Saturday, May 17, 2025
News PouroverAI
Visit PourOver.AI
No Result
View All Result
  • Home
  • AI Tech
  • Business
  • Blockchain
  • Data Science & ML
  • Cloud & Programming
  • Automation
  • Front-Tech
  • Marketing
  • Home
  • AI Tech
  • Business
  • Blockchain
  • Data Science & ML
  • Cloud & Programming
  • Automation
  • Front-Tech
  • Marketing
News PouroverAI
No Result
View All Result

PrintListener Proves A James Bond-like Fingerprint Hack Actually Exists

February 20, 2024
in Data Science & ML
Reading Time: 4 mins read
0 0
A A
0
Share on FacebookShare on Twitter


Researchers in China and the US have revealed a novel fingerprint hack named PrintListener capable of stealing your fingerprint data, not from photos or lifted prints, but from the faint sound your finger makes when swiping your smartphone screen.

Fingerprint authentication has become synonymous with security on our smartphones and devices. Worth an estimated $100 billion by 2032, the market reflects our deep trust in biometric protection.

But PrintListener demonstrates that, like any technology, biometrics have vulnerabilities.

How PrintListener works?

Our everyday apps, like Discord, Skype, FaceTime, and many others, were designed for communication. But what if they could do more than transmit your voice?

Researchers behind PrintListener raise a disturbing possibility: These apps could be acting as an unwitting accomplice to a fingerprint hack. Every time you swipe across your smartphone screen, even during those seemingly casual conversations, your microphone might be inadvertently recording a hidden soundtrack: The subtle friction generated by your fingerprint ridges.

PrintListener can steal fingerprint data using sounds recorded from smartphone swipes (Image credit)

Turning sounds into fingerprint data

PrintListener isn’t just about hearing these micro-sounds; it’s about interpreting them. The tool employs sophisticated analysis to dissect the faint acoustics of your swipes, meticulously searching for patterns unique to your fingerprint.

Unlike traditional dictionary attacks, which rely on pre-built databases of common fingerprint patterns, PrintListener can use this newly captured audio data to enhance attacks like MasterPrint. That means potentially customizing fingerprint forgeries with far greater accuracy.

Fingerprint hack has a shocking success rate

The effectiveness of PrintListener lies in its numbers. Researchers boast a worrisome success rate. Within just five attempts, PrintListener could crack 27.9% of partial fingerprints. Even more chilling, 9.3% of the time, PrintListener was able to reconstruct complete fingerprints from swiping sounds alone.

It highlights how this novel exploit transforms harmless interactions with seemingly unassuming apps into a potent tool for hackers.

PrintListener fingerprint hack
PrintListener boasts an unnerving success rate in cracking partial fingerprints (Image credit)

Cyberthreats are constantly evolving

The PrintListener revelation underscores a broader trend in cybersecurity: There is a new sophisticated hacking method being developed day by day. Technology intertwines with almost every aspect of our lives nowadays and hackers are constantly searching for and discovering new vulnerabilities, often in the most unexpected places.

From AI-powered phishing attacks that mimic trusted voices to malware embedded within seemingly innocuous QR codes, the tactics of cybercriminals evolve at an alarming pace.

Let’s consider a few recent examples:

WhisperGate: In early 2022, this destructive malware emerged, masquerading as legitimate ransomware while quietly wiping entire systems of Ukrainian organizations in a politically motivated attack
Log4j vulnerability: Late 2021 saw the revelation of a critical zero-day vulnerability in a widely used logging library. Log4j’s extensive presence meant a scramble ensued, exposing numerous systems to remote control exploits
Supply chain attacks: Hackers aren’t just breaking in; they’re infiltrating systems from within. Through vulnerabilities in the software development ecosystems (like the infamous SolarWinds hack), attackers manage to compromise widely used products and services, leading to massive downstream impacts

These examples underscore that traditional approaches to security won’t cut it. Our technology isn’t just expanding, it’s becoming more complex and interdependent. Hackers relentlessly hunt for weaknesses in these complex systems, exploiting both technological flaws and the often-overlooked human element.

PrintListener fingerprint hack
Attackers find surprising vulnerabilities in our connected technology and their methods are constantly evolving (Image credit)

Protecting yourself against emerging threats

The PrintListener attack and other emerging cyber threats might feel daunting, but remember you have the power to protect yourself. Embrace proactive security measures that drastically reduce your risk.

Here’s a breakdown of essential actions you can take:

Control your apps: Conduct an audit of your apps. Check which ones have microphone and camera access and disable it for those who don’t genuinely need these permissions for their core functionality
Biometrics: Use with Caution: Biometric security features like fingerprint and facial recognition offer convenience, but don’t treat them as foolproof. View them as useful tools rather than unbreakable shields
Passwords are paramount: Choose complex, unique passwords for every account, and never reuse them. Wherever possible, turn on multi-factor authentication (MFA), which requires an additional code or confirmation alongside your password
Fight phishing: Be skeptical of unexpected emails, texts, or social media messages, even if appearing to come from familiar sources. Verify a sender’s identity before opening any links or attachments
Updates matter: Ensure you have the latest security updates for your operating system and apps. These frequent patch vulnerabilities, minimize the openings hackers could exploit

By implementing these basic yet powerful security practices, you’ll greatly enhance your digital protection against the constantly evolving cyber threats.

Featured image credit: George Prentzas/Unsplash.



Source link

Tags: BondlikeExistsFingerprintHackJamesPrintListenerProves
Previous Post

Mask Network (MASK) Bonfire Union Achieves $100 Million Milestone

Next Post

What is an IDE and how will it be used in working with AI in 2024? – Dataquest

Related Posts

AI Compared: Which Assistant Is the Best?
Data Science & ML

AI Compared: Which Assistant Is the Best?

June 10, 2024
5 Machine Learning Models Explained in 5 Minutes
Data Science & ML

5 Machine Learning Models Explained in 5 Minutes

June 7, 2024
Cohere Picks Enterprise AI Needs Over ‘Abstract Concepts Like AGI’
Data Science & ML

Cohere Picks Enterprise AI Needs Over ‘Abstract Concepts Like AGI’

June 7, 2024
How to Learn Data Analytics – Dataquest
Data Science & ML

How to Learn Data Analytics – Dataquest

June 6, 2024
Adobe Terms Of Service Update Privacy Concerns
Data Science & ML

Adobe Terms Of Service Update Privacy Concerns

June 6, 2024
Build RAG applications using Jina Embeddings v2 on Amazon SageMaker JumpStart
Data Science & ML

Build RAG applications using Jina Embeddings v2 on Amazon SageMaker JumpStart

June 6, 2024
Next Post
What is an IDE and how will it be used in working with AI in 2024? – Dataquest

What is an IDE and how will it be used in working with AI in 2024? – Dataquest

10 Figma accessibility plugins that make up for the lack of inbuilt options

10 Figma accessibility plugins that make up for the lack of inbuilt options

7 Clickbait Examples (Why They Do or Don’t Work)

7 Clickbait Examples (Why They Do or Don’t Work)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Is C.AI Down? Here Is What To Do Now

Is C.AI Down? Here Is What To Do Now

January 10, 2024
Porfo: Revolutionizing the Crypto Wallet Landscape

Porfo: Revolutionizing the Crypto Wallet Landscape

October 9, 2023
23 Plagiarism Facts and Statistics to Analyze Latest Trends

23 Plagiarism Facts and Statistics to Analyze Latest Trends

June 4, 2024
A Complete Guide to BERT with Code | by Bradney Smith | May, 2024

A Complete Guide to BERT with Code | by Bradney Smith | May, 2024

May 19, 2024
Part 1: ABAP RESTful Application Programming Model (RAP) – Introduction

Part 1: ABAP RESTful Application Programming Model (RAP) – Introduction

November 20, 2023
Saginaw HMI Enclosures and Suspension Arm Systems from AutomationDirect – Library.Automationdirect.com

Saginaw HMI Enclosures and Suspension Arm Systems from AutomationDirect – Library.Automationdirect.com

December 6, 2023
Can You Guess What Percentage Of Their Wealth The Rich Keep In Cash?

Can You Guess What Percentage Of Their Wealth The Rich Keep In Cash?

June 10, 2024
AI Compared: Which Assistant Is the Best?

AI Compared: Which Assistant Is the Best?

June 10, 2024
How insurance companies can use synthetic data to fight bias

How insurance companies can use synthetic data to fight bias

June 10, 2024
5 SLA metrics you should be monitoring

5 SLA metrics you should be monitoring

June 10, 2024
From Low-Level to High-Level Tasks: Scaling Fine-Tuning with the ANDROIDCONTROL Dataset

From Low-Level to High-Level Tasks: Scaling Fine-Tuning with the ANDROIDCONTROL Dataset

June 10, 2024
UGRO Capital: Targeting to hit milestone of Rs 20,000 cr loan book in 8-10 quarters: Shachindra Nath

UGRO Capital: Targeting to hit milestone of Rs 20,000 cr loan book in 8-10 quarters: Shachindra Nath

June 10, 2024
Facebook Twitter LinkedIn Pinterest RSS
News PouroverAI

The latest news and updates about the AI Technology and Latest Tech Updates around the world... PouroverAI keeps you in the loop.

CATEGORIES

  • AI Technology
  • Automation
  • Blockchain
  • Business
  • Cloud & Programming
  • Data Science & ML
  • Digital Marketing
  • Front-Tech
  • Uncategorized

SITEMAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 PouroverAI News.
PouroverAI News

No Result
View All Result
  • Home
  • AI Tech
  • Business
  • Blockchain
  • Data Science & ML
  • Cloud & Programming
  • Automation
  • Front-Tech
  • Marketing

Copyright © 2023 PouroverAI News.
PouroverAI News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In