Skip to main content

A new kind of password: Brainprints could be the future of security

facebook typing with your brain
Image used with permission by copyright holder
Given how disastrous Americans have proven to be in terms of picking decent passwords and setting secret questions to protect their private information, it may be time for a new technology to replace the not-so-effective current system. Enter “Brainprint,” a new study that relies on your neurological responses to certain words as a primary identification system. Say goodbye to alphanumeric passwords and even retinal scans — the future is all in the head.

The new study, which appears in the journal Neurocomputing, was conducted by scientists from Binghamton University in New York, who studied the reactions of 45 volunteers when they were read a total of 75 acronyms, like FBI and DVD. They found that participants reacted differently to different combinations of letters — so differently, in fact, that a computer system could differentiate among participants with a stunning 94 percent accuracy rate.

So what makes this technology more special than say, a retinal scan? For one, it is quite literally impossible to steal. Whereas traditional passwords are easily stolen, and even retinas and fingerprints can be duplicated, brain scans are a different matter. Explained study co-author Laszlo, “If someone’s fingerprint is stolen, that person can’t just grow a new finger to replace the compromised fingerprint — the fingerprint for that person is compromised forever. Fingerprints are ‘non-cancellable.’ Brainprints, on the other hand, are potentially cancellable. So, in the unlikely event that attackers were actually able to steal a brainprint from an authorized user, the authorized user could then ‘reset’ their brainprint.”

Granted, technology like this probably won’t be implemented for the everyday user to set their email passwords, but with the recent string of cyberattacks on sensitive data, especially within government agencies like the Office of Personnel Management, having brainprints as another line of defense for high-ranking government and military officials may not be a bad idea.

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
Homeland Security wants to expand airport facial scans to U.S. citizens
uk retail giant to use face scanning tech

U.S. citizens exiting and entering the country at facilities such as airports are currently exempt from the facial scan process demanded of noncitizens, but that could soon change.

The Department of Homeland Security (DHS) recently proposed expanding facial recognition checks to Americans “to help prevent persons attempting to fraudulently use U.S. travel documents and identify criminals and known or suspected terrorists.”

Read more
New battery design could mean EVs charge in only 10 minutes
ten minute charging time for lithium ion electric vehicles 492485

Anyone who has an interest in electric vehicles (EVs) knows the common knocks against them by heart: long charging times, limited range, charging station availability, and so on. To make the EV more palatable to the American public, researchers at Penn State University have had a breakthrough — reducing lithium-ion battery charging times to 10 minutes.

Lead author Xiao-Guang Yang and his colleagues published a report in Joule, a journal focused on the science of sustainable energy. There are still some hurdles to clear but the long-held dream of a practical EV on par with the convenience of a gasoline engine could be closer at hand than people think.

Read more
Update your Google Chrome browser now: New exploit could leave you open to hacks
Google Chrome Stock Photo

If you’re a Google Chrome user, you should update the browser immediately. Google released a software update to the browser late yesterday evening that patches two zero-day vulnerabilities to the browser that could potentially allow the browser to be hijacked by hackers.
One of the vulnerabilities affects Chrome’s audio component (CVE-2019-13720) while the other resides in the PDFium (CVE-2019-13721) library.
Hackers can corrupt or modify the data in Chrome’s memory using the exploit, which will eventually give them access to the computer as a whole.
One of the exploits, CVE-2019-13720 has been discovered in the wild by researchers at Kaspersky.
Google says that the update to the browser will be rolling out to users automatically over the coming days and weeks.
That said, if you’re a Chrome user it would be more prudent for you to go ahead and do that update manually right now instead.
To make it happen you’ll want to launch Chrome on your computer and then click on “Chrome” in the menu bar followed by “About Chrome.” That will launch the Settings menu. From there,  click “About Chrome” at the bottom of the menu on the left. That will likely trigger an automatic update if yours hasn’t already happened. If it doesn’t, you’ll see a button to manually update the browser as well.
Once you update the browser you should be good to go without fear of the security threat becoming an issue. Last month many Mac users ran into issues with Google Chrome when it seemed to send computers into an endless reboot cycle.
An investigation by Mac enterprise and IT blog Mr. Macintosh found that the issue was actually a bug that deletes the symlink at the/var path on the Mac it’s running on, which essentially deletes a key in the MacOS system file.
That issue only impacted Macs where the System Integrity Protection (SIP) had been disabled. The issue particularly impacted older Macs that were made before SIP was introduced with OS X El Capitan in 2015.
All this comes as Google is gearing up to launch some major updates to Chrome, including one update that will change how you manage tabs using the browser. That update is expected to roll out later this year.

Read more