logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Data Security in traditional Data Centre vs Cloud Environments
  • Signal adds quantum-resistant encryption to its E2EE messaging protocol
  • MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks
  • SMBs face growing cybersecurity threats, but basic measures can lower risks
  • A look at the future of supply chain and national security: Updates from CISA and NIST

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-41616 (student_management_system) 21 September 2023
  • CVE-2023-41614 (zoo_management_system) 21 September 2023
  • CVE-2023-42482 (exynos_2200_firmware) 21 September 2023
  • CVE-2023-34576 (opartfaq) 21 September 2023
  • CVE-2023-42810 (systeminformation) 21 September 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Threat Actors Overcome Fingerprint Scanning Technologies For Malicious Intent

Posted on 21 December 2020

From cyware.com

Threat Actors Overcome Fingerprint Scanning Technologies For Malicious Intent

Recently, researcher Xianbo Wang from Hong Kong has presented his findings at Black Hat Europe, exploring fingerprint-jacking, a user interface-based attack that targets fingerprints scanned into Android apps.

Read more…

Posted in News

Post navigation

Previous post: WebSecurerr Browser Protection – an extension that claims to protect users from malicious sites but inserts intrusive ads
Next post: Common Security Misconfigurations and Their Consequences
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.