Advertisement · 728 × 90
#
Hashtag
#Biometric
Advertisement · 728 × 90
Preview
Crossing the border from Windsor? You’ll soon be photographed when entering and exiting the U.S. | CBC News One expert says she worries about how accurate the photos will be - and how they could impact travellers.

#U.S. Department of Homeland Security (DHS) announced on Friday that it will make it mandatory for all non-American citizens, including #Canadians, to take part in the U.S.’s #facial #biometric program.

5 0 2 0
Post image

Grijă mare cu semnătura electronică! Pentru ei este CRUCIAL să integreze cât mai multă lume în sistemul biometric! Dacă cineva are acces la datele voastre personale, infracțional, din greșeală sau în urma unui atac cibernetic, imaginați-vă ce poate face […]

[Original post on mastodon.social]

0 0 0 0
Original post on biometricupdate.com

Marshall Scholar tells BU Podcast how to fix the age assurance debate Ben Fischer is a Marshall Scholar studying the technical and social implications of privacy preserving age assurance at the Uni...

#Age #Assurance #Biometric #Update #Podcast #Features […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Thales supports Dominican Republic’s biometric passport system upgrade Thales , together with local consortium partner Midas Dominicana, is providing the technology and technical expertise for th...

#Biometrics #News #Border #and #Port #Security #Civil […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Thales supports Dominican Republic’s biometric passport system upgrade Thales , together with local consortium partner Midas Dominicana, is providing the technology and technical expertise for th...

#Biometrics #News #Border #and #Port #Security #Civil […]

[Original post on biometricupdate.com]

0 0 0 0
Preview
AI-Driven Phishing Campaign Exploits Device Permissions to Steal Biometric and Personal Data  A fresh wave of digital deception, driven by machine learning tools, shifts how hackers grab personal information — no longer relying on password theft but diving into deeper system controls. Spotted by analysts at Cyble Research & Intelligence Labs (CRIL) in early 2026, this operation uses psychological manipulation to unlock powerful device settings usually protected. Rather than brute force, it deploys crafted messages that trick users into handing over trust.  While earlier scams relied on fake login pages, this one adapts in real time, mimicking legitimate requests so closely they blend into routine tasks. Behind each message lies software trained to mirror human timing and phrasing. Because it evolves with user responses, static defenses struggle to catch it. Access grows step by step — first a small permission, then another, until full control emerges without alarms sounding. What sets it apart isn’t raw power but patience: an attacker that waits, learns, then moves only when ready, staying hidden far longer than expected.  Unlike typical scams using fake sign-in screens, this operation uses misleading prompts — account confirmations or service warnings — to coax users into granting camera, microphone, and system access. Once authorized, harmful code quietly collects photos, clips, audio files, device specs, contact lists, and location data. Everything is transmitted in real time to attacker-controlled Telegram bots, enabling fast exfiltration without complex backend infrastructure.  Inside the campaign’s code, signs of AI involvement emerge. Annotations appear too neatly organized — almost machine-taught. Deliberate emoji sequences scatter through script comments. These markers suggest generative models were used repeatedly, making phishing systems faster and more systematic to build. Scale appears larger than manual effort alone would allow. Most of the operation runs counterfeit websites through services including EdgeOne, making it cheap to launch many fraudulent pages quickly.  These copies mimic well-known apps — TikTok, Instagram, Telegram, even Google Chrome — to appear familiar and safe. The method exploits browser interfaces meant for web functions. When someone engages with a harmful webpage, scripts trigger access requests automatically. If granted, the code activates the webcam, capturing frames as image files. Audio and video are logged simultaneously, transmitting everything directly to the attackers. Fingerprinting then builds a detailed profile: operating system, browser specifics, memory size, CPU benchmarks, network behavior, battery levels, IP address, and physical location.  Occasionally, the operation attempts to pull contact details — names, numbers, emails — via browser interfaces, widening exposure to connected circles. Fake login screens display progress cues like “photo captured” or “identity confirmed” to appear legitimate. When collection ends, the code shuts down quietly, restoring the screen with traces nearly vanished.  Security specialists warn that combining personal traits with behavioral patterns gives intruders tools to mimic identities effortlessly, making manipulation precise and nearly invisible. As AI tools grow more accessible, such advanced, layered intrusions are becoming increasingly common.​​​​​​​​​​​​​​​​

AI-Driven Phishing Campaign Exploits Device Permissions to Steal Biometric and Personal Data #AIPhishingThreats #AIDrivenPhishing #Biometric

0 0 0 0
Original post on biometricupdate.com

​Jumio approved for biometric KYC in Malaysia with successful independent assessment Jumio has completed the Malaysian central bank’s (Bank Negara Malaysia) independent eKYC Breakthrough Assess...

#Biometrics #News #Financial #Services #Liveness […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Pressure to adopt AI has led to critical security gaps for enterprises New research commissioned by Delinea looks at the tension between the pace of AI adoption, and how prepared organizations are ...

#Access #Control #Biometric #R&D #Biometrics #News […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Oz Forensics passes Level 3 biometric PAD evaluation by BixeLab with no errors Oz Forensics has passed a Level 3 evaluation of its face biometric Presentation Attack Detection (PAD) technology base...

#Biometric #R&D #Biometrics #News #Liveness […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Reality Defender integrates deepfake detection into Charm Security agentic workforce Reality Defender has formed a strategic partnership with Charm Security, a New York-based company that “builds...

#Biometrics #News #Trade #Notes #Voice #Biometrics #AI […]

[Original post on biometricupdate.com]

1 1 0 0
Original post on biometricupdate.com

Sunmi, Wink and Qualcomm bring biometric checkout to Android payment terminals Wink , Sunmi and Qualcomm have partnered with the aim of bringing biometric, identity‑driven payments to Sunmi’s g...

#Biometrics #News #Financial #Services #biometric […]

[Original post on biometricupdate.com]

1 1 0 0
Original post on biometricupdate.com

Canadian parliament seeks to expand biometric background checks nationwide Canada’s lower legislative branch is looking for a supplier to help extend its fingerprint biometrics capability for bac...

#Biometrics #News #Fingerprint #Recognition #Government […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Smart Eye and FPC unveil combined face-and-iris biometric authentication system Smart Eye and Fingerprint Cards (FPC) have developed a new multimodal biometric authentication system that combines f...

#Biometrics #News #Facial #Recognition #Iris #/ #Eye […]

[Original post on biometricupdate.com]

0 0 0 0
Original post on biometricupdate.com

Smart Eye and FPC unveil combined face-and-iris biometric authentication system Smart Eye and Fingerprint Cards (FPC) have developed a new multimodal biometric authentication system that combines f...

#Biometrics #News #Facial #Recognition #Iris #/ #Eye […]

[Original post on biometricupdate.com]

0 0 0 0
Post image

🌐 Metaverse risks for #consumers (ANEC & DIN Consumer Council webinar)

📅 26 March 2026 | ⏰ 15:00-16:00 CET

👉 Join us for a presentation of the study findings on #biometric #data, harassment, addiction, and user perception, plus a #standardisation update.

tinyurl.com/mucm52x8

0 0 0 0
Original post on biometricupdate.com

AWS maps out ‘practical digital sovereignty’ as global debate intensifies Digital identity sovereignty is a complex issue with a variety of answers. Practical concerns around security and cost ...

#Biometric #R&D; #Biometrics #News #ID #for #All #Amazon […]

[Original post on biometricupdate.com]

0 0 0 0