Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical Security

5 Top Security Questions about iPhone Biometric Authentication

By Jerry Irvine
iphone5sfingerprint
September 1, 2013

iphone5sfingerprint Apple is acknowledging a common complaint from online and mobile banking: the need for stronger authentication.

By the addition of a fingerprint sensor to the iPhone 5S’s Home button, Apple is mitigating the risk of username and password hacking. Users register their print within the device, after which they would be able to unlock the phone by placing a finger or thumb on the button.

But the approaching release of the new smartphone is not without doubts and questions, especially on the security side:

So how does the iPhone fingerprint technology work?

The new iPhone home button is a high-definition camera. When you register your fingerprint, the camera can take a 550-pixel-per-inch photograph for up to five of your fingers. The phone then encodes these photographs into digital representations, stores them in a separate partition of the phone and then uses them for comparison when you access your iPhone.

Why are fingerprint technology and other biometric-based security the next big things… and how can we make them even more secure?

Unfortunately smartphone and tablet authentication has become a nuisance for most people today. In fact, more than 50 percent of all users do not implement passwords or PINs on their mobile devices, either due to the inconvenience or simply because they are not aware of the risks of unprotected devices. As a result, Apple and other mobile device manufacturers are being challenged to increase security and usability. Passwords are an annoyance for most. Unless you utilize complex password strategies – including alpha-numeric, upper and lower case and special characters, passwords may be easily cracked. As a result, biometric authentication such as fingerprints, retinal scans and facial recognition are simply more convenient for the user.

Biometric solutions added with other measures have the ability to increase authentication security. Traditional authentication is performed with a single factor process that employs user IDs and passwords. Multi-form factor authentication strategies have been around for a while and must include at least two of the following items:

  • Something you know – User ID / passwords
  • Something you have – Smart card (your phone)
  • Something you are – Biometric (your fingerprint, your retinal scan, your face, etc.)

The addition of other authentication requirements increases the overall security of the access controls. Because you must have your phone and your fingerprint, access is more secure. A thief may be able to steal your phone and hack your password, but he or she would not have access to your biometric. Nevertheless, requiring all three attributes (phone, biometric and PIN/password) would increase the security of the device even further.

What security risks should iPhone users look out for?

While Apple stated that the digital representation of the fingerprint could be encrypted and stored in a separate secure partition on the iPhone chip, it may still be possible (at some point) for hackers and virus developers to create a malicious application that could gain access and copy your fingerprint data. Obtaining this information could not only allow them to gain access to your phone, but could significantly increase their ability to steal your identity, allowing them to gain access to your personally identifiable information.

As always users should practice safe computing practices.

1.    Keep iOS and applications up-to-date. Patches and updates come out on applications when known bugs and vulnerabilities are found. Updating your system increases your device’s security.

2.    Install anti-virus solutions if they are available. While most mobile devices still have few antivirus solutions available, they are becoming more prevalent. Find solutions from trusted software manufacturers, install them and keep them updated.

3.    Do not browse unfamiliar websites, as they may contain socially unacceptable content. These sites are frequently filled with viruses, bots and other malicious applications.

4.    Do not open attachments or web links sent to you in emails or texts, especially from unknown users. These attachments and links are often sent from users with infected devices or directly from malicious sites/users.

5.    Do not use publically accessible Wi-Fi networks where malicious users may easily gain access to your devices. Hackers sit in coffee shops and airports monitoring and “sniffing” wireless network traffic for your user IDs, passwords and other personally identifiable information.

6.    Turn off external access to your devices. Viruses and malicious applications can be pushed to your devices via Wi-Fi, Bluetooth and NFC connections. If you are not using them, disable them.

What fingerprint apps are available for non-iPhone users?

Fingerprint devices for desktops, laptops and PDAs have been around for years. Devices can be attached via multiple connections including Bluetooth, USB and serial ports. Additionally, software-only solutions exist for devices as well, including fingerprint software for Android devices. Fingerprint solutions for mobile devices to date have been cumbersome and inaccurate, causing other manufacturers to eliminate or postpone their products. The implementation of the iPhone fingerprint reader will undoubtedly cause other manufacturers to rethink and redesign their solutions.

Where is the future of fingerprint scanning heading?

As previously mentioned, biometric solutions have been offered for quite some time. In fact, Microsoft’s workstation and Active Directory environments have the ability to fully integrate biometric and smart card authentication. However, the iPhone fingerprint solution is the largest consumer-based biometric offering to-date, and has brought fingerprint authentication out for public consumption. Additionally, by already integrating the fingerprint authentication with the Apple iTunes, App and iBook store purchases, Apple has paved the way for other biometric authentication processes across the web. While Apple is not currently allowing access to fingerprint authentication to other vendors or websites, it is not hard to believe it will happen very soon. 

KEYWORDS: biometric authentication fingerprint fingerprint authentication mobile device security smartphone biometrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

CIO of Prescient Solutions and member of the National Cyber Security Task Force

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Security Trial: Are Biometric Authentication Systems Fulfilling Encryption Standards?

    See More
  • thermal imaging

    Top 5 myths about temperature checks

    See More
  • Biometric authentication, fingerprint on phone

    Biometric authentication sees increase in adoption during the pandemic

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!