“Scammers”

“Scammers”

Scammers fingerprint, “Scammers”, Full Body Massage Service

"Scammers"

How secure are your devices ?

 

Good morning,

This is something I stumbled across the other day and I was a little taken back by what I had read. We live in a fast digital world where technology is evolving daily and the scammers are right their in the shadows waiting to evolve too.

It’s frightening how far technology has come in such a short time but buckle-up, what the public knows right now is just the start of whats to come.

Scammers fingerprint, “Scammers”, Full Body Massage Service

Fingerprint

Article: Kraken Security Labs

We have been lead to believe because our fingerprints are unique,  there for they are a great way to secure our Digital Devices. It’s easy to setup, easy to use and theres no remembering passwords. What if I told you the scammers have this covered!

Fingerprint authentication has become the alternative to passwords and PIN codes. No one cherishes the idea of typing in a lengthy string of numbers, letters and characters when a simple tap of the finger does the job?

Unfortunately, that convenience of a quick tap of your finger can come at a cost. Because, unlike a regular password, we leave your fingerprint everywhere, iPhone screens, Laptops and even when we’re out enjoying a glasses of wine at restaurant.

In this article, the Kraken Security Labs Team demonstrates just how easy it is for malicious actors to bypass your favoured login method.

Stealing the Fingerprint

To compromise your device or account, we don’t even need direct access to your fingerprint. A photo of a surface you’ve touched (from a table at the local library to the equipment at your nearest gym) will do.

A photo of a victim’s fingerprint on their computer screen.

With this photo at our disposal, an hour in Photoshop yields a decent negative:

Scammers fingerprint, “Scammers”, Full Body Massage Service

The negative of the fingerprint from the previous photo.

Next, we’ll print the image onto an acetate sheet with a laser printer — the toner creates a 3D structure of the fingerprint on the sheet.

Scammers fingerprint, “Scammers”, Full Body Massage Service

The acetate sheet with our fresh print.

For our final step, we add some wood glue on top of the print to bring to life a fake fingerprint that we can use on a scanner.

Scammers fingerprint, “Scammers”, Full Body Massage Service

Building the synthetic fingerprint.

Scammers fingerprint, “Scammers”, Full Body Massage Service

Launching the Attack

With the fingerprint in hand, all we need to do is place it on the scanner.

Scammers fingerprint, “Scammers”, Full Body Massage Service

Our fingerprint working on a MacBook Pro.

We were able to perform this well-known attack on the majority of devices our team had available for testing. Had this been a real attack, we would have had access to a vast range of sensitive information.

Protecting Yourself From the Attack

A fingerprint should not be considered a secure alternative to a strong password. Doing so leaves your information — and, potentially, your cryptoassets — vulnerable to even the most unsophisticated of attackers.

It should be clear by now that, while your fingerprint is unique to you, it can still be exploited with relative ease. At best, you should only consider using it as second-factor authentication (2FA).

This time of year, the scammers are out in force trying to steal what you have worked soooo hard for. Get wise and be safe, it’s a jungle out there.

I hope this article partly from Kraken.com helps at least one person to secure their assets.

Take care of you and yours,

Sue x

All your comments are welcomed wether good or bad, it’s always good to receive your feedback for assurance i’m on the right track. Contact me via email: contact@femalemasseuse.co.uk  Thx.

Wellness pages – Professional Hot Stone Massage Professional Body Massage

Check out my post What coming this December and see my specials, I think there’s something for everyone!

Scammers fingerprint, “Scammers”, Full Body Massage Service
SHARE IT:

Leave a Reply