paint-brush
Hacking Facial Recognition: How To Protect Your Company Agaist Itby@severjacob
171 reads

Hacking Facial Recognition: How To Protect Your Company Agaist It

by Jacob Sever4mOctober 1st, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Identity theft is increasingly becoming more of a threat with each passing year. One of the most recent developments to fight identity fraud is called "liveness," or "facial biometrics identification. However, liveness detection is not infallible. There are varying levels of security, and not all facial biometrics software protects against more cunning tricks. Fortunately, the most common modes of scamming have been identified. According to a global average calculated by IBM, data breaches cost companies about $3.86 million per instance. The two most common ways fraudsters attempt to circumvent verification software: spoofing and bypassing. To Stay Protected the most secure solutions should analyze parameters such as eye reflection, skin texture, image depth, capillary blood flow. The second qualification is to understand how the solution encrypts sensitive data.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Hacking Facial Recognition: How To Protect Your Company Agaist It
Jacob Sever HackerNoon profile picture
Jacob Sever

Jacob Sever

@severjacob

Co-founder & CPO at Sumsub. An expert in ID verification, anti-fraud trends and regulatory compliance.

About @severjacob
LEARN MORE ABOUT @SEVERJACOB'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jacob Sever HackerNoon profile picture
Jacob Sever@severjacob
Co-founder & CPO at Sumsub. An expert in ID verification, anti-fraud trends and regulatory compliance.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite