world - Biometric data obtained from selfies, forged passports and cyberattacks on data stores holding everything from fingerprints to DNA have long been best-sellers on the dark web. Untraceable yet very powerful in allowing attackers to access the most ...
1 year ago Venturebeat.com
Face off: Attackers are stealing biometrics to access victims' bank accounts - Biometrics have been touted as the ultimate credential - because after all, faces, fingerprints and irises are unique to every human being. Attackers are increasingly cunning, and it's becoming clear that biometric screens are just as easy to bypass ...
1 year ago Venturebeat.com
CVE-2025-21932 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Meta Announces End-to-End Encryption by Default in Messenger - Yesterday Meta announced that they have begun rolling out default end-to-end encryption for one-to-one messages and voice calls on Messenger and Facebook. It will bring strong encryption to over one billion people, protecting them from dragnet ...
1 year ago Eff.org
Meta Rolls Out Default End-to-End Encryption on Messenger Amid Child Security Concerns - Meta Platforms announced on Wednesday the commencement of the rollout of end-to-end encryption for personal chats and calls on both Messenger and Facebook. This heightened security feature, ensuring that only the sender and recipients can access ...
1 year ago Cysecurity.news
Jira Down: Atlassian users experiencing degraded performance - Atlassian users are experiencing degraded performance amid an 'active incident' affecting multiple Jira products since morning hours today. Similar status updates have been issued for Atlassian offerings like Jira Service Management, Jira ...
3 months ago Bleepingcomputer.com
Content Credentials Show Promise, But Ecosystem Still Young - It's a good start, but an end-to-end workflow requires more: Cameras or smartphones to generate signed images, support for Content Credentials in a wide variety of image-editing software, and the ability to view authenticated metadata on social ...
5 months ago Darkreading.com
Top 10 Best Passwordless Authentication Tools in 2025 - Auth0 provides a flexible authentication and authorization platform that supports passwordless login methods, enhancing security and user experience by eliminating the need for traditional passwords. Okta provides a robust identity and access ...
5 months ago Cybersecuritynews.com
Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption - A study commissioned by Apple shows that an estimated 2.6 billion personal records were compromised as a result of data breaches in the past two years, which, according to the tech giant, highlights the need for end-to-end encryption. It provides a ...
1 year ago Securityweek.com
Meta introduces default end-to-end encryption for Messenger and Facebook - Meta is introducing default end-to-end encryption for chats and calls across Messenger and Facebook, the company revealed on Wednesday. E2EE ensures that messages content is only visible to the person sending the message and the one receiving it - ...
1 year ago Helpnetsecurity.com
Meta Makes End-to-End Encryption Default on Facebook Messenger - In a historic revelation, Meta has declared a paradigm shift for its Messenger platform, unveiling the implementation of default end-to-end encryption for all personal messages and calls. This pivotal moment is destined to reshape the landscape of ...
1 year ago Cybersecuritynews.com
DataVisor integrates SMS customer verification into its platform - DataVisor announced the expansion of its end-to-end platform capabilities with the integration of SMS customer verification for fraudulent transactions. This new offering, powered by Twilio technology, provides customers with enhanced fraud ...
1 year ago Helpnetsecurity.com
UK to replace physical biometric immigration cards with e-visas - By 2025, Britain is set to ditch physical immigration status documents such as Biometric Residence Permits and Biometric Residence Cards in a bid to make its borders digital, which is in-line with developed countries like Australia. Presently, ...
1 year ago Bleepingcomputer.com
CVE-2023-48050 - SQL injection vulnerability in Cams Biometrics Zkteco, eSSL, Cams Biometrics Integration Module with HR Attendance (aka odoo-biometric-attendance) v. 13.0 through 16.0.1 allows a remote attacker to execute arbitrary code and to gain privileges via ...
1 year ago Tenable.com
JumpCloud's Q1 2024 SME IT Trends Report Reveals AI Optimism Tempered by Security Concerns - The report provides updated survey results and new findings to the company's biannual SME IT Trends Report, which was first released in June 2021. The latest edition of the report delves into the impact of artificial intelligence on identity ...
1 year ago Darkreading.com
Interpol Arrests Smuggler With New Biometric Screening Database - In November, Interpol arrested a fugitive smuggler using a new biometric security system it plans to deploy across its 196 member countries. The colorlessly named "Biometric Hub" collates Interpol's existing fingerprint and facial-recognition data ...
1 year ago Darkreading.com
Microsoft Adds Face Check to Entra Verified ID - Microsoft has added facial matching to its Entra Verified ID service, which lets organizations create and issue verifiable credentials to validate claims such as employment, education, certifications, and residence. The new Face Check feature is ...
1 year ago Darkreading.com
Fraudsters have found creative ways to scam some businesses - 70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they're more of a fraud target than a year ago, according to Experian. To thwart fraudulent activity in 2024, businesses need to deploy more ...
1 year ago Helpnetsecurity.com
4 Ways to Fight AI-Based Fraud - While many enterprises have relied on (insecure) log files, many are now embracing telemetry data, such as network traffic intelligence from deep packet inspection (DPI) technology, because it provides the "ground truth" upon which to build ...
10 months ago Darkreading.com
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy - The security analysts (Danilo Avola, Daniele Pannone, Dario Montagnini, and Emad Emam) noted that the repositories already include scripts for automatic target enrollment: a would-be spy merely walks a hall with a smartphone, captures 100 Wi-Fi ...
2 weeks ago Cybersecuritynews.com
Navigating Retail Disruption: Maximize Customer Centricity and Business Performance with Observability - Cisco Full-Stack Observability solutions help optimize and secure the applications that underpinonline and in-store experiences from the customer to the warehouse to economies of scale. Retailers can become more customer centric by taking action that ...
1 year ago Feedpress.me
Meta rolls out default end-to-end encryption on Messenger, Facebook - Meta has announced that the immediate availability of end-to-end encryption for all chats and calls made through the Messenger app, as well as the Facebook social media platform. End-to-end encryption protects clear data by ensuring that it is ...
1 year ago Bleepingcomputer.com