Researchers Use Heart Rhythms for Continuous Authentication

Researchers from the University at Buffalo SUNY, and the Department of Electrical and Computer Engineering at Texas Tech University have proposed a novel new continuous user authentication method using cardiac motion (a heart-based function determined by users’ unique heart geometry). Their paper, ‘Cardiac Scan: A Non-Contact and Continuous Heart-Based User Authentication System’ (PDF), will be…

Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security concerns around connected ecosystems. Pervasive security through context-aware access control is one of the future areas currently being explored by developers.

iPhone X gets facial authentication, is the enterprise next?

This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, send a text or call a friend. Here’s an excerpt from The Verge’s initial iPhone X review:

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are learning how to use newer authentication methods to exploit security weaknesses. As always, it is a cat-and-mouse game with serious consequences. Facial recognition software can be exploited with high-definition photos, many of which can be found on social media accounts. Fraudsters can easily bypass one-time passwords by calling cellphone companies and impersonating the…