Connect with us

Technology

Hackers are bypassing fingerprint scanners to steal your identity

Published

on

Hackers are bypassing fingerprint scanners to steal your identity

Fingerprint sensors have been around for quite some time, and they’ve become a standard feature in most smartphones. Apple introduced Touch ID on the iPhone 5s in 2013. Since then, it has appeared on 12 major iPhone models (and some iPads as well). 

Though Apple removed it from most phones after the iPhone 8, it’s still found in the iPhone SE series. On the flip side, almost every Android phone on the market has a fingerprint scanner. But are fingerprint scanners impossible to bypass? Frank from Deerton, Michigan, asked a similar question that I want to highlight and address because it helps all of us:

“Can a website be hacked/compromised with password and fingerprint protection (multiple verification)?”

I get what you’re saying, Frank. You’d think that since a fingerprint scanner literally requires your fingerprint, it couldn’t be bypassed. But you’d be wrong. While fingerprint scanners are generally more secure than facial recognition and passwords, they’re not foolproof. In fact, there are several ways bad actors can bypass them to steal your identity.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

Advertisement

A smartphone on a table   (Kurt “CyberGuy” Knutsson)

5 ways bad actors can bypass fingerprint scanners

There are multiple ways hackers use to bypass fingerprint scanners. Below, I will discuss five of the more prominent methods. 

1. Masterprints and DeepMasterPrints

Hackers exploit the concept of “masterprints,” which are fingerprints engineered to match multiple individuals’ prints. Researchers at NYU Tandon developed “DeepMasterPrints” using machine learning to generate synthetic fingerprints that can deceive sensors by mimicking common fingerprint features. These artificial prints can match with a significant percentage of stored fingerprints, especially on devices with less stringent security settings.  

2. Forged fingerprints using 3D printing

Another trick hackers use is making fake fingerprints. They can lift prints off things you’ve touched and then use stuff like fabric glue or even 3D printers to make molds. For example, researchers at Cisco Talos tried out a bunch of different ways to do this using 3D printing and tested them on phones like the iPhone 8 and Samsung S10; laptops like the Samsung Note 9, Lenovo Yoga and HP Pavilion X360; and even smart gadgets like padlocks.

On average, the fake fingerprints worked about 80% of the time. They were able to fool the sensors at least once. Interestingly, they couldn’t crack the biometric systems on Windows 10 devices, but they pointed out that doesn’t necessarily mean those are more secure. It just means this particular method didn’t work on them.

Advertisement

19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELF

3. Brute force attacks via BrutePrint

Attackers have found a cheap way to break into smartphones by brute force fingerprint authentication. The method, called BrutePrint, lets attackers get around the usual limits that stop too many failed fingerprint attempts. It works by taking advantage of two previously unknown flaws in the fingerprint system. These flaws, named Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), exist because of weak protection for fingerprint data on a part of the hardware called the Serial Peripheral Interface (SPI).

Basically, BrutePrint uses a hardware-based man-in-the-middle attack to hijack fingerprint data. It sits between the fingerprint sensor and the phone’s secure area (called the Trusted Execution Environment) and tries as many fingerprint images as needed until it finds a match. The relieving part is that the attacker needs to have physical access to the phone for this method to work. 

4. Side-channel attacks with PrintListener

PrintListener is a side-channel attack that captures the sound of a finger swiping on a screen to extract fingerprint features. It might sound like something out of a sci-fi movie, but researchers have already built a proof of concept. By analyzing the friction sounds, attackers can reconstruct fingerprint patterns, potentially enhancing the effectiveness of masterprint attacks.

5. Exploiting unsecured fingerprint data storage

Some devices store fingerprint data without adequate encryption. If attackers gain access to this unprotected data, they can replicate fingerprints to bypass authentication. For example, in 2024, a misconfigured server exposed nearly 500 GB of sensitive biometric data, including fingerprints, facial scans and personal details of law enforcement applicants.

Advertisement

Image of a smartphone   (Kurt “CyberGuy” Knutsson)

TOP 20 APPS TRACKING YOU EVERY DAY

So, can you trust fingerprint scanners?

Fingerprint scanners make it easy and fairly secure to unlock your devices. Since everyone has unique fingerprints, you don’t need to remember complicated passwords. Just a quick touch and you are in. Most modern devices store your fingerprint data in secure parts of the system, and they use things like liveness detection to make sure someone is not trying to trick the scanner with a fake finger.

Still, no security method is perfect. Skilled attackers have found ways to get past fingerprint scanners using high-resolution photos or 3D-printed fingers or by taking advantage of flaws in how the scanner communicates with the rest of the device. The risk really depends on how well the scanner is designed and how much effort someone puts into breaking it. For most people, fingerprint authentication is quick, easy and secure enough. However, if you are dealing with very sensitive information, relying only on biometrics might not be the best idea.

HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE SEARCH SITES

Advertisement

A person using a fingerprint for security verification purposes    (Kurt “CyberGuy” Knutsson)

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY

6 ways to protect your fingerprint data

Safeguard your biometric identity with these essential security measures.

1. Choose trusted phone brands: If you’re buying a phone, stick with well-known brands like Apple, Samsung or Google. These companies take extra steps to protect your fingerprint data by storing it in secure areas of the phone that are harder to access. Cheaper or lesser-known brands may not have these protections, which makes it easier for attackers to steal your data.

2. Keep your phone updated: Phone updates are not just about new features. They fix security problems that hackers might use to break into your device. If your phone asks you to install an update, do it. Most phones also let you turn on automatic updates, so you don’t have to worry about remembering. Keeping your software updated is one of the easiest and most important ways to stay protected.

Advertisement

3. Use strong antivirus software: Install strong antivirus software to detect malware that could compromise biometric data storage. Strong antivirus software offers real-time threat detection, anti-phishing and privacy features to block unauthorized access to fingerprint data. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4. Don’t rely only on your fingerprint: Using a fingerprint to unlock your phone is convenient, but it shouldn’t be your only line of defense, especially for sensitive apps like banking or email. Always set up a PIN, password or pattern as a backup on your iPhone and Android. This way, even if someone manages to copy your fingerprint, they still need another piece of information to get in.

5. Be careful about who handles your phone: If someone else uses your phone, especially a stranger or someone you don’t know well, they might be able to copy your fingerprint from the screen. It’s rare, but it happens. To reduce this risk, avoid handing your phone to people unnecessarily and wipe your screen occasionally to remove any clear fingerprints.

6. Only use fingerprint login with trusted apps: Not every app that asks for your fingerprint is trustworthy. It’s safest to use fingerprint login only with apps from known and reliable companies, like your bank, phone manufacturer or email provider. If an unfamiliar app asks for fingerprint access, it’s better to skip it and use your password instead.

Advertisement

7. Consider using a personal data removal service: Even fingerprint scanners can be bypassed, and large amounts of personal and biometric data have been exposed in breaches. Using a personal data removal service helps reduce your risk by removing your sensitive information from public databases and data broker sites, making it harder for hackers to piece together details that could be used to steal your identity. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web.

WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE

Kurt’s key takeaway

Passwords are generally easier to hack than biometric data like fingerprints or facial recognition. However, the key difference is that passwords can be changed if they’re compromised. Your biometrics cannot. Most modern devices allow both options, and biometrics can offer an extra layer of security by making it harder for someone else to access your phone or apps. They’re also fast and convenient, since you don’t need to remember or type anything. That said, in most cases, your device still falls back on a password or PIN when biometric identification doesn’t work, so both systems often go hand in hand.

Advertisement

With the increasing sophistication of methods to bypass fingerprint security, what should companies be doing to stay ahead of these threats and better protect user data? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement

Technology

Rad Power Bikes files for bankruptcy protection

Published

on

Rad Power Bikes files for bankruptcy protection

Rad Power Bikes, the once dominant electric bicycle brand in the US, filed for Chapter 11 bankruptcy protection this week as it seeks to sell of its company. The move comes less than a month after Rad Power said it could not afford to recall its older e-bike batteries that had been designated a fire risk by the US Consumer Protection Safety Commission.

The bankruptcy, which was first reported by Bicycle Retailer, was filed in US Bankruptcy Court for the Eastern District of Washington, near the company’s headquarters in Seattle. Rad Power lists its estimated assets at $32.1 million and estimated liabilities at $72.8 million. Its inventory of e-bikes, spare parts, and accessories is listged at $14.2 million, Bicycle Retailer says.

It’s a stunning reversal for the once leading e-bike company in the US. Mike Radenbaugh founded the company in 2015 after several years of selling custom-made e-bikes to customers on the West Coast. Rad Power quickly grew to over 11 distinct models, including the fat-tire RadRover, the long-tail RadWagon, and the versatile RadRunner. Rad Power Bikes raised an approximate total of $329 million across several funding rounds, primarily in 2021, with major investments from firms like Fidelity, Morgan Stanley, and T. Rowe Price.

But in the wake of the post-covid bike boom, things started to go south. There were supply chain disruptions, safety recalls, several rounds of layoffs, and executive turnover. Last month, Rad Power said it was facing “significant financial challenges” that could lead to its imminent closure without a cash infusion.

The CPSC warning apparently was the nail in the coffin. The company’s older batteries could “unexpectedly ignite and explode,” the agency warned, citing 31 fires, including 12 reports of property damage totaling $734,500. There weren’t any injuries, but the company said it couldn’t afford a costly recall.

Advertisement

Rad Power could still live on if its able to find a buyer for its assets and brand. Dutch e-bike make VanMoof was able to find a buyer following its 2023 bankruptcy. And Belgium’s Cowboy is in talks to be acquired by a French holding company of several bike brands. Rad Power will continue to operate as it restructures its debts under court supervision, and in a statement to Bicycle Retailer said it will continue to sell bikes and work with customers and vendors as it moves forward with the process.

Continue Reading

Technology

Chrome rolls out AI podcast feature on Android

Published

on

Chrome rolls out AI podcast feature on Android

NEWYou can now listen to Fox News articles!

Chrome on Android now offers a fresh way to digest information when your hands are busy or your eyes need a break.

A new update powered by Google Gemini can turn written webpages into short podcast-style summaries. Two virtual hosts chat about the content, making it feel easier to follow during your commute or while you multitask.

This upgrade builds on Chrome’s long-standing read-aloud tool, yet now adds a more natural and lively delivery. It does not work on every website, so some pages will still use the original word-for-word reading. When the AI option appears, though, the audio feels polished and smooth.

Below is how to try it on your Android phone right now.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

HOW TO DISABLE GEMINI AI ON ANDROID AND KEEP CONTROL OF YOUR APPS

Make sure you have the newest Chrome version so the AI podcast feature works. (Cyberguy.com)

Update Chrome before you start

First, make sure Chrome is current in the Play Store by opening the Play Store, searching for Google Chrome and tapping Update if it appears. The AI podcast feature works with version 140.0.7339.124 or newer, so confirm you have at least that version installed. Once you finish the update, open Chrome and pick any webpage with text you want to hear.

Settings may vary depending on your Android phone’s manufacturer.

Advertisement

Open the More menu

  • Tap the More icon or the three vertical dots in the upper right corner. This reveals a set of options that control how Chrome displays or reads the page.

Select Listen to this page

  • Choose Listen to this page. You will see a small Generating AI playback banner at the bottom. The processing is fast, so you will not wait long.

Hear the AI hosts discuss the page

  • Chrome will start a mini podcast with two voices talking through the content. You can tap the playback bar to pause, rewind or jump ahead. The panel stays on screen and follows you as you scroll.

Switch to standard playback when you want

  • The AI audio keeps going even if you leave the webpage. If you prefer a traditional word-for-word readback, tap the AI playback icon in the lower left and pick Standard Playback.

Chrome begins creating the AI audio as soon as you tap the “Listen to this Page” option. (iStock)

ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

What this means to you

This feature can make long articles easier to absorb when you are on the move. You get a quick, conversational rundown without having to read a full page. It also helps you revisit information faster since the controls work like any audio player. If you enjoy podcasts, this tool gives you a familiar way to stay informed without draining your attention.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Chrome’s AI podcast feature brings a new layer of convenience to Android. It saves time, reduces eye strain and turns everyday browsing into a hands-free audio experience. Since it still supports the standard read-aloud mode, you can switch back anytime.

Would you use AI hosts to read your favorite websites, or do you prefer the classic readback style? Let us know by writing to us at Cyberguy.com.

Advertisement

Using the new update powered by Google Gemini, you can change from the AI podcast to a simple word-for-word reading at any time. (“I’ve Had It” YouTube channel)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Even Trump’s chief of staff was ‘aghast’ at Elon Musk’s deadly USAID cuts

Published

on

Even Trump’s chief of staff was ‘aghast’ at Elon Musk’s deadly USAID cuts

Wiles says she called Musk on the carpet. “You can’t just lock people out of their offices,” she recalls telling him. At first, Wiles didn’t grasp the effect that slashing USAID programs would have on humanitarian aid. “I didn’t know a lot about the extent of their grant making.” But with immunizations halted in Africa, lives would be lost. Soon she was getting frantic calls from relief agency heads and former government officials with a dire message: Thousands of lives were in the balance.

Wiles continued: “So Marco is on his way to Panama. We call him and say, ‘You’re Senate-confirmed. You’re going to have to be the custodian, essentially, of [USAID].’ ‘Okay,’ he says.” But Musk forged ahead—all throttle, no brake. “Elon’s attitude is you have to get it done fast. If you’re an incrementalist, you just won’t get your rocket to the moon,” Wiles said. “And so with that attitude, you’re going to break some china. But no rational person could think the USAID process was a good one. Nobody.”

Continue Reading

Trending