{"id":274,"date":"2019-10-09T12:40:41","date_gmt":"2019-10-09T12:40:41","guid":{"rendered":"http:\/\/ladintax.com\/blog\/2019\/10\/09\/fingerprint-retina-scans-not-just-for-james-bond-anymore\/"},"modified":"2019-10-09T12:40:41","modified_gmt":"2019-10-09T12:40:41","slug":"fingerprint-retina-scans-not-just-for-james-bond-anymore","status":"publish","type":"post","link":"http:\/\/ladintax.com\/blog\/2019\/10\/09\/fingerprint-retina-scans-not-just-for-james-bond-anymore\/","title":{"rendered":"Fingerprint, Retina Scans Not Just for James Bond Anymore"},"content":{"rendered":"<div>\n<p>Most people using the internet to shop, conduct financial transactions or<br \/>\nread firewall-protected content are likely familiar with the aggravation of maintaining<br \/>\npasswords. Worse yet, tech experts now say conventional password security is<br \/>\nonly a marginal defense against hacking.<sup>1<\/sup><\/p>\n<p>We are now entering a new age in<br \/>\nelectronic security for the average user \u2014 one that more closely resembles James<br \/>\nBond movies featuring high-tech gadgetry. Biometric coding uses unique physical<br \/>\ntraits \u2014 such as fingerprints and retina images \u2014 to permit access to certain<br \/>\ndevices. You may already use FaceID or fingerprint technology to unlock your smartphone.<sup>2<\/sup><\/p>\n<p>Behavioral biometrics recognizes<br \/>\nunique traits such as your voice, the way you swipe a pen or press a keyboard,<br \/>\nyour gait, common gestures, your foot\/pressure movement when you drive a car,<br \/>\netc.<sup>3<\/sup><\/p>\n<p>Biometrics may be easier than<br \/>\nremembering passwords. However, the technology is not without challenges. Unlike<br \/>\npasswords, biometrics are unchangeable. This data is stored for accessibility,<br \/>\nand if hackers breach a cloud storage system that includes biometric data, they<br \/>\ncould hack into user accounts.<sup>4<\/sup> <\/p>\n<p>In this era of rapidly changing<br \/>\nconsumer technology, it\u2019s important to stay on top of your financial data. It<br \/>\nmay not be possible to prevent someone from hacking into the company websites<br \/>\nthat host your accounts, but you may be able to detect fraudulent acts before they<br \/>\ncause too much damage by regularly checking your account activity.<\/p>\n<p>Here are some of the common ways<br \/>\nfraudsters can hack accounts:<\/p>\n<ul>\n<li>A brute force<br \/>\nattack is when a hacker guesses at possible credentials using a trial-and-error<br \/>\nsystem. This can take time, but less so if the hacker has some inkling of your<br \/>\ndata (such as your email address) or personal information (such as the names of<br \/>\nyour children).<sup>5<\/sup> <\/li>\n<\/ul>\n<ul>\n<li>A credential<br \/>\nstuffing attack is when the hacker already has a set of your credentials, having<br \/>\npurchased or breached a system (hotel or store database) to obtain them. Using<br \/>\nthis data, he or she may be able to hack into other accounts you use, such as<br \/>\nyour bank account.<sup>6<\/sup><\/li>\n<\/ul>\n<ul>\n<li>A dictionary<br \/>\nattack uses a systematic approach of testing each word in the dictionary as a<br \/>\npotential password to hack into an account or system.<sup>7<\/sup><\/li>\n<\/ul>\n<p>In the movie \u201cSkyfall,\u201d James Bond<br \/>\nis tasked with hunting down a genius hacker bent on terrorizing MI6<br \/>\nheadquarters. Hollywood\u2019s depictions of cyber hacks are rarely limited by minutiae<br \/>\nsuch as science and technology \u2014 only by the imagination of writers and<br \/>\ndirectors. In fact, movies often give would-be hackers ideas on how to<br \/>\ninfiltrate security systems, which can then lead to life-imitating-art events<br \/>\nin which security technology is beefed up in response to creative breaches. Films<br \/>\nlike \u201cEagle Eye,\u201d \u201cSnowden\u201d and \u201cThe Circle\u201d also demonstrate possibilities<br \/>\nassociated with artificial intelligence, social media and mass surveillance.<sup>8<\/sup><\/p>\n<p><strong><em>Content prepared by Kara Stefan<br \/>\nCommunications.<\/em><\/strong><\/p>\n<p><sup>1 <\/sup>Kelly Lappin. Security Intelligence. Feb. 18, 2019. \u201cAre<br \/>\nPasswords Killing Your Customer Experience? Try Passwordless Authentication.\u201d <a href=\"https:\/\/securityintelligence.com\/are-passwords-killing-your-customer-experience-try-passwordless-authentication\/\">https:\/\/securityintelligence.com\/are-passwords-killing-your-customer-experience-try-passwordless-authentication\/<\/a>. Accessed Aug. 29, 2019,<\/p>\n<p><sup>2 <\/sup>Sam Rutherford. Gizmodo. Aug. 5, 2019. \u201cTouch ID Will<br \/>\nReportedly Return to iPhones in 2021 With Apple\u2019s New In-Screen Fingerprint<br \/>\nSensor.\u201d <a href=\"https:\/\/gizmodo.com\/touch-id-will-reportedly-return-to-iphones-in-2021-with-1836973588\">https:\/\/gizmodo.com\/touch-id-will-reportedly-return-to-iphones-in-2021-with-1836973588<\/a>. Accessed Aug. 29, 2019.<\/p>\n<p><sup>3 <\/sup>Gemalto. Aug. 22, 2019. \u201cBiometrics: authentication and<br \/>\nidentification (definition, trends, use cases, news) \u2013 2019 review.\u201d <a href=\"https:\/\/www.gemalto.com\/govt\/inspired\/biometrics\">https:\/\/www.gemalto.com\/govt\/inspired\/biometrics<\/a>. Accessed Aug. 29, 2019.<\/p>\n<p><sup>4 <\/sup>Ibid.<\/p>\n<p><sup>5 <\/sup>Mike Greene. Bank Info Security. Aug 19, 2019. \u201cCredential<br \/>\nStuffing Attacks vs. Brute Force Attacks.\u201d <a href=\"https:\/\/www.bankinfosecurity.com\/blogs\/credential-stuffing-attacks-vs-brute-force-attacks-p-2767\">https:\/\/www.bankinfosecurity.com\/blogs\/credential-stuffing-attacks-vs-brute-force-attacks-p-2767<\/a>. Accessed Aug. 29, 2019. <\/p>\n<p><sup>6 <\/sup>Ibid.<\/p>\n<p><sup>7 <\/sup>Techopedia. \u201cDictionary Attack.\u201d <a href=\"https:\/\/www.techopedia.com\/definition\/1774\/dictionary-attack\">https:\/\/www.techopedia.com\/definition\/1774\/dictionary-attack<\/a>. Accessed Aug. 29, 2019.<\/p>\n<p><sup>8 <\/sup>John William. CPO Magazine. Aug. 29, 2019. \u201cMovies<br \/>\nThat Can Help You Understand Data Privacy and Hacking.\u201d <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/movies-that-can-help-you-understand-data-privacy-and-hacking\/\">https:\/\/www.cpomagazine.com\/cyber-security\/movies-that-can-help-you-understand-data-privacy-and-hacking\/<\/a>. Accessed Aug. 29, 2019.<\/p>\n<p><em>We are an independent<br \/>\nfirm helping individuals create retirement strategies using a variety of<br \/>\ninsurance products to custom suit their needs and objectives. This material is<br \/>\nintended to provide general information to help you understand basic retirement<br \/>\nincome strategies and should not be construed as financial advice. <\/em><\/p>\n<p><em>The information<br \/>\ncontained in this material is believed to be reliable, but accuracy and<br \/>\ncompleteness cannot be guaranteed; it is not intended to be used as the sole<br \/>\nbasis for financial decisions. If you are unable to access any of the news<br \/>\narticles and sources through the links provided in this text, please contact us<br \/>\nto request a copy of the desired reference.<\/em><\/p>\n<p>947387B<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Most people using the internet to shop, conduct financial transactions or read firewall-protected content are likely familiar with the aggravation of maintaining passwords. Worse yet, tech experts now say conventional password security is only a marginal defense against hacking.1 We are now entering a new age in electronic security for the average user \u2014 one&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[],"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":0,"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"wp:attachment":[{"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ladintax.com\/blog\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}