Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Password Fingerprint Cloning

It may sound like a sci-fi movie, but password fingerprint cloning for your phone and computer can now be defeated by 3-D printing. Now, the good news is that the results show fingerprints are good enough to protect the average person’s privacy if they lose their phone. 

 

However, if you’re likely to be targeted by a well-funded and motivated cyber threat you should not use fingerprint authentication and here is why.

 

Devices that were bypassed 100% of the time include the AICase padlock, Huawei’s Honor 7x and Samsung’s Note 9 Android phones. 

 

The iPhone 8, MacBook Pro 2018, and the Samsung S10 were bypassed more than 90 % of the time. 

 

Five laptop models running Windows 10 and two USB drives — the Verbatim Fingerprint Secure and the Lexar Jumpdrive F35 — performed the best, with researchers achieving a 0% success rate.

 

Why Should You Care?

Knowledge is power and it’s good to know since fingerprint authentication is now commonly used on many devices. Companies need to be aware that fingerprint authentication security is not as strong as you think. This means that with the advances of technologies like 3-D printing, it’s now even easier to defeat them.

 

CATEGORIES

Cyber Security

TAGS

Business cybersecurity - cloning - cyber attack - cyber risk - cyber security - Cybersecurity - fingerprint

SHARE

PrevPrevious97% of Surveyed Companies Show Suspicious Activity
NextTop Cyber Security Recommendations When Working From HomeNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.