Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
6 Biometric Factors That Are Working Today
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/27/2014 | 7:09:31 AM
Re: correct me if I'm wrong
It could be a combo of the "good old fashioned" password with a biometric for a while. But I still believe the future is with biometrics... especially as these factors become more common and accepted. 
Bprince
50%
50%
Bprince,
User Rank: Ninja
8/27/2014 | 12:14:47 AM
Re: correct me if I'm wrong
I still believe in the good old fashion password, but I would like to see retina scanners used. Not like Minority Report exactly, but I think as an authentication measure I find it fascinating. 

BP
Robert McDougal
100%
0%
Robert McDougal,
User Rank: Ninja
8/18/2014 | 8:10:49 AM
Re: correct me if I'm wrong
CardicRythm is pretty close, but you are right it requires that "intrusive" wearable bracelet.  I am hoping for sensors so sensitive they can detect the minute electrical fields surrounding us all.

Yeah, I am a big nerd.....
Marilyn Cohodas
0%
100%
Marilyn Cohodas,
User Rank: Strategist
8/18/2014 | 7:33:44 AM
Re: correct me if I'm wrong
Isn't that how Cardiac Rhythm works? That sounds like a pretty cool and promising biometric, although it sounds like it would require a wearable bracelet of some sort, which some people might find intrustive. (sigh)  No perfect solution. But we can't let perfect be the enemy of good!
MarilynCoh
50%
50%
MarilynCoh,
User Rank: Apprentice
8/16/2014 | 1:02:54 PM
Re: correct me if I'm wrong
Ok. I concede that there is a lot of skepticism about fingerprints -- legitimate or not. But what about some of the other types? Eye, Palm, behavioral? Does any one agree with me that some type of biometric is preferable to passwords?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:20:02 AM
Re: correct me if I'm wrong
Call me paranoid, but I don't like fingerprint authentication.  It could be because of all of those James Bond movies but I see my fingerprint as a liability.

Let's say that someone wants to authenticate as me.  They follow me to starbucks where I proceed to buy an Venti White Mocha =), which I consume in the store.  I throw my empty container in the trash and leave.  The attacke walks over to the trash pulls out my empty container and now they have my fingerprint.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:16:55 AM
Re: correct me if I'm wrong
If we use DNA, what about twins?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:15:37 AM
Re: correct me if I'm wrong
Call me Mr. Sci-Fi but I would like to see authentication based on a persons unique electrical field.  Walk up to a device it detects the faint electrical field surrounding you and grants you access.
bpaddock
50%
50%
bpaddock,
User Rank: Strategist
8/15/2014 | 12:46:16 PM
Re: correct me if I'm wrong
For a short time period cars sold in Japan had fingerprint scanners in place of the door locks.  That technology rapidly went back to keys when thugs started cutting off fingers to steal the cars.

Show me a biometric scanner, such as one based on the eye, that will authenticate you after you've been hit in the face by an airbag in a car accident.  Airbags are *not* big fluffy pillows when you are going 50+ MPH.  How happy will you be that you can't call your family for help because your phone things they injured you, is not you?

 

 

 
bpaddock
50%
50%
bpaddock,
User Rank: Strategist
8/15/2014 | 12:46:06 PM
Re: correct me if I'm wrong
For a short time period cars sold in Japan had fingerprint scanners in place of the door locks.  That technology rapidly went back to keys when thugs started cutting off fingers to steal the cars.

Show me a biometric scanner, such as one based on the eye, that will authenticate you after you've been hit in the face by an airbag in a car accident.  Airbags are *not* big fluffy pillows when you are going 50+ MPH.  How happy will you be that you can't call your family for help because your phone things they injured you, is not you?

 

 

 
Page 1 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...
CVE-2020-26243
PUBLISHED: 2020-11-25
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded...
CVE-2020-25650
PUBLISHED: 2020-11-25
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service fo...
CVE-2020-29071
PUBLISHED: 2020-11-25
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving se...