Risk
8/28/2013
01:35 PM
Dark Reading
Dark Reading
Slideshows
50%
50%

Iris Scans: Security Technology In Action

Iris-based security scans are the stuff of sci-fi movies, but NIST research shows how the technology can now be used in the real world to reliably identify individuals.
Previous
2 of 6
Next


A traveler uses a check-in system, developed for NEXUS, a joint American-Canadian program designed to expedite border passage by frequent travelers. The traveler begins by entering traveler information on a kiosk before using an iris scanner located to the right of the kiosk.

RECOMMENDED READING:

Eyeball Scans Stay Accurate Over Time, Says NIST

Eye Scans Meet Federal ID Cards

Federal Biometric ID Cards Get Iris Scan Option

Google Glass: Security Risk For Governments?

Federal Government IT Priorities: Vision Vs. Reality

10 Must-Try Travel Apps

Do We Need A U.S. Department Of Technology?

Previous
2 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WKash
50%
50%
WKash,
User Rank: Apprentice
9/3/2013 | 5:27:27 PM
re: Iris Scans: Security Technology In Action
The Canadian Border Services Agency and DHS deserve credit for putting iris recognition systems to the test in the field and sharing the data on how reliable the systems are.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0192
Published: 2015-07-02
Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.

CVE-2015-1914
Published: 2015-07-02
IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.

CVE-2015-1916
Published: 2015-07-02
Unspecified vulnerability in IBM Java 8 before SR1 allows remote attackers to cause a denial of service via unknown vectors related to SSL/TLS and the Secure Socket Extension provider.

CVE-2015-3157
Published: 2015-07-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE-2015-3202
Published: 2015-07-02
fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report