ABC NEWS REPORT: PUSH FOR FACE RECOG.
IN YOUR FACE!: RSA CONFERENCE PRESENTATION
alternative to two-factor authentication, the report points out: all forms make it diffi cult for attackers that seek to access resources by stealing someone else’s identity. ‘But in recent years, even biometric authentication has begun to unravel,’ warns the latest Cyber Security Predictions report from Forcepoint. ‘The reality is that facial recognition has serious vulnerabilities – and that is why we think hackers will steal the public’s faces [sic] in 2019. In fact, it has already happened, albeit only at the behest of researchers.’ However, Threat Intelligence solutions agency Gemini Advisory
told a report in
Fortune.com that it has seen facial profi les stolen from India’s national biometrics database for sale on ‘dark web’ Internet sites. Gemini Advisory has yet to see databases of American faces for sale, but added, ‘It’s just a matter of time’. If such a thing were to occur, a stolen collection of customer faces from a hotel or retailer, for example, could help cyber criminals carry out diverse identity theft or forms of fraud. Further cyber security issues can be classed into three general areas. First, there is the concern that a facial recognition system could be remotely hacked and have bogus ID profi les added to its database of ‘approved faces’. If successful, this might enable a malicious intruder to gain
entrance to a building, then come and go as they please, undetected by the facial recognition system. Once in the building, the intruder would be well-placed to mount insider cyber attacks on internal systems using their own technology, or via compromised in situ endpoint
DEUTSCHE VORSCROLLEN
devices already wired into the network. An additional
cyber security issue would be the possibility of a denial-of-service attack on a cloud-based facial recognition system that would leave an organisation unable to admit anyone into their premises.
NEXT PAGE: GLOBAL CYBER STRIKES MAPPED LIVE
ACCREDITATION Words | Jim Meyers Photography | Shutterstock
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74