Google buys sound-based authentication startup SlickLogin

SlickLogin has proposed a rather novel way to replace or augment the age-old password system with sound. It seems that Google has been listening and has just acquired the startup, … Continue reading

Body Odor Used In ID Identification

Body Odor Used In ID Identification Fingerprints, a social security number, your dental records – the list goes on when it comes to identifying your identity. How about one’s body odor? BoIn happens to be a possible futuristic form of biometric identification, where it will be able to figure out just who you are using your body odor alone. It seems that fingerprints, iris scans and facial recognition will have another “friend” to join the biometric identification posse, although the rest seem a whole lot more dignified. Scientists over at Spain’s Universidad Politécnica de Madrid have stated that one’s scent has the potential to remain similar even over time without changing, so much so that one can achieve an ID accuracy rate of approximately 85%.

(more…)

  • Follow: General, , ,
  • Body Odor Used In ID Identification original content from Ubergizmo.

        



    Kickstarter hacked: credit cards safe, addresses and phone numbers lifted

    This afternoon Kickstarter sent a message out to users detailing a hacker attack on their network. This network attack apparently had hackers given access to email addresses, mailing addresses, phone … Continue reading

    Kickstarter CEO Says Site Hacked, No Credit Card Info Stolen (Updated)

    Kickstarter CEO Says Site Hacked, No Credit Card Info Stolen (Updated)

    Uh oh, Kickstarter’s CEO Yancey Strickler says that the company has been hacked. No credit card info was stolen (whew!), but the company says users’ personal info has been compromised. Better go change your password.

    Read more…


        



    Huawei snubbed in South Korea over spying concerns

    According to US officials that spoke with The Wall Street Journal, South Korea has fallen in line with US requests that sensitive communications be routed to bypass Huawei network equipment. … Continue reading

    Hackers take advantage of unknown flaw in Internet Explorer to attack web users

    Computer users are vulnerable to all sort of attacks that seek to steal personal information or install nefarious software on PCs. At times, the attacks target flaws in the computer … Continue reading

    US lawmakers now backing mobile phone kill switch plan

    A few days ago, we mention that plans for a smartphone kill switch were making their way through the state of California legislative process. The reasoning for a mobile phone … Continue reading

    The History of Surveillance and the Black Community

    The History of Surveillance and the Black Community

    February is Black History Month and that history is intimately linked with surveillance by the federal government in the name of "national security."

    Read more…


        



    A Key You Can Photograph Is A Key That Can Be Copied

    A Key You Can Photograph Is A Key That Can Be Copied

    If you take a picture of a car or house key, could you use that picture to get a copy made? Yes—quite trivially, actually. I have a folder on my laptop that is filled with photos people have taken of their keys and put onto the internet. Every few weeks, I take some idle time and associate one of those keys to an address (lot of Googling, mostly) and then I decode the cuts in the key.

    Read more…


        



    Snowden pilfered coworker’s password to access data

    Edward Snowden’s breach of NSA data prompted a sweeping internal investigation into how he managed to pull off his mission. According to an agency memo acquired by the folks at … Continue reading