HomeTech PointThousands of Fingerprint Data...

Thousands of Fingerprint Data Exposed

Antheus Tecnologia’s web server containing records of about 76,000 unique fingerprints was exposed on the internet. Researchers said Wednesday. The unsecured fingerprint data, as well as employee email addresses and telephone numbers, had been collected.

According to Anurag Sen, the researcher who published his findings with antivirus analysis site Safety Detectives, the database, which held close to 2.3 million data points, most of which were server access logs, has now been secured. The fingerprint data was processed as a stream of binary data, which is a series of ones and zeroes. Anurag Sen further said that bad actors could transform that data back into a biometric fingerprint picture.

And even though they are not able to find a way to use the data for immoral purposes, that will change as technology progresses, “It might be that in the future they’ll find a way to exploit it,” Sen said. “Fingerprints are permanent throughout life.”

Although, we didn’t get an immediate response from Antheus Tecnologia to a request for comment.

Research is an excellent example of exposed databases, a growing issue that presents confidential data to everyone with the right I.P. address. As mostly the companies transfer internal data from their servers into the cloud, inexperienced I.T. staff frequently abandons the web-based databases accidentally without password protection. This disclosed Peru’s national identification numbers, personal contact details stored in a U.K. marketing database, and medical histories of opioid recovery patients in the U.S. Investigators are looking for the vulnerabilities and trying to get the data to safe businesses.

Protecting emails and other online accounts with passwords isn’t the only way to keep cloud services secure. A new feature from MongoDB software maker lets database managers store encrypted cloud data. But this feature needs to be switched on and proper configurations these solutions to work.

Check out: WhatsApp fingerprint Lock Feature – Extra Level of Security

The fingerprint data includes ridge bifurcation and ridge end data, identifying characteristics used to break fingerprints separately. Logs in the accessible cache also let researchers see which records a particular fingerprint scan is associated with. Many significant breaches to fingerprint data include misuse by the U.S. Personnel Management Office in 2015, where hackers stole background check data on government employees, including over 1 million fingerprints.

Sen claimed in his report with Safety Detectives that the value of holding fingerprints data stored securely is growing. However, academic researchers have created biometric replicas that can fool fingerprint readers in a virtual environment (they didn’t check real phones). In the future, hackers could use a high-quality fake to access your mobile phone or computer’s private information. Sen said, “such as texts, images, and methods of payment stored on your system.”

Most Popular

More from Author

The Evolution of Ergonomics: A Historical Perspective on Office Chairs

The humble office chair, a staple in workplaces worldwide, has undergone...

Tech-driven workspaces: a guide to modern online tools transforming office operations

In today's fast-paced world, traditional office operations are not enough to...

What Are the Benefits of Visiting a IELTS Coaching Centre Near Me?

IELTS, or the International English Language Testing System, is one of...

Elevate Your PTE Prep: The Power of Online Coaching Unleashed

Are you planning to take the Pearson Test of English Academic,...

Read Now

Tech Innovations in the Wellness Industry: Streamlining Your Massage Business

Technology has emerged as a key player in the ever-changing wellness market for massage enterprises.  Having a smooth appointment system accessible via user-friendly applications, that is able to tailor client experiences based on data insights, and streamlines all practice operations with effective management tools cannot be overemphasized. The...

4 Essential Tools for Effective Digital Product Development

In today's fast-paced digital world, companies must always improve their products and come up with new ideas to stay ahead of the competition. Digital product development is now a big part of having a business that does well. As technology has gotten better, making products digitally has...

How do Smart Home Gadgets Work?

People are shifting more and more toward smart home solutions by every passing day. These indispensable gadgets simplify tasks for users, providing them convenience and peace of mind. From smart security systems to smart home assistants, all of these devices contribute to helping reshape the meaning of a...

Securing Your Purchase: How to Track eBay Packages Effectively

Understanding Package Tracking on eBay When you make a purchase on eBay, it's crucial to keep an eye on your shipment. The ability to track eBay package offers peace of mind and ensures you're fully informed about the status of your order. Tracking isn't just a convenience; it's...

Diving into CapCut’s Online Photo Editor: Mastering Color Correction Techniques

CapCut’s online photo editor stands as a versatile toolkit for enhancing and refining images. Among its array of sophisticated features, the repertoire of color correction techniques serves as a cornerstone in the pursuit of visual perfection. This robust toolset not only allows users to perfect color balance...

Game On: Navigating the Playfield of Mobile Game Monetization Trends

In the dynamic world of mobile gaming, keeping pace with evolving trends is crucial to unlocking the full potential of your game's profitability. As the playfield of monetization continues to transform, developers need to navigate through the latest trends to ensure success. Let's explore the cutting-edge strategies that...

How to Remove Snapchat AI with or without Snapchat+

As a popular social media platform and a pioneer in fleeting message platforms, Snapchat recently launched a cutting-edge AI feature called 'My AI'. While many users appreciate and enjoy the personalized touch this AI adds to their experience, some still feel invasive or even find it creepy....

Exploring Different Monetization Models: Finding the Right Fit for Your App

Just as the mobile app industry has grown, the ways of monetizing apps have grown in recent years. There are more ways than ever to make money with apps thanks to a variety of monetization models. The catch is that not every monetization model is going to...

How to React to Instagram Messages

Instagram has become one of the most popular social media platforms for connecting with friends, family, and brands. With its massive user base, chances are you receive Instagram direct messages (DMs) regularly. Knowing how to respond thoughtfully keeps conversations going. At Pumpic, we gathered everything you need...

Advantages of Embracing the Messaging Apps in Business Tools

Communication plays a vital role in any business's growth and success. Earlier on, email was the official mode of communication among team members. Today, things are done differently, as several professional communication methods exist. There is nothing much interesting about using emails nowadays. Individuals only embrace this method...

How to Recover Photos from iCloud to iPhone [3 Ways]

Apple has brought iCloud for users to store and back up memorable photos or important screen captures. When you mistakenly delete or suddenly lose any photo on your iPhone, you don't need to worry overly, since you can recover photos from iCloud to iPhone. Today's blog will...

Transitioning from Traditional Landlines to VoIP

In the digital age, businesses are constantly seeking ways to improve efficiency, reduce costs, and enhance communication. One significant shift has been the transition from traditional landline telephony to Voice over Internet Protocol (VoIP). This technology allows voice calls to be made over the internet, offering a...