One of the many advances being made in smartphones and tablets is the progression to a “whole-device” display. Some models already have full-width displays with little or no bezel or ink area on the sides. The next step will be a nearly full-height display; “nearly” that is, because while the home button will be gone, there will still need to be a front-facing camera.
The use of biometrics for user identity has become increasingly... Read more
Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more
Wealth attracts criminals like honey attracts bears. It should come as no surprise, then, that the wealth of information and services accessed through fingerprint authentication would be “honey” to the bad guys out there, intent on using such access for illicit purposes. Among their methods is spoofing – the act of fabricating fingerprints for use on... Read more
You’re in another state attending a wedding when you realize you left the gift at home. In an effort to get a quick replacement, you stop at the local department store to get a silver chafing dish. Of course you’ve never been to this department store, you’re not in your home state,... Read more
Thomas Jefferson, in the Declaration of Independence, is famously credited with the assertion that all men are created equal. That time-honored position on equality, however, doesn’t necessarily apply to biometric security, because not all fingerprint authentication is created equal.
In the biometrics... Read more