HomeTech PointThousands of Fingerprint Data...

Thousands of Fingerprint Data Exposed

Antheus Tecnologia’s web server containing records of about 76,000 unique fingerprints was exposed on the internet. Researchers said Wednesday. The unsecured fingerprint data, as well as employee email addresses and telephone numbers, had been collected.

According to Anurag Sen, the researcher who published his findings with antivirus analysis site Safety Detectives, the database, which held close to 2.3 million data points, most of which were server access logs, has now been secured. The fingerprint data was processed as a stream of binary data, which is a series of ones and zeroes. Anurag Sen further said that bad actors could transform that data back into a biometric fingerprint picture.

And even though they are not able to find a way to use the data for immoral purposes, that will change as technology progresses, “It might be that in the future they’ll find a way to exploit it,” Sen said. “Fingerprints are permanent throughout life.”

Although, we didn’t get an immediate response from Antheus Tecnologia to a request for comment.

Research is an excellent example of exposed databases, a growing issue that presents confidential data to everyone with the right I.P. address. As mostly the companies transfer internal data from their servers into the cloud, inexperienced I.T. staff frequently abandons the web-based databases accidentally without password protection. This disclosed Peru’s national identification numbers, personal contact details stored in a U.K. marketing database, and medical histories of opioid recovery patients in the U.S. Investigators are looking for the vulnerabilities and trying to get the data to safe businesses.

Protecting emails and other online accounts with passwords isn’t the only way to keep cloud services secure. A new feature from MongoDB software maker lets database managers store encrypted cloud data. But this feature needs to be switched on and proper configurations these solutions to work.

Check out: WhatsApp fingerprint Lock Feature – Extra Level of Security

The fingerprint data includes ridge bifurcation and ridge end data, identifying characteristics used to break fingerprints separately. Logs in the accessible cache also let researchers see which records a particular fingerprint scan is associated with. Many significant breaches to fingerprint data include misuse by the U.S. Personnel Management Office in 2015, where hackers stole background check data on government employees, including over 1 million fingerprints.

Sen claimed in his report with Safety Detectives that the value of holding fingerprints data stored securely is growing. However, academic researchers have created biometric replicas that can fool fingerprint readers in a virtual environment (they didn’t check real phones). In the future, hackers could use a high-quality fake to access your mobile phone or computer’s private information. Sen said, “such as texts, images, and methods of payment stored on your system.”

Most Popular

More from Author

Transitioning from Traditional Landlines to VoIP

In the digital age, businesses are constantly seeking ways to improve...

DJI Osmo Pocket 3 Review: The Ultimate Portable Filming Marvel

In 2020, DJI launched the Osmo Pocket 2, a notable upgrade...

6 Reasons Why You Should Get a Monsgeek keyboard With Akko Switches

Mechanical keyboards have seen a huge surge in popularity in recent...

Creating Photos for Passports is Pretty Easy with AI

Passport photos, similar to other important documents, often require images or...

Read Now

Best Way to Burn MP4 to DVD on Windows/Mac

People like to download various streaming videos online and then watch them on their mobile phones or computers. But some users prefer to enjoy videos on a large TV screen. Therefore, you can choose to download the favorite videos and convert and burn them to DVD. This...

How Audioenhancer.ai Can Make Your Audio and Video Recordings Sound Better?

Are your videos and recordings sounding less than perfect? Whether you're a content creator, a business professional, or just someone who enjoys capturing moments, the quality of your audio and video recordings can significantly impact the overall experience. Fortunately, there's a solution that can transform your mediocre audio...

Full VideoHunter Facebook Downloader Review: Download Facebook Videos in High Quality

VideoHunter, the world’s most popular video downloading solutions provider, has newly released VideoHunter Facebook Downloader to help you hunt video resources from the most widely-used social media platforms, Facebook, and grasp them as personal collections offline easily. This comprehensive review on VideoHunter Facebook Downloader will introduce this...

Common Testing Methods for PCB Assembly

Printed Circuit Board Assemblies (PCBAs) are critical components in modern electronics. They are found in almost every electronic device, from smartphones and laptops to industrial equipment and medical devices. Ensuring the functionality and reliability of these assemblies is essential. This blog post will discuss common testing methods...

How Live Chat is Driving Sales and Shaping the Future of E-Commerce

In today’s tech-savvy world, e-commerce is changing rapidly, and customer-centric strategies are now prominent. One such strategy is the integration of live chat, an underappreciated powerhouse. Connecting customers to service agents in real-time, live chats are turning into the backbone of sales in e-commerce, paving the way...

Best Amazon Music Converter Review [2023 Update]

When Amazon Music applied DRM to encrypt all its streaming music resources, there are some regulations you need to pay attention while accessing and enjoying them within the platform. So if you probably wonder if there is a way to bypass this obstacle and download Amazon to...

Evening Activities That Will Make You More Happy

Are you sick and tired of feeling down in the evening? Do you want to feel happier, more productive, and less stressed after the work day ends? If so, you should read this blog article. In these hectic times, it's important to find activities that bring us...

How to Remove DVD Copy Protection (3 Best Ways)

To combat piracy, actions have been taken to safeguard the audio and video on DVD discs, commonly referred to as DVD Copy Protection. However, these measures can also impact enjoying DVD content on smartphones, tablets, laptops, and other mobile devices from an individual perspective. If you are...

MuConvert Apple Music Converter Review: Best DRM Removal Tool

The field of music downloading and conversion is highly competitive, with the challenge of removing digital rights management (DRM) protection. Today, we will have a comprehensive review of a prominent tool for downloading Apple Music, MuConvert Apple Music Converter. Looking through, you will gain valuable insights into...

Surfshark VPN: A Great Way to Protect Your Online Presence

VPNs can increase your online anonymity by routing your web traffic through an encrypted connection to a faraway server. However, this level of security can come at a cost – in the case of Surfshark VPN, in actual dollars and cents. The Surfshark VPN is our most...

The First 8 Things You Should Always Do with Your New PC

Unboxing a new prebuilt gaming PC or your new home office desktop is like opening a treasure chest of possibilities. However, to ensure longevity, top performance, and security, some essential tasks must be addressed before you can start using your PC. Discover the first eight things you should...

The Main Differences Between Virtual Phone Numbers and SIM-card

In today's world, saturated with information and technological innovations, virtual phone numbers to receive SMS are becoming an indispensable tool for ensuring security and privacy online. This technology, seemingly insignificant at first glance, has long ago transcended purely entertainment purposes and has become an important tool in...