Do Technologies of Face ID and Touch ID Protect People’s Data from Hacking?

Apple, Samsung, Sony, Blackberry, name it; every big company is alert when it comes to cybercrime, especially from your handset or computer. Customer privacy online has become mandatory. Whether signing up for a newsletter or purchasing an item via eBay, the customer’s details must be kept confidential, or receive the full wrath of social media, the government, and the judicial system. The recent information concerning Cambridge Analytica and Facebook using users information recklessly and retaining personal data without permission was a worldwide scandal with some companies deleting Facebook accounts to keep their information private and the delete Facebook hashtag trend.
Facebook denounced keeping personal data but has since updated and informed their users of privacy settings they can use to protect themselves and new privacy regulations they have undertaken to prevent such ongoings ever again. Increased cybercrime has come to an all-time high in the digital age. The misuse of the company and individual information for personal gain or fraud has gained significant coverage that has caused an outrage and put cybercrime among the top causes for fraud by hacking to embarrass or extort users online.
In an effort to secure the billions of people using smartphones today, electronic and telecommunication companies have engineered face and touch ID specific to the handset owner to allow for phone access. To pay bills, install or open applications. Increased phone security has enabled a lot of business transactions via phone to become possible citing full-proof security, but is it enough to lock hackers out and nosy friends?
Faked fingerprints have been used to unlock the iPhone 5s, 6 and 6 plus with researchers and hackers claiming it can be done using fingers coated with a gummy substance to replicate the print of the user. Although the making of a print would take patience, time and a very clear copy it can still be done by lifting prints off the glass and even the cellphone itself. Secondary authentication has been installed on phones to increase security for mobile users via, PINs, passwords, and patterns created by the user themselves to lock out external users. Verifinger, a commercial software product has been used to create a fully imaged print to fool the biometric security

Facial recognition by Apple and Sony has grown in popularity but as it is a recent release, not much information has been accumulated to suggest it is more hacker-proof than the fingerprint or other secondary factor authenticators. The Samsung Galaxy 8 iris scanner was hacked by Germany’s Chaos Computer Club that frequently identifies the faults in new technologies to showcase hacker methods of breaking into cellphones and companies via biometric barriers like facial and fingerprint recognition. The iris scanner by Samsung was hacked to address how external users could access phones, and if some well it only takes a detailed digital photo, a contact lens, and an office printer to get access. The evidence remains that although technology continues to make leaps and bounds, hackers continue to make significant progress as well as continuously shaming the device makers.

Copyright © 2017 Mambo Microsystems Ltd | All Rights Reserved