Hidden fingerprint reader could aid removal of buttons from front of smartphones
Flagship smartphones and tablets of the future may not have a visible fingerprint reader on the front of the device, if a technology from one research firm is adopted by manufacturers. Sonovation has worked out a way to bond the fingerprint sensors directly onto the underside of a smartphone's glass display, potentially allowing for a future removal of visible readers, such as the home button on more recent Touch ID-enabled iOS devices.
Claims attackers can acquire fingerprint data before it is secured
The fingerprints of owners of some Android smartphones could be acquired by hackers, researchers claim. A flaw, said to affect the Samsung Galaxy S5 and other unnamed Android devices, allegedly allows an attacker to copy the biometric data on the device itself, suggesting that fingerprint-based security on Android is not as secure as first thought.
Acquisition of AuthenTec by Apple prompted removal of planned Nexus 6 function
The Google Nexus 6 was going to have a fingerprint sensor, but Apple forced a change in the phone's design, the ex-CEO of Motorola claims. The Android smartphone was initially going to have a fingerprint reader on the back, where a Motorola-branded dimple now resides, but Apple's acquisition of AuthenTec is said to have put a stop to those plans completely.
Zwipe, MasterCard team up to combine fingerprint authentication, contactless payments
At a press event last week, MasterCard and Zwipe announced a new type of payment card dubbed the Zwipe MasterCard. Where the new card is different from the the standard credit or debit card is in the payment process, looking to biometrics to approve purchases. The Zwipe MasterCard uses authentication via fingerprint for MasterCard contactless payment terminals, while retaining Europay, MasterCard and Visa (EMV) chips on cards.
Iris scanner highlighted as next security system by Samsung executive
Samsung is looking to add more biometric sensors to its future smartphones, an executive has revealed. Following on from the fingerprint reader built into the current flagship, the Galaxy S5, the company hopes to add similar systems throughout its range, even for low-specification smartphones, with the next security feature likely to use iris recognition.
TYLT announces new Energi Sliding Power Case and ALIN screen protector for new Galaxy S5
Portable power and wireless charging manufacturer, Tylt, has today introduced its Energi Sliding Power Case and Alin Screen Protector for the newly released Samsung Galaxy S5. The Energi Sliding Power Case pairs portable charging with physical protection, and is equipped with a 2,800mAh internal battery that is double the capacity of the Galaxy S5. The ALIN screen protector facilitates an easy installation, with its accompanying alignment tool. Four screen protectors are provided, with each featuring two removable tabs to avoid fingerprints during the application process.
Touch ID more reliable, but S5 swipe reader able to be used with more merchants
A new video posted to YouTube offers a head-to-head demonstration of the iPhone 5s' "Touch ID" fingerprint-recognition technology and the "swipe-style" fingerprint reader found in Samsung's Galaxy S5, its just-released latest flagship smartphone. Over the course of five minutes, the poster of the video makes clear that Touch ID, first introduced late last year, continues to offer a better overall experience. The clip covers the technical aspects of both companies' approaches.
Dual-sensor camera, larger display touted in HTC One sequel
The next version of the HTC One could be coming out in March, according to a report. The new smartphone, said to be codenamed the M8, will apparently ship with a larger display when compared to the original, a twin-sensor rear camera, and according to other reports, though new photographs of a back cover are said by some to be proof it will have some form of fingerprint scanner.
Hacker group offering unusual reward for breaking iOS authentication
A group in German claims to have successfully worked around Apple's new Touch ID biometric system, albeit using an extremely elaborate system to do so, involving a high-resolution lifted fingerprint and creating a "fake finger" that mimics a real one that has the lifted fingerprint printed onto latex milk or wood glue and then applied -- and of course physical access to the iPhone that utilizes that particular fingerprint. A different hacker group is offering a reward for such a solution, including cash, Bitcoins, liquor and books as a reward.
Passcode still required as fallback, used if finger not ID'd within 48 hours
More details have emerged about Apple's Touch ID system, built into the home button of the forthcoming iPhone 5s. The company has confirmed that the devices doesn't store an actual image of the user's fingerprints, for example, and further revealed that a basic passcode is required to be set up as a fallback before users can set up one or more fingerprints that can be used to unlock the iPhone 5s or make iTunes Store purchases. The ID data, as the company said on Tuesday, remains locally-stored and encrypted.
Security feature will be left out of cheaper iPhone 5C, paper says
On the eve of Apple's announcement of new iPhones, the Wall Street Journal is reporting that the long-rumored home button fingerprint scanner will become a feature of the iPhone 5S, the company's next model of premium smartphone. The fingerprint sensor will likely be used in addition to standard security measures such as PIN numbers or passcodes, but add a significant extra layer of security which could push e-commerce, banking and other high-security applications forward, in addition to making iPhones less valuable to thieves.
Apple-owned Authentec's software at fault, exploit available
Several PC security firms have independently verified a weakness in Authentek's UPEK Protector Suite that allows hostile users with physical control of a machine to rapidly recover Windows account passwords. The software is pre-installed in Windows-based PCs by makers including Dell, Gateway, NEC, Samsung, Sony, and Toshiba. An open-source exploit of the flaw has been released by a pair of security researchers so that paid intrusion testers can exploit the weakness.