Toggle light / dark theme

Facial recognition technology is likely not as safe as you may have thought. This was illustrated by a recent test where 3D printed busts of peoples’ heads were used to unlock smartphones.

Out of five tested phones, only one refused to open when presented with the fake head.

Other biometric security measures are also showing less resilience to hacking than you might expect. A group of Japanese researchers recently showed it was possible to copy a person’s fingerprints from pictures like the ones many of us post on social media.

Technology giant Amazon is working to allow customers to connect their credit card information to their hands, so that they can scan for purchases with their palms at checkout areas in physical stores, people familiar with the project told The Wall Street Journal.

While Amazon’s plan is in the early stages, the company has reportedly begun working with Visa on testing out the terminals, and has discussed the project with Mastercard, JPMorgan Chase, Wells Fargo and Synchrony Financial.

The company previously filed a patent for a “non-contact biometric identification system” that features a “hand scanner” to produce a picture of a person’s palm.

It’s been a lousy week for Windows users: first, the NSA curveball crypto vulnerability and now confirmation of a zero-day vulnerability that’s being actively exploited with no fix yet.

Hot on the heels of National Security Agency (NSA) and Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) warnings for Windows 10 users to update urgently as news of the curveball crypto vulnerability broke, here we are again. The CISA has published a new warning for Windows users as Microsoft confirms a critical zero-day vulnerability is being actively exploited, and there’s no fix available at the time of writing.

Microsoft has released a security patch for a dangerous vulnerability affecting hundreds of millions of computers running Windows 10.

The vulnerability is found in a decades-old Windows cryptographic component, known as CryptoAPI. The component has a range of functions, one of which allows developers to digitally sign their software, proving that the software has not been tampered with. But the bug may allow attackers to spoof legitimate software, potentially making it easier to run malicious software — like ransomware — on a vulnerable computer.

“The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider,” Microsoft said.

The US Cybersecurity and Infrastructure Security Agency (CISA) today alerted organizations to patch their Pulse Secure VPN servers as a defense against ongoing attacks trying to exploit a known remote code execution (RCE) vulnerability.

This warning follows another alert issued by CISA in October 2019, and others coming from the National Security Agency (NSA), the Canadian Centre for Cyber Security, and UK’s National Cyber Security Center (NCSC).

Pulse Secure reported the vulnerability tracked as CVE-2019–11510 and disclosed by Orange Tsai and Meh Chang from the DEVCORE research team, and by Jake Valletta from FireEye in an April 2019 out-of-cycle advisory.

Even ordinary computers flip a bit here and there, but their quantum cousins have a lot more ways to go wrong.

As the power and qubits in quantum computing systems increase, so does the need for cutting-edge capabilities to ascertain that they work. The Army Research Office and National Security Agency recently teamed up to solicit proposals for research that can help do exactly that.

The entities launched a broad agency announcement this week to boost the development of innovative techniques and protocols that allow for Quantum Characterization, Verification, and Validation, or QCVV, of intermediate-scale quantum systems. QCVV is essentially the science of quantifying how well a quantum computer can run quantum algorithms—and experts agree that it’s a necessary step towards useful quantum computing.

A much broader array of stakeholders must engage with the problems that DNA databases present. In particular, governments, policymakers and legislators should tighten regulation and reduce the likelihood of corporations aiding potential human-rights abuses by selling DNA-profiling technology to bad actors — knowingly or negligently. Researchers working on biometric identification technologies should consider more deeply how their inventions could be used. And editors, reviewers and publishers must do more to ensure that published research on biometric identification has been done in an ethical way.


Corporations selling DNA-profiling technology are aiding human-rights abuses. Governments, legislators, researchers, reviewers and publishers must act.