Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Finger fingerprint sensors have been in existence for a long time, and they have become a standard function in most smartphones. Apple introduced the Touch ID on the iPhone 5s in 2013. Since then, it has appeared on 12 major iPhone models (and some iPad).
Although Apple removed it from most phones after the iPhone 8, it is still in the iPhone SE series. From the Flip, almost every Phone Android The market has a fingerprint scanner. But is it impossible to bypass the fingerprints? Frank from Dertan, Michigan, asked a similar question I want to highlight and address because it helps all of us:
“Is it possible to crack/compromise the web -resite with a password and protection of the fingerprint (multiple check)?”
I understand what you say, Frank. You might think that since your fingerprint scanner literally requires your fingerprints, it cannot be bypassed. But you are mistaken. While fingerprint scanners are usually safer than personality recognition and passwords, they are not stupid. In fact, there are several ways like bad actors can bypass them to steal your identity.
A smartphone on the table (Kurt “Cyberguy” Knutson)
There are several ways as hackers use fingerprint scanners. Below I discuss the five most notable methods.
Hackers exploit the “MasterPrints” concept that are developed by fingerprints to match several people. The researchers in Nyu Tandon has developed “Deepmasterprints” Use of machine learning to create synthetic fingerprints that can fool sensors by mimicking the overall fingerprints. These artificial prints can match a significant percentage of the stored fingerprint, especially on devices with less stiff Settings Security.
Another trick of hackers is the production of fake fingerprints. They can raise the prints of things you have touched, and then use things like fabric adhesive or even 3D printers to make forms. For example, CISCO Talos Researchers Tried a bunch of different ways to do this by using 3D -printed and tested them on phones like iPhone 8 and Samsung S10; laptops such as Samsung Note 9, Lenovo Yoga and HP Pavilion X360; And even smart gadgets such as locks.
On average, fake fingerprints worked about 80% of the time. They were able to deceive the sensors at least once. Interestingly, they were unable to crack biometric systems on Windows 10 devices, but they noted that it didn’t necessarily mean they are safer. It just means that this particular method did not work on them.
19 billion passwords were leaked on the Internet: How to Protect yourself
The attackers found a cheap way to break into smartphones by checking the authenticity of fingerprints. The method called BrutePrint allows the attackers to bypass the usual restrictions that stop too much unsuccessful fingerprint attempts. It works using two previously unknown deficiencies in the fingerprint system. These deficiencies, named after the match (CAMF) and Matce-After (Mal), are due to the weak protection of the fingerprint data on the equipment called serial peripheral interface (SPI).
In principle, Britprint uses the apparatus based on the average attack for data prints. It sits between the fingerprint sensor and the safe area of the phone (called a reliable performance environment) and tries as many fingerprints as necessary until the coincidence is found. The weakening part is that the attacker must have physical access to the phone so that this method works.
Printlistener is a side attack that fixes the sound of a finger that conducts on the screen to find fingerprint features. This may seem like something from a science-fiction film, but the researchers have already created proof of the concept. Analyzing the sounds of friction, attackers can restore fingerprint models, potentially increasing the effectiveness of MasterPrint attacks.
Some devices store fingerprints without proper encryption. When attackers get access to these unprotected data, they can repeat their fingerprints to get around the authentication. For example, in 2024, the wrong server exposed almost 500 GB of sensitive biometric data, including fingerprints, personality scanning and law enforcement applicants.
Image of a smartphone (Kurt “Cyberguy” Knutson)
20 best applications that track you every day
The fingerprint scanners allow you to easily and quite safely unlock devices. Because everyone has unique fingerprints, you do not need to remember complex passwords. Only a quick touch and you are. Most modern devices retain fingerprint data in safe parts of the system, and they use things such as finding life to make sure someone does not try to cheat the fake finger.
However, no safety method is perfect. Qualified attackers found ways to pass past fingerprint scanners using high-resolution photos or 3D-printed fingers or using the disadvantages in how the scanner talks to the rest of the devices. The risk really depends on how well developed the scanner and how much effort someone will make to break it. For most people, fingerprint authentication is fast, simple and safe. However, if you are dealing with very sensitive information, based only on biometry, it may not be the best idea.
How to remove personal information from people’s search sites
A person who uses fingerprints to verify security purposes (Kurt “Cyberguy” Knutson)
10 simple steps to improve your smartphone security and privacy
Keep your biometric identity with these major security measures.
1. Choose trusted phones: If you buy a phone, follow famous brands As AppleSamsung or Google. These companies take extra steps to protect your fingerprints, keeping them in safe areas of the phone that are more difficult to access. Cheaper or less famous brands may not have these protection, which facilitates the stolen your data.
2. Happy your phone update: Phone updates Not just about new features. They correct security problems that hackers can use to break into your device. If your phone asks you to install the update, do it. Most phones also allow you to include automatic updates, so you don’t have to worry about the memory. Software update is one of the easiest and most important ways to stay protected.
3. Use strong antivirus software: Install a strong antivirus software to detect malicious software that can threaten biometric data. Strong anti -virus software offers real -time threats, anti -fascing and privacy features to block unauthorized access to fingerprints. The best way to keep yourself from malicious links that install malicious software is potentially accessing your private information is to create a strong antivirus software installed on all your devices. This protection can also warn you about phishing email letters and frauds of ransom while maintaining your personal information and digital assets. Get my elections for the best winners of the 2025 antivirus protection for Windows, Mac, Android and iOS devices.
What is artificial intelligence (AI)?
4. Do not rely only on the imprint of your fingers: Using fingerprints to unlock your phone is convenient, but it should not be the only protection, especially for sensitive applications such as banking or email. Always install a pin, password or sample as a backup on your iPhone and Android. So, even if someone manages to copy the imprint of their fingers, they still need another information to enter.
5. Be careful to the one who processes your phone: If someone else uses your phone, especially a stranger or the one you don’t know well, they could copy your fingerprint from the screen. This is rare but it happens. To reduce this risk, avoid transferring your phone to people unnecessarily and periodically wipe the screen to remove any clear prints.
6. Use only fingerprint input with reliable applications: Not every app that asks your fingerprint is reliable. The safest use of the fingerprint entry is only with apps of famous and reliable companies such as your bank, phone manufacturer or email provider. If an unfamiliar application asks for access to fingerprints, it is better to miss it and instead use your password.
7. Try to use personal data deletion: Even fingerprint scanners can be bypassed, and a large number of personal and biometric data are subjected to violations. Using personal data removal helps to reduce the risk by deleting your secret information from public databases and brokers’ database, which complicates hackers to collect details that can be used to steal your personality. Check my main election for data deletion services here.
Get Free Scan To find out if your personal information is online.
What hackers can learn about you from your broker file
Passwords are usually easier to crack than biometric data such as fingerprints or face recognition. However, the key difference is that the passwords can be changed if they are compromised. Your biometry cannot. Most modern devices allow both options and biometry to offer an additional safety layer, complicating access to your phone or applications. They are also fast and comfortable, because you do not need to remember and introduce. Given this, in most cases your device is still back on a password or pin if biometric identification does not work, so both systems often go hand in hand.
Click here to get the Fox News app
With increasing sophistication of methods to bypass the safety of the fingerprint, what should companies do to stay ahead of these threats and better protect users? Tell us by writing us in Cyberguy.com/contact
For more information on your technological tips and security alerts, sign up for my free newsletter according to Cyberguy, heading for Cyberguy.com/newsletter
Ask the curtain question either tell us what stories you would like us to cover
Keep track of Kurt on his social channels
Answers to the most asked questions Cyberguy:
New from Kurt:
Copyright 2025 Cyberguy.com. All rights are protected.