Thursday, April 19, 2018
  • 48 million people put at risk after firm that scraped info from social networks left it exposed for anyone to download
  • Alaskan airline hacker sentenced to 5 years’ probation
  • How to Stop Cryptomining and Cryptojacking Attacks
  • #TripwireBookClub – Attacking Network Protocols
  • Replace macOS® Open Directory

Security Boulevard

The home of the Security Bloggers Network

  • News   |  
  • Community   |  
  • Chats   |  
  • Webinars   |  
  • Download   |  

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
Identity & Access IoT & ICS Security Security Bloggers Network 

Home » Cybersecurity » Identity & Access » Fooling Face Recognition with Infrared Light

Fooling Face Recognition with Infrared Light

by Bruce Schneier on March 27, 2018

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers.

BoingBoing post.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • More
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Share on Skype (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

This is a Security Bloggers Network syndicated blog post authored by Bruce Schneier. Read the original post at: Schneier on Security

March 27, 2018March 27, 2018 Bruce Schneier 0 Comments academicpapers, biometrics, facerecognition, security bloggers network, spoofing
  • ← Get the Real Scoop: Office 365 Backup Policies & How to Fully Protect Your Data
  • DevSecOps Beyond the Myths: Cutting Through the Hype and Getting to Results →

Search SecurityBoulevard.com

Newsletter Sign-up

Most Read on the Boulevard

Does Your Bug Bounty Program Need an Overhaul?
Hackers Exploit Drupal Vulnerability to Install Cryptocurrency Miners
Will Data Regulation Help Stop Data Breaches?
Cisco Strengthens Cloud Security Service
Security Patches: Move Faster to Keep Up With the Bad Guys
Teen Faces 10 Years in Prison for Downloading 7K Freedom of Information Releases
Does Your Bug Bounty Program Need an Overhaul?
This is Spartacus: new ransomware on the block
Identity Thieves – Phishing and Pilfering Your PII
Cloud Directory Feature G Suite™ Integration

Upcoming Webinars

May 08

Security at the Speed of Software Development

May 8 @ 11:00 am - 12:00 pm

More Webinars

RSS Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

How to Stop Cryptomining and Cryptojacking Attacks
Cybersecurity Industry Spotlight Network Security Security Boulevard (Original) 

How to Stop Cryptomining and Cryptojacking Attacks

April 19, 2018 Manuel Nedbal | 2 hours ago 0
Will Data Regulation Help Stop Data Breaches?
Governance, Risk & Compliance Industry Spotlight Security Boulevard (Original) Uncategorized 

Will Data Regulation Help Stop Data Breaches?

April 16, 2018 Jane Goodayle | 3 days ago 0
When Your Greatest Cybersecurity Doubters Are in the C-Suite
CISO Suite Industry Spotlight Security Boulevard (Original) 

When Your Greatest Cybersecurity Doubters Are in the C-Suite

April 9, 2018 Ken Pfeil | Apr 09 0

Top Stories

Mobile Surveillance Malware Found on Google Play
Featured Malware Mobile Security News Security Boulevard (Original) Spotlight 

Mobile Surveillance Malware Found on Google Play

April 18, 2018 Lucian Constantin | Yesterday 0
Security Boulevard’s 5 Most Read Stories for the Week, April 9-13
Cybersecurity Data Security Featured Governance, Risk & Compliance Most Read This Week News Security Boulevard (Original) Spotlight Threats & Breaches 

Security Boulevard’s 5 Most Read Stories for the Week, April 9-13

April 16, 2018 Charlene O’Hanlon | 2 days ago 0
Cisco Strengthens Cloud Security Service
Cybersecurity Featured Network Security News Spotlight 

Cisco Strengthens Cloud Security Service

April 16, 2018 Michael Vizard | 2 days ago 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2018 Mediaops Inc. All rights reserved.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.