With the introduction of the iPhone 5s came a new security measure never before seen on smartphones. Apple introduced a special fingerprint sensor that replaces the passcode as a “more secure” way of accessing your device. As we have seen in the past, nothing is perfect, and the new fingerprint scanner is no exception. Before yesterday, no one was able to bypass the fingerprint scanner on the iPhone 5s to fully unlock a device without the actual fingerprint used to protect it. The “biometrics hacking team” of the Chaos Computer Club found a way to get around the security measure by making a model of someone’s fingerprint using a high resolution camera, a computer, and latex. This article explains that the process involves much more than the average thief would most likely want to do to access a stolen iPhone, but nonetheless, iPhone 5s users will have to be more careful with their devices than they previously thought. This goes to show that even the latest mobile security technology still has its flaws and users must remain cautious when it comes to sensitive data on their phones and people attempting to steal it.
GSMA privacy-by-design guidelines embraced by carriers … but not app stores
Mobile app privacy controversies have dominated the technology headlines over recent weeks, but the push for tighter privacy standards may upset existing business models, which often use targeted advertising to subsidise the price users pay for the apps.
“Giving users more transparency and understanding of data collection and giving them tools to opt-out is obviously going to impact on their targeted advertising business models. I think they are going to conveniently ignore these guidelines,”