Start with face recognition. The testers found that, depending on the particular system, they could fool it by holding up a photo of an authorized person. Further, these systems have to store pictures of authorized people to compare with whoever is . . .
Start with face recognition. The testers found that, depending on the particular system, they could fool it by holding up a photo of an authorized person. Further, these systems have to store pictures of authorized people to compare with whoever is standing in front of the camera. If a hacker can break into the computer and steal these pictures, they can be displayed on the screen of a laptop, held up to the camera, and ... you guessed it. Systems of greater sophistication watch to see whether the picture moves as a live person does. The testers took a short video clip of an authorized person, held it in front of the camera on a laptop, and ... bingo.

Well, how about fingerprints? More bad news. When you put your finger on the reader, your print remains there after you leave. The investigators found that often they could simply cup their hands around the reader and breathe on the old print, made by an authorized user - whereupon it would show up and let them in.

The link for this article located at Washington Times / Symantec is no longer available.