• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    CVE-2026-3854

    GitHub Fixes Critical RCE Bug CVE-2026-3854 Within Hours of Discovery

    AI Agent, Claude

    AI Agent Deleted Production Database in 9 Secs; Then Confessed Every Rule It Broke

    CERT-In advisory

    CERT-In Warns of AI-Driven Cyber Threat Surge, MSMEs at Highest Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    W3LL Phishing, W3LL Phishing Kit, W3LL Store

    Authorities Dismantle ‘W3LL’ Phishing Empire Powering Global Business Email Attacks

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    CVE-2026-3854

    GitHub Fixes Critical RCE Bug CVE-2026-3854 Within Hours of Discovery

    AI Agent, Claude

    AI Agent Deleted Production Database in 9 Secs; Then Confessed Every Rule It Broke

    CERT-In advisory

    CERT-In Warns of AI-Driven Cyber Threat Surge, MSMEs at Highest Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    W3LL Phishing, W3LL Phishing Kit, W3LL Store

    Authorities Dismantle ‘W3LL’ Phishing Empire Powering Global Business Email Attacks

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Biometric Security Vital in Post-Quantum Future

Combining biometrics with smart design and latest authentication protocols, could become part of everyday life for millions of people as we move out of the age of passwords.

thecyberexpress by thecyberexpress
February 17, 2023
in Features
0
Biometric Security
651
SHARES
3.6k
VIEWS
Share on LinkedInShare on Twitter

Understanding Biometric Security — by Nils Gerhardt, Chief Technology Officer at Utimaco

The age of the password is over – they have shown themselves to be too easily exploited to form the backbone of digital security. Passwords can be stolen, brute-forced or guessed, and, given that 70% of people reuse passwords, guessing is very easy.

Typically, bad actors can buy a list of email addresses and, after gaining access to a site’s shadowed password file, try each password against the encrypted passwords until they get a hit.

When they do, they can use the password on the site – trying each password on the sites themselves is likely to result in a lockout, so this is rarely used.

However, new hardware devices are making it possible to avoid using passwords for anything from logging into websites to accessing restricted areas.

Combining biometric security with smart design and the latest authentication protocols, they could become part of everyday life for millions of people as we move out of the age of passwords and into a new age of much stronger security.

report-ad-banner

The password age

Passwords create a major problem for online businesses and an even larger problem for businesses and government organizations that handle sensitive information.

It has been known for a long time that foreign espionage groups use free USB sticks and phone chargers to install keylogging software on target computers, and this technique would only work if passwords remain the most important means of validating users.

Alphanumeric passwords are the standard not only for logging into websites, but in thousands of other places, the most notable being the PIN numbers used in bank cards, to unlock phones and in entry keypads.

A person looking over your shoulder could quite easily access your bank account, phone (and with it every other password stored on it) or even your home or office.

It is far more likely to have an alphanumeric password compromised by an eavesdropper or ‘social engineer’ than it is to have a password ‘hacked’.

Common encryption standards like RSA would take trillions of years to ‘brute-force’, so techniques like phishing were used in high-profile penetrations like the 2016 DNC hack. Increasing the complexity of passwords and mandating that each one be unique will only make passwords so complex that most people won’t be able to use them.

Two-factor or multi-factor authentication increases the security of password-based systems by adding other factors, but because of the effectively doubled complexity it is rarely used, leading to the fact that almost every compromised Microsoft account was one that didn’t use multi-factor authentication even when it was available.

Passwordless Security as it stands today

The concept of biometric security has been around for as long as alphanumeric passwords – you could argue that recognizing somebody by their face predates writing, and quite possibly humans themselves.

Modern biometric security such as fingerprint security, facial recognition and behavioral biometrics have become integrated into everyday life.

Although they are easier and more secure than alphanumeric passwords, the various kinds of biometric authentication still rely on information being sent from one place to another (a fingerprint reader sending a user’s fingerprint to a cloud server where it will be verified), and although it will be encrypted during transit, there is still the possibility that it could be intercepted at either end – if the fingerprint reader or even the cloud server is compromised, for example.

Many of us will already be using fingerprint security to unlock our phones, and an increasing number of us will use Near Field Communication (NFC) at least somewhere, whether that is using your phone to pay for a purchase, unlocking a door with a key fob or logging into sensitive systems (the NHS uses NFC cards to log users in to their computer network, for example.)

The FIDO security standard allows users to use NFC or USB keys to log in to websites, meaning that only a key holder would be able to log into an account.

Of course, an NFC key card can be used by anyone, and there is no way of verifying that the person using a key is its correct user without another form of verification.

These developments are coming at a time when quantum computers are being developed that may be able to break the cryptography used in passwords in a way that contemporary computers cannot.

This would mean that every piece of data not secured by one of the newly developed quantum-resistant algorithms would be insecure, and bad actors wouldn’t even need to use phishing or social engineering to break passwords — they would only need access to a quantum computer and time.

What biometric security in cyber space could look like

So, both of the potential replacements for passwords have downsides, but Nordic, R&D driven cyber tech company, Pone Biometrics, has developed a card-based biometric security system that removes both of these limitations and gives governments, companies and individuals a very powerful way of verifying their identity, on and offline.

Their solution is to have a fingerprint reader on a card that acts as a microcomputer, with its own operating system and the ability to add embedded applications to extend its use.

If a user wants to log into a website or open a door, they tap the card while pressing their thumb or finger on the reader.

The onboard computer checks their print and transmits the encrypted verification to the device securely, meaning that very little is sent between devices.

The cards themselves are only active when in use, so there is no possibility that they will be ‘skimmed’ while a user believes that they are inactive and a visual display that shows if it is in use.

The internal battery can last 2-3 weeks between charging, and it even has a failsafe system in place that protects users from being forced to use it- they can have a ‘failsafe finger’ that will wipe the device if used.

These cards could end up being used wherever there is currently the need for authentication – a government employee could use the same device to access sensitive information while at work and use it to open the door to their home and log in to accounts on their home computer.

Of course, quantum computers could break even the heightened cryptography used to protect biometrics, meaning that it needs to be integrated into any new security systems from the start.

This is something we at Utimaco have been pursuing for several years, becoming one of the key hardware companies that is developing technology to counter quantum computers years, perhaps even decades before they are widely available.

By combining next-generation biometric security cards with future-proof quantum resistance we can enter a post-password world.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Biometric Security
Previous Post

Security Pill: Risk Management is Nothing but Decision Management, Says Ash Hunt

Next Post

Researchers Spot Supply Chain Attack Using Identical PyPI Packages

Next Post
Supply Chain Attack

Researchers Spot Supply Chain Attack Using Identical PyPI Packages

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

TCE weekly roundup cybersecurity news
Cyber News

The Cyber Express Weekly Roundup: Data Breaches, AI Risks, and Phishing Campaigns Dominate Cybersecurity Landscape

May 1, 2026
ChipSoft cyberattack
Firewall Daily

Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

April 30, 2026
APRA AI risk warning
Cyber News

Australia’s APRA Issues AI Risk Warning to Banks and Insurers

April 30, 2026
CVE-2026-41940
Firewall Daily

CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

April 30, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information