Viw Magazine

Men's Weekly

.

  • Written by Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login. SHUTTERSTOCK

Our electronic devices store a plethora of sensitive information. To protect this information, device operating systems such as Apple’s iOS and Android have locking mechanisms. These require user authentication before access is granted.

One of the most common mechanisms is fingerprint login, a form of biometric technology first introduced by Apple in 2013 as Touch ID.

Touch ID was introduced with the intuition that, if there was an easier and quicker way to log in, users would be encouraged to keep stronger passcodes and passwords without sacrificing ease of access. It was supposed to enhance both the usability and security of the device.

However, in application this hasn’t been the case. And most users remain unaware of this initial purpose.

Easy targets

When first unlocking an iPhone after starting it, users are asked to enter a strong six-digit passcode, instead of a simpler four-digit PIN. After that, Touch ID can be used to unlock the phone, to avoid having to re-enter the password multiple times.

The catch is, users can choose to ignore the direction and opt for an easy four-digit PIN, and they usually do.

Researchers found that among Touch ID users, the majority still used weak login codes, mainly four-digit PINs (which are easy to guess). This was also true among people who didn’t use Touch ID.


Read more: Fingerprinting to solve crimes: not as robust as you think


They also found more than 30% of participants weren’t aware they could use passwords with letters (which are stronger) instead of four-digit PINs.

Some participants indicated they used PINs for quicker access, compared to passwords. And most agreed that Touch ID offered usability benefits including convenience, speed and ease of use.

Interestingly, there was also a disconnect between how secure users thought their passcodes were, and how secure they actually were.

In fact, only 12% of participants correctly estimated their passcode’s strength

Knowledge is key

It’s important to understand how fingerprint login and other biometric systems work, before we use them.

A biometric is a unique biological characteristic which can be used to identify and verify a person’s identity. Apart from fingerprints, we see this in facial recognition scans, DNA tests, and less commonly in palm prints, and iris and retina recognition.

Biometrics are marketed as being a very secure solution, because the way biometric data is stored is different to the ways PINs and passwords are stored.

While passwords are stored on the cloud, data from your fingerprint is stored solely on your device. Servers and apps never have access to your fingerprint data, nor is it saved on the cloud.


Read more: iPhone 5S fingerprint scanning: thumbs up or down?


However, although it’s incredibly hard for cybercriminals to get access to your actual fingerprint data – since it’s encrypted and stored on the device itself – biometric systems are still not completely secure.

For instance, Apple’s fingerprint technology was compromised just two days after the launch of Touch ID (integrated into the iPhone 5S) in 2013. And since then, many people have managed to bypass Touch ID security by using dental mold or play-dough.

Similarly, it was shown that even the 2017 iPhone X’s Face ID feature could be compromised.

Users who use Touch ID with a four-digit PIN backup are also at risk. They’re susceptible to “shoulder surfing” attacks, where attackers simply look over a victim’s shoulder to see them input their PIN.

Other types of attacks include password guessing and even thermal fingerprint scanning, which involves using a thermal device to figure out which areas on a screen were most recently pressed, thereby potentially revealing a passcode combination.

A permanent mark

The elephant in the room is that once biometric data such as a fingerprint is stolen, it’s stolen forever. Unlike a password, it can’t be changed.

Stolen biometric data can be used to identify users without their knowledge, especially if users are unaware of how their data is stored and collected.


Read more: Fingerprint and face scanners aren’t as secure as we think they are


That said, cybercriminals generally prefer to break into people’s devices through mind games, by luring victims into clicking on links or downloading attachments which eventually disclose their login credentials.

In public, a criminal might ask to borrow your phone for a call. In such situations, it’s often easy for them to steal your PIN simply through observation, rather than having to actually break into your device.

Touch ID technology was designed to enhance security and usability, and it would have, if people hailed its initial purpose and kept stronger passcodes.

But they don’t, because often they don’t understand the basis of the technology. With biometric technology, users experience a false sense of security. They remain unaware of the many ways in which their information could still be stolen.

This is why users should educate themselves on how the technologies they use function, and the purpose for which they were designed. Failing that, they risk leaving the back door wide open for cybercriminals.

Nalin Asanka Gamagedara Arachchilage works as Senior Research Fellow at La Trobe University.

Authors: Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW

Read more http://theconversation.com/fingerprint-login-should-be-a-secure-defence-for-our-data-but-most-of-us-dont-use-it-properly-127442

What Makes a Successful Law Firm Website in 2026

In 2026, a law firm’s website is no longer just a digital brochure—it is one of the most important business development tools a legal ...

Why Every Modern Law Firm Needs a High-Performance Website

In today’s digital-first world, a law firm’s website is often the very first point of contact between a potential client and the legal p...

The Importance of Safe Sanitary Waste Disposal in Commercial Spaces

For facility managers, employers, and business owners, the provision of washroom amenities is more than a convenience—it is a critical int...

Why Brisbane Retailers Need Custom Security Solutions for Modern Retail Risks

A one-size-fits-all approach rarely works for something as nuanced and challenging as retail security. In Brisbane alone, there are differ...

Why Children Who Learn to Save Early Develop Stronger Financial Habits

The transition from understanding the value of a physical coin to managing a digital balance is a fundamental rite of passage for the next...

Planning Home Rewiring? Why Sydney Electricians Start with RCD Testing

It can be quite overwhelming thinking about rewiring your home. You may reside in a charming old terrace or even a modern townhouse; there...

Pour One Out: Cali by Snoop drops Kingz of Cali, the tribute wine honouring Tupac’s Legacy

The limited-edition wine celebrates 30 years since the release of Tupac and Snoop Dogg’s iconic track. Today, Cali By Snoop drops its mos...

Apartment Buyers Beware – Know Your Building Classification and Codes or Risk Big Fines

If you’re looking into buying a new apartment, you need to understand what classifications and codes apply to your potential new property...

Why Hurstville Tutoring Supports Strong Academic Growth And Confidence

Students in academically competitive areas often face increasing pressure to perform well across multiple subjects, which is why hurstvill...

3 Signs Your Business Could Benefit from IT Consulting Services

Modern businesses depend on technology to support growth and daily operations, yet many struggle to keep pace with change. Teams often foc...

Protein Bars Supporting Convenient Nutrition for Active Lifestyles

Choosing protein bars has become a practical solution for people who want reliable nutrition without disrupting busy schedules. Whether s...

Online Wheels Australia: Finding The Right Wheels For Style And Performance

Upgrading wheels is one of the most effective ways to transform both the appearance and performance of a vehicle. With the convenience of ...

Off Road Adventures in the Dandenongs

Misty Dawn over Dandenong Ranges, Victoria. Image by Uzman Naleer, CC BY-SA 4.0, via Wikimedia CommonsMelburnians, if you haven’t ventured...

Living Room Plantation Shutters: Elevating Comfort And Style In Everyday Spaces

The living room is the heart of the home, a space where comfort, design, and functionality come together. Choosing the right window furnis...

Is a Pop Top Caravan Suitable for a Family of Four?

For families planning road trips across Australia, choosing the right caravan layout can shape the entire experience. When browsing new ca...

The Structural Foundation of Secure and Refined Entrances: Gate Hardware

A gate often forms the first point of contact between a property and the outside world. Its presence signals privacy, protection, and a se...

Common Construction Disputes and How Lawyers Can Help Resolve Them

Construction projects rarely go exactly to plan. Even with a signed contract, pressure from deadlines and shifting site conditions can tri...

CAD Software Decisions Feel Easy Until Team Has to Ship Drawings

In Australian businesses with 7–100 staff, CAD choices usually feel settled early. The trouble appears later, when deadlines stack up, f...

Dentist Supporting Everyday Oral Health and Long-Term Wellbeing

Choosing the right Dentist plays an essential role in maintaining not only a healthy smile but also overall wellbeing. Dental care extend...

Ceiling Fans for Everyday Comfort and Energy Efficiency

Modern ceiling fans have become an essential feature in homes that value comfort, efficiency, and thoughtful design. Once considered a simpl...