Blog

Less Than 1% of Hackers Can Bypass Facelock Security App

b2ap3_thumbnail_facial_recognition_security_400.jpgPeople use and reuse old passwords time and again, and then they get two-factor authentication to augment their fifteen-character passwords. Wouldn’t it be great if your computer could recognize you just by how well you recognize others?

Security using facial-recognition technology isn’t a new thing - in 2000, the Passface system used a similar concept, where it replaced passwords with a series of pictures based on your friends and family. This was somewhat effective, but those who could figure out the pattern were able to get into the system fairly easily.

Facelock is a new concept of facial-recognition technology. Instead of concentrating on technology that lets you define pictures in a specific pattern, it concentrates on whether or not you can identify familiar faces. In other words, the faces you know can help you keep your system safe from intruders, rather than just being another code for a hacker to crack. Unless a hacker can tap into your memory, they probably can’t crack your Facelock password.

How Does It Work?
Facelock presents the user with various face arrays. It is the user’s job to identify the familiar face amongst the unfamiliar ones. These arrays can be shown in different orders with faces scattered in different positions. What makes this any different than Passface is the human mind’s ability to detect familiar faces, regardless of appearance, in different images. Even if a hacker is able to identify which picture you guessed, they are unlikely to identify the image in a different picture.

What a Face-full!
This technology backs up its bark with its bite. A study was done on over 400 participants, which included account holders, stranger attackers, and familiar attackers. These tests were conducted over the course of one-week and one-year increments. Account holders were asked to choose the faces of several lesser-known celebrities in a narrow field; this mitigates the chance that threats will be able to access the system.

Results showed that after just one week of using this technology, 97.5 percent of users could authenticate their accounts, while stranger hackers succeeded less than one percent of the time. This number jumped to 6.6 percent for attackers that knew the victims personally. And, after a full year of working with the software, 86 percent of all users were able to authenticate. The test also examined whether attackers could authenticate with different photos of the same people. Unless the photos were of distinctive people with very prominent features, such as a bald head or round glasses, hackers were unable to identify pictures of the same people.

Keep in mind, as great as this technology is, it isn’t really a good fit for business devices that may need support and troubleshooting. If your help desk technicians aren’t in your circle of friends, they won’t be able to log into your device to help you solve your problem.

It’s a fairly simple concept - passwords don’t work for humans, and the existence of a “Forgot password?” prompt reinforces this. But, does facial recognition take this a bit too far? Is two-factor authentication enough for you? Let us know in the comments.

Related Articles

  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • What To Do When You’ve Had Enough of Your Broken Technology Chances are that you’ve dealt with the following scenario: You are working along fine and you try to open an application only to be rebuked by an error message on the screen that tells you that there is some type of critical error. You close that out hoping that it was a one-time exception, but nope...
  • Tip of the Week: How Small Business Goes About Utilizing Tec... No matter how big a business is, it has to leverage at least some IT in order to be efficient. Unfortunately, some organizations are reluctant to implement new technology if they don’t seem to need it immediately. What these businesses don’t know is that the reason they typically don’t implement new...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions