By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Cross-Site Scripting: The Real WordPress Supervillain
    Cross-Site Scripting: The Real WordPress Supervillain
    12 months ago
    Hackers targeting your smartphone
    12 months ago
    Improved Version of CTB-Locker (Onion Ransomware) Emerges
    12 months ago
    Latest News
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
    5 days ago
    Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
    6 days ago
    Two PHP Object Injection Vulnerabilities Fixed in Essential Blocks
    7 days ago
    Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
    1 week ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Cloudflare Notification about increase in ransom DDoS threats
    12 months ago
    Windows 11 build 25169 outs with new features
    12 months ago
    How to enable Bluetooth on Windows 11
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    7 months ago
    Now you can speed up any video in your browser
    7 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    8 months ago
  • How To
    How ToShow More
    Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
    Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
    17 hours ago
    Cloudflare account permissions, how to use them, and best practices
    Cloudflare account permissions, how to use them, and best practices
    17 hours ago
    Announcing Cloudflare Incident Alerts
    Announcing Cloudflare Incident Alerts
    17 hours ago
    Welcome to Birthday Week 2023
    Welcome to Birthday Week 2023
    2 days ago
    A new wave of innovation with Edge, your AI-powered browser
    3 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    YouTube Subscriptions Tab Filters
    11 months ago
    Russian KFC Instagram account hacked
    11 months ago
    VKontakte transformed “Messages” into “Messenger”
    11 months ago
    Latest News
    How to use image layers on Paint for Windows 11
    6 days ago
    How to disable Copilot on Windows 11 (completely)
    2 weeks ago
    How to blur image background in Photos for Windows 11
    2 weeks ago
    How to hide text from screenshots on Snipping Tool for Windows 11
    2 weeks ago
  • Glossary
  • My Bookmarks
Reading: Biometric banking is not secure
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Biometric banking is not secure

Vitus White
Last updated: 13 October
Vitus White 3 years ago
Share
5 Min Read

Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to banks and bank users, which together make up a gigantic target for cybercriminals.

Contents
What about ATMs?Biometric security’s downward slideHope — and recommendations — for the future

In fact, many banks are already testing new ATMs with biometric access — or have plans to do so soon.

On the institutional side, the great advantage of such methods as iris scanning or vein matching is that they decrease false reject (type I) and false accept (type II) rate errors. Users like biometrics because the technology works fast and frees them from dealing with passwords and other secret codes.

Unfortunately, fingerprint-scanning technology is both massively widespread and not as reliable as it should be. For example, users of both iOS and Android devices regularly complain that their gadgets refuse to unlock for authorized users — or that they let in other people.

What about ATMs?

Biometric ATMs are not yet implemented anywhere, but our security experts Olga Kochetova and Alexey Osipov have already discovered more than a dozen underground developers selling biometric skimmers on the black market. These devices are meant to steal scanned fingerprints.

Other underground developers are looking to make devices that can intercept the results of iris scanning and vein matching. Moreover, using skimmers is not the only way to steal biometric data. Man-in-the-middle attacks and similar methods will be just as effective with biometric credentials as they are now with usernames and passwords.

Of course, criminals also hack servers with users’ data, regardless of the form of that data.
Consider that this year Dropbox lost data from about 60 million accounts, and later Yahoo acknowledged the leak of 500 million — and those are just two examples of many.

More bad news from the #Yahoohack https://t.co/neicHoAHh0 #infosec #yahoo pic.twitter.com/zl6dOXe5gu

— Kaspersky (@kaspersky) September 27, 2016

Now, imagine that instead of passwords those companies had lost their users’ biometric data. Changing passwords may be annoying, but you can’t replace your DNA.

In addition, with the help of biometric skimmers, criminals can use raw data to craft a counterfeit login sample. Banks will need to work out security standards very thoroughly before they launch biometric ATMs.

Biometric security’s downward slide

The use of biometrics began with governments, security forces, and the defense industry. In these fields biometrics proved reliable, primarily because the institutions could afford expensive, first-class equipment.

With widespread adoption of biometrics, however, we have seen its amazing security slip. The technology’s popularity is actually a major contributing factor to this slide, for two reasons. First, security specification standards for consumer goods are lower than they are in mission-critical implementations. Second, a broad field of easily obtainable gadgets gives criminals a huge test bed of consumer devices to experiment with and find more and more vulnerabilities — for their own benefit, of course. The rapid development of 3D printing has also contributed to biometrics’ vulnerability.

Last year people installed about 6 million mobile apps that supported fingerprint authentication. According to Juniper Research, by 2019 humanity will use about 770 million such apps. By that time, biometric authentication will be commonplace. Other experts are even more optimistic: Acuity Market Intelligence believes that by 2020, 2.5 billion people will use 4.8 billion biometric devices.

Hope — and recommendations — for the future

Fortunately, biometric data is not stored as is: A server receives only hashed scanning results, making outright theft a less-attractive option. Nonetheless, criminals can still use methods such as the abovementioned man-in-the-middle attack, inserting themselves into the data transfer channel between an ATM and a processing center to steal users’ money.

RT @emm_david: 4 ways to hack an ATM: https://t.co/tsZDBfnu04 via @kaspersky

— Kaspersky (@kaspersky) October 4, 2016

Ultimately, banks and users will need to continue to employ stringent security measures against breaches of traditional logins as well as adding protection from biometric fraud. On the business side, that includes improving ATM design so as to prevent the installation of skimmers, as well as establishing and maintaining control over the security of ATM hardware and software.

As for biometric identification technology in general, for now we recommend everybody use it as a secondary protection method that complements other security measures, but does not replace them completely.


Source: kaspersky.com

Translate this article

TAGGED: Apple, Authentication, Security, SMTP, Software, Threats, Vulnerabilities, YouTube
Vitus White October 13, 2022 September 30, 2020
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Apps 17 hours ago
Cloudflare account permissions, how to use them, and best practices
Cloudflare account permissions, how to use them, and best practices
Apps 17 hours ago
Announcing Cloudflare Incident Alerts
Announcing Cloudflare Incident Alerts
Apps 17 hours ago
Welcome to Birthday Week 2023
Welcome to Birthday Week 2023
Apps 2 days ago
A new wave of innovation with Edge, your AI-powered browser
Windows 3 days ago

You Might Also Like

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Apps

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)

17 hours ago
Cloudflare account permissions, how to use them, and best practices
Apps

Cloudflare account permissions, how to use them, and best practices

17 hours ago
Announcing Cloudflare Incident Alerts
Apps

Announcing Cloudflare Incident Alerts

17 hours ago
Welcome to Birthday Week 2023
Apps

Welcome to Birthday Week 2023

2 days ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
Critical Vulnerability in Forminator Plugin
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme
How to download Windows 11 22H2 ISO after 23H2 releases
Previous Next

10 New Stories

Curator can help you with PC Game Pass picks
Cloudflare Email Security now works with CrowdStrike Falcon LogScale
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
How to use image layers on Paint for Windows 11
New! Rate Limiting analytics and throttling
Previous Next
Hot News
Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Cloudflare account permissions, how to use them, and best practices
Announcing Cloudflare Incident Alerts
Welcome to Birthday Week 2023
A new wave of innovation with Edge, your AI-powered browser
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?