This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
A research firm says that it has successfully spoofed the facial recognition technology used in Apple's flagship iPhone X.
Multi-factor authentication is becoming a "must" for many applications but questions remain about which factors are secure. A recent report from researchers in Vietnam has cast doubts on one promising new factor now available to millions.
In September, Apple announced the iPhone X with much fanfare and a flurry of new technology components. One of the most discussed is its facial recognition technology, which Apple has touted as being convenient, low-friction and very, very secure. Bkav, a security firm based in Vietnam, doesn't dispute the first two qualities but says that the security aspect may be somewhat over-stated.
In a test, researchers at Bkav said that they were able to defeat the iPhone X's facial recognition technology -- technology that Apple claims is not vulnerable to spoofing or mistaken identity -- using a mask made with approximately $150 in materials. While the spoof has yet to be confirmed by other researchers, the possibility raises some discomfiting possibilities.
The most troubling aspect of the demonstration is that the spoof was pulled off using a mask, after Apple went to great pains to show that their technology would only work with the living face of the device owner. In a blog post, Bkav said that they listened carefully to Apple's statements, worked to understand the AI used in the facial-recognition software, and found a vulnerability.
In a statement announcing the vulnerability, Ngo Tuan Anh, Bkav's Vice President of Cyber Security, said: "Achilles' heel here is Apple let AI at the same time learn a lot of real faces and masks made by Hollywood's and artists. In that way, Apple's AI can only distinguish either a 100% real face or a 100% fake one. So if you create a 'half-real half-fake' face, it can fool Apple's AI".
It has been pointed out that building the mask was not easy, requiring 3D scans of the owner's face, high-resolution 3D printing and multiple attempts to get the spoof right. That means that this is not a vulnerability likely to be used in any common scenario.
In the world of serious cybersecurity, though, unlikely is still possible and that's enough to take a technology out of the candidate pool for security covering high-value individuals and data. For most consumers (and for many users in business scenarios) the facial recognition technology in the iPhone X could be good enough. Before it can be considered a real replacement for more proven multi-factor authentication, though, the facial recognition technology may need more time to mature and improve.
The Promise and Reality of Cloud SecurityCloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.
The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability DatabaseCVE-2023-0658 PUBLISHED: 2023-02-03
A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The ide...
IBM Tivoli Workload Scheduler 9.4, 9.5, and 10.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 233975.
IBM Tivoli Workload Scheduler 9.4, 9.5, and 10.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226328.
An uncontrolled process operation was found in the newgrp command provided by the shadow-utils package. This issue could cause the execution of arbitrary code provided by a user when running the newgrp command.
RuoYi up to v4.7.5 was discovered to contain a SQL injection vulnerability via the component /tool/gen/createTable.
To save this item to your list of favorite Dark Reading content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.