Researchers at New York University and Michigan State University have recently found that the fingerprint sensor on your phone is not as safe as you think. ‘The team has developed a set of fake fingerprints that are digital composites of common features found in many people’s fingerprints,’ reports Digital Trends. ‘Through computer simulations, they were...
Author: Emerald Knox (Emerald Knox)
Physical Intrusion Games – Optimizing Surveillance by Simulation and Game Theory
Stefan Rass , Ali Alshawish , Mohamed Amine Abid , Stefan Schauer , Quanyan Zhu and Hermann de Meer. The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to...
Your Smartphone Fingerprint Security System May Not Be as Safe as You Think
…A team of researchers from New York University Tandon School of Engineering and Michigan State University College of Engineering have found that partial similarities between prints are common enough to fool biometric security systems … leading them to be much more vulnerable than previously thought.
Robots to the Rescue at the Kennedy Space Center
It’s no small task to build a fully autonomous robot capable of mining raw materials from the surface of Mars, but that’s exactly what a team of NYU Tandon School of Engineering students is attempting to do. For the sixth consecutive year, a Tandon team will be taking part in the NASA Robotic Mining Competition.
That Fingerprint Sensor on Your Phone Is Not as Safe as You Think
New findings published Monday by researchers at New York University and Michigan State University suggest that smartphones can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. In computer simulations, the researchers from the universities were able to develop a set of artificial “MasterPrints” that could match real...
So You Think You Can Secure Your Mobile Phone With a Fingerprint?
NYU Tandon and Michigan State University Researchers Find That Similarities in Partial Fingerprints May be Sufficient to Trick Biometric Security Systems on Smartphones…Nasir Memon, a professor of computer science and engineering at NYU Tandon and the research team leader, explained that the MasterPrint concept bears some similarity to a hacker who attempts to crack a...
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems
Aditi Roy, Nasir Memon and Arun Ross This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the...
X-Platform Phishing: Abusing Trust for Targeted Attacks
Hossein Siadati, Toan Nguyen and Nasir D. Memon Anti-phishing techniques intended to reduce the delivery rate of phishing emails, and anti-phishing trainings meant to decrease the phishing click-through rates. This paper presents the X-Platform Phishing Attack, a deceptive phishing attack with an alarmingly high delivery and click-through rates, and highlights a subset of the challenges...
Tools for Automated Analysis of Cybercriminal Markets
Sadia Afroz, Rebecca Sorla Portnoff, Greg Durrett, Jonathan Kummerfeld, Damon McCoy, Kirill Levchenko, and Vern Paxson Underground forums are widely used by criminals to buy and sell a host of stolen items, datasets, resources, and criminal services. These forums contain important resources for understanding cybercrime. However, the number of forums, their size, and the domain...
Google Users Being Targeted With Google Doc Phishing Email
… Users are asked to click on a link to view a document, which provides the hackers access to the contents of their Google accounts, including email, contacts and online documents, according to security experts who reviewed the scheme. ‘This is a very serious situation for anybody who is infected because the victims have their...