Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

What Are You Lookin' At?

Eye-movement cameras work for advertisers - and could have applications in security

5:30 PM -- Surveillance cameras, a common security tool, allow us to see the movements of users or potential intruders. But did you know there also is a technology that allows us to tell what they are looking at?

Eye-movement cameras, profiled in today's edition of NewScientist, use infrared technology to determine where a human eye is looking at any given moment, and for how long. The technology already has been used by advertisers and Website designers to see which parts of a computer screen get the most attention.

But those early systems worked at distances of less than half a meter. Now, scientists at the Queen's University in Ontario, Canada, have developed Eyebox 2, an eye-movement camera that works at distances up to 10 meters.

The system uses an array of infrared LEDs and a 1.3 megapixel digital camera to monitor eye movements, according to NewScientist. The camera has higher resolution than most eye-tracking systems, and it can easily pick out the distinctive infrared signature from a pair of human pupils from up to 10 meters. It can also track several people at once and determine their gaze from four meters away to within 15 degrees.

The scientists say the technology has "many applications," including smart billboards that can detect how many passersby have looked at them, and what parts of the billboard they focused on. But I can't help thinking that such technology might be useful in security, helping technicians understand how end users use their computer screens, or whether sensitive resources or areas have come under the scrutiny of roving eyes.

My worst fear is that the cameras might detect my own roving eye movements, stirring the ire of my lovely wife. Not to worry, says NewScientist: The female eye actually is more quickly drawn to embarrassing distraction than the male eye, according to a study by The Kinsey Institute for Research in Sex, Gender and Reproduction at Indiana University, which used the eye-tracking technology.

Check out this new technology here. Just don't be surprised if it knows what you're looking at.

— Tim Wilson, Site Editor, Dark Reading


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.