Fingerprint authentication News
January 22, 2015
Juniper Research claims that the popularity of biometric authentication will rise dramatically in the next five years, incorporating innovative technology beyond today's fingerprint sensors and voice authentication systems.
September 15, 2014
Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.
November 15, 2013
Video: Do new iOS 7 security features and the addition of Touch ID bring real benefits to Apple mobile security? Securosis CEO Rich Mogull discusses.
September 20, 2013
If users readily embrace Apple's new Touch ID fingerprint reader, experts say it could press enterprise biometric adoption forward.
Fingerprint authentication Get Started
Bring yourself up to speed with our introductory content
Browser and device fingerprinting create cookies that users cannot prevent nor delete. Expert Michael Cobb explains how to address the threat. Continue Reading
Touch ID is now available for integration into native iOS and third-party applications, opening up a wide array of uses. Now, the ball is in enterprise IT's court. Continue Reading
Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers. This definition of canvas fingerprinting explains what it is, how it works, and how to disable it. Continue Reading
Evaluate Fingerprint authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The iPhone 5s comes equipped with a fingerprint scanner for user authentication, which presents some intriguing use cases for physicians. Continue Reading
Manage Fingerprint authentication
Learn to apply best practices and optimize your operations.
Problem Solve Fingerprint authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Biometric authentication helps ensure only authorized smartphone users can access a network. David Jacobs weighs the pros and cons of three methods. Continue Reading
As part of our series on hacker tactics and techniques, in this tip you will learn how to identify and avoid certain hacker strategies, such as probing and fingerprinting. Continue Reading