Using smartphone photos for hardware authentication

There could be another hardware authentication option for smartphones that could defeat three of the most common tactics used by cybercriminals: fingerprint forgery attacks, man-in-the-middle attacks and replay attacks. Read more at GNC.



Categories: Law, Regulation, Technology

%d bloggers like this: