{"id":761,"date":"2018-05-18T00:32:02","date_gmt":"2018-05-18T00:32:02","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/"},"modified":"2018-05-18T00:32:02","modified_gmt":"2018-05-18T00:32:02","slug":"biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/","title":{"rendered":"Biometrics: Better than your mother&#8217;s maiden name. Good luck changing your body if your info is stolen"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/04\/28\/privacy_eye_9873467893454522.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Identity theft has hit record levels in the UK \u2013 the vast majority of incidents are online. The UK&#8217;s largest cross-sector fraud sharing databases, Cifas recently logged 174,523 incidents finding eight out of 10 took place online.<\/p>\n<p>Far from targeting the usual haunts of bank and credit card services, fraudsters have shifted to new targets \u2013 telecoms, online shopping and insurance. The thieves are harvesting information through phishing, malware attacks, social media, and other forms of social engineering.<\/p>\n<p>In the US, 145 million Americans saw their Social Security numbers, birthdates, credit history, and other staples of online verification were pinched from credit-rating agency Equifax.<\/p>\n<p>The primary driver behind financial fraud is impersonation and deception scams as well as online attacks to compromise data, according to Financial Fraud Action UK.<\/p>\n<p>For all the achievements of the internet&#8217;s builders, it would seem the issue of reliably proving identity has come to bedevil their extraordinary creation. This omission has left society juggling two incompatible worlds, that of the online and the offline, each with its own notion of human identity.<\/p>\n<p>It\u2019s put those providing online services in a seemingly impossible and irreconcilable position: to provide services while safeguarding entry, but using methodologies that employ techniques using credentials that are weak or compromised. There\u2019s every chance the person logging on is not who they claim to be, because that individual has access to somebody else\u2019s stolen details.<\/p>\n<p>The internet was about connectivity and communication, ignoring the idea that a successful digital world would one day need a reliable concept of identity that didn\u2019t rely on easily faked, lost, or stolen documents and information, or basic data such as your mother\u2019s maiden name.<\/p>\n<p>But here we are. Today\u2019s online world is forced to default to one of two unsatisfactory options to safeguard services and users: one is to ask people to prove their identity through paper documentation, and the other is to resort to some form of knowledge-based authentication (KBA). The former requires the person to first visit said institution with paper documents in hand \u2013 this is hardly the stuff of the digital world. From that moment onwards, KBA is used to check that the person who made that visit is still who they claim to be.<\/p>\n<p>KBA, however, has another problem: the problem of people\u2019s memory. Google in 2015 found most people \u2013 74 per cent \u2013 struggle to remember the answers to personal questions used in KBA systems, and in many cases, asking \u201cwhat\u2019s your favourite food,\u201d hackers have a good chance of guessing the answer anyway. In the case of what\u2019s your favourite food, pizza is the answer for 20 per cent of people.<\/p>\n<h3 class=\"crosshead\"><span>KBA and MFA: failed gods<\/span><\/h3>\n<p>The ultimate identity crime of all is ID theft, where someone\u2019s entire digital record is borrowed to commit not one illegal act of access but possibly multiple crimes over an extended period \u2013 hence the significance of that Equifax hack. KBA fails in the Equifax-hack world because the successful criminal has the fundamentals \u2013 financial credentials names, addresses, dates of birth, security questions and passwords \u2013 needed to pretend they are somebody else.<\/p>\n<p>Engineers, regulators, and governments have patched up this problem by enforcing either more checks (making it more difficult to open financial accounts, say), or by extending KBA in novel ways. In the long-term, they simply spurred the evolution and organisation of criminals to find ways around them.<\/p>\n<p>One perceived answer was two-factor or multi-factor authentication (2FA, MFA) \u2013 essentially a way of adding something the user has in their possession (a token or time-dependent code), to one or more things they know, usually a password and user name. Well-designed MFA can be effective \u2013 but brings with it trade-offs between complexity, expense, and effectiveness. MFA is annoying and confusing, too, if you\u2019re forced to authenticate across services in different ways. 2FA has been compromised as hackers have hijacked texts that are used to deliver a temporary code.<\/p>\n<p>To KBA\u2019s credit, users understand what to do and are not challenged unnecessarily.<\/p>\n<h3 class=\"crosshead\"><span>Biometric hope<\/span><\/h3>\n<p>What\u2019s the answer? What about the immutable aspects of identity \u2013 fingerprints, voice, iris, typing style, facial and selfie ID, and perhaps even DNA? Can these bear down on fraud in ways that are hard to bypass? Styled as advanced identity verification, many have now reached the mainstream thanks to the smartphone and mobile apps.<\/p>\n<p>Broadly speaking, these can be divided into simple verification (for example, logging into an account), and onboarding verification (the process a user goes through when they originally created that account) as a way of stopping criminals from setting up fake accounts. Some examples:<\/p>\n<ul>\n<li>HSBC Bank deployed sophisticated Voice ID for customers in 2016<\/li>\n<li>Several UK banks, including \u2013 again \u2013 HSBC, have adopted Apple\u2019s Face ID for verification, the latest incarnation of which is part of the iPhone X. This turns the iPhone into a sort of token underwritten by Apple\u2019s security technology and the claim of low false positives. The disadvantage is that it\u2019s tied to iPhones, an issue as facial recognition on Android lags.<\/li>\n<li>The UK\u2019s Government\u2019s GOV.UK Verify, developed by GDS, tries to create a sort of digital passport for accessing a range of services including paying taxes, renewing driving licenses, and benefits. HM Land Registry this year claimed to have completed its first digital mortgage for the UK, recording a transaction between a building society and conveyancing services, using the service to provide a digital signature. There\u2019s a growing trend to validate identity by matching a government-issued identity, such as a passport or driver\u2019s license, with a selfie where the faces are matched. This approach is being used to verify and onboard people by AirB2B among others.<\/li>\n<\/ul>\n<p>Outwardly, these are all upgrades that make life harder for attackers \u2013 but, no, they do not provide immunity. The biggest challenge is simply that biometric systems rely on data that are in the public domain, such as faces, fingerprints, and even voices. Once an attacker has these, they can\u2019t be changed as can a password. The data can also be stolen directly and in bulk, as happened, disastrously, to the US Office of Personnel Management, which in 2016 admitted hackers had breached its servers to steal the fingerprints of 5.6 million employees. The HSBC voice system, PR&#8217;d and lovingly reported widely, proceeded to get gamed by someone\u2019s twin.<\/p>\n<h3 class=\"crosshead\"><span>Users stuck in a web<\/span><\/h3>\n<p>It used to be that verification and authentication was just plain confusing. Now, thanks to the fact hacks like Equifax are becoming more commonplace, the technologies used to police fraud are falling.<\/p>\n<p>How to identity people is an eternal problem so perhaps this was always destined to be so on the internet. Perhaps this was why internet engineers left identity off the list of things to do.<\/p>\n<p>Perhaps that\u2019s the reason why online fraud is not only growing but so, too, is theft of the elements and attributes that form the bedrock of many of the internet\u2019s identity and verification systems. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/05\/17\/the_eyes_have_it\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The eyes have it Identity theft has hit record levels in the UK \u2013 the vast majority of incidents are online. The UK&#8217;s largest cross-sector fraud sharing databases, Cifas recently logged 174,523 incidents finding eight out of 10 took place online.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":762,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biometrics: Better than your mother&#039;s maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics: Better than your mother&#039;s maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-18T00:32:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Biometrics: Better than your mother&#8217;s maiden name. Good luck changing your body if your info is stolen\",\"datePublished\":\"2018-05-18T00:32:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/\"},\"wordCount\":1201,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/\",\"name\":\"Biometrics: Better than your mother's maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg\",\"datePublished\":\"2018-05-18T00:32:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biometrics: Better than your mother&#8217;s maiden name. Good luck changing your body if your info is stolen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics: Better than your mother's maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics: Better than your mother's maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-18T00:32:02+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Biometrics: Better than your mother&#8217;s maiden name. Good luck changing your body if your info is stolen","datePublished":"2018-05-18T00:32:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/"},"wordCount":1201,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/","url":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/","name":"Biometrics: Better than your mother's maiden name. Good luck changing your body if your info is stolen 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg","datePublished":"2018-05-18T00:32:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/biometrics-better-than-your-mothers-maiden-name-good-luck-changing-your-body-if-your-info-is-stolen-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Biometrics: Better than your mother&#8217;s maiden name. Good luck changing your body if your info is stolen"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=761"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/762"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}