“Scammers”

"Scammers"
How secure are your devices ?
Good morning,
This is something I stumbled across the other day and I was a little taken back by what I had read. We live in a fast digital world where technology is evolving daily and the scammers are right their in the shadows waiting to evolve too.
It’s frightening how far technology has come in such a short time but buckle-up, what the public knows right now is just the start of whats to come.

Fingerprint
Article: Kraken Security Labs
We have been lead to believe because our fingerprints are unique, there for they are a great way to secure our Digital Devices. It’s easy to setup, easy to use and theres no remembering passwords. What if I told you the scammers have this covered!
Fingerprint authentication has become the alternative to passwords and PIN codes. No one cherishes the idea of typing in a lengthy string of numbers, letters and characters when a simple tap of the finger does the job?
Unfortunately, that convenience of a quick tap of your finger can come at a cost. Because, unlike a regular password, we leave your fingerprint everywhere, iPhone screens, Laptops and even when we’re out enjoying a glasses of wine at restaurant.
In this article, the Kraken Security Labs Team demonstrates just how easy it is for malicious actors to bypass your favoured login method.
Stealing the Fingerprint
To compromise your device or account, we don’t even need direct access to your fingerprint. A photo of a surface you’ve touched (from a table at the local library to the equipment at your nearest gym) will do.
A photo of a victim’s fingerprint on their computer screen.
With this photo at our disposal, an hour in Photoshop yields a decent negative:

The negative of the fingerprint from the previous photo.
Next, we’ll print the image onto an acetate sheet with a laser printer — the toner creates a 3D structure of the fingerprint on the sheet.

The acetate sheet with our fresh print.
For our final step, we add some wood glue on top of the print to bring to life a fake fingerprint that we can use on a scanner.

Building the synthetic fingerprint.

Launching the Attack
With the fingerprint in hand, all we need to do is place it on the scanner.

Our fingerprint working on a MacBook Pro.
We were able to perform this well-known attack on the majority of devices our team had available for testing. Had this been a real attack, we would have had access to a vast range of sensitive information.
Protecting Yourself From the Attack
A fingerprint should not be considered a secure alternative to a strong password. Doing so leaves your information — and, potentially, your cryptoassets — vulnerable to even the most unsophisticated of attackers.
It should be clear by now that, while your fingerprint is unique to you, it can still be exploited with relative ease. At best, you should only consider using it as second-factor authentication (2FA).
This time of year, the scammers are out in force trying to steal what you have worked soooo hard for. Get wise and be safe, it’s a jungle out there.
I hope this article partly from Kraken.com helps at least one person to secure their assets.
Take care of you and yours,
Sue x
All your comments are welcomed wether good or bad, it’s always good to receive your feedback for assurance i’m on the right track. Contact me via email: contact@femalemasseuse.co.uk Thx.
Wellness pages – Professional Hot Stone Massage Professional Body Massage
Check out my post What coming this December and see my specials, I think there’s something for everyone!

Recent Comments