Homeland Security aims to combine its face and fingerprint systems into one big biometric platform—after dismantling ...
For technology leaders responsible for identity, risk and trust, understanding the types of attacks biometric systems face (and how to defend against them) is imperative.
The hackers build fake personas to infiltrate companies as contractors and employees, relying on an organized pipeline to ...
When you share your photo ID with LinkedIn, a third-party called Persona shares it too.
For roughly a decade, Microsoft has been perfecting a high-density storage technology that uses glass, lasers, and cameras, ...
Researchers use mini plasma explosions to encode the equivalent of two million books into a coaster-sized device. The method ...
Regulation and leaked identity data are creating new physical security risks for bitcoin holders, as criminals use personal information to enable coercive attacks.
When companies and governments expand data collection in the name of security, sometimes the only way you can object is to opt out. And with facial recognition, the time to object is now.