Biometrics is often seen as the Holy Grail for mobile security. While a username and password can be forgotten or stolen, a person's fingerprint is always the same. But there are significant privacy implications of using biometrics for security, according to a recent study by PwC sponsored by Nok Nok Labs.
Michigan State University's biometrics group has figured out how to get past fingerprint sensors on mobile phones using a color inkjet printer, AgIC paper and AgIC silver conductive ink cartridges, according to HelpNetSecurity.
U.K. industry standards association GlobalPlatform has upgraded to its card specification v2.2 to protect the data exchange between a secure element and a trusted execution environment on a mobile device.
Biometrics may hold key to solving IT department's BYOD security woes, argues an article at Midsize Insider.
Security remains a concern for companies considering or implementing a BYOD program. One solution to improve the security of mobile devices is biometrics, the use of human characteristics, such as fingerprints, for identification.
Wells Fargo has taken three mobile banking-related startups under its wing as part of its first official accelerator program.
The mobile biometrics market is forecast by TechNavio to see a 156.9 percent compound annual growth rate through 2018. Factors fueling the growth include the use of mobile devices for financial transactions and other security applications.
A number of emerging technologies are vying to revolutionize the payments industry by providing a seamless mobile experience at the point of sale. Much has been made of the Bluetooth vs. near-field communications, or NFC, faceoff, but there appears to be another rising challenger: biometrics.
The rumored inclusion of a fingerprint sensor in the next iPhone should accelerate the use of biometrics to secure mobile payments, judges Jean-Noel Georges, global program director for ICT in financial services at Frost & Sullivan.
As more and more personally owned devices enter the enterprise, the need to verify the identity of those accessing corporate networks has become paramount.