Close Menu
National Security News
  • Home
  • Ukraine War
  • Russia
  • Israel
  • Iran
  • Africa
  • Tech
  • Investigations
What's Hot

Inside Iran’s IRGC: power, influence and losses in the 2026 war

April 15, 2026

US and Iran agree to provisional ceasefire as Tehran says it will reopen strait of Hormuz

April 8, 2026

Trump warns ‘a whole civilisation will die tonight’ ahead of Iran Strait of Hormuz deadline

April 7, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Home
  • Ukraine War
  • Russia
  • Israel
  • Iran
  • Africa
  • Tech
  • Investigations
National Security News
  • Home
  • Ukraine War
  • Russia
  • Israel
  • Iran
  • Africa
  • Tech
  • Investigations
Home»Africa
Africa

Fingerprints Exposed: PrintListener Shakes Biometric Security

News RoomBy News RoomMarch 12, 20240 ViewsNo Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!

In a technological revelation, researchers from the University of Colorado and esteemed counterparts in China uncovered a novel method to compromise biometric security measures. Dubbed PrintListener, this cutting-edge technique cleverly reconstructs a person’s fingerprints by analysing the sounds produced during the simple act of fingertip swiping on a touchscreen.

The implications of this discovery extend beyond the realm of casual smartphone use, impacting biometric security systems employed in various applications, from smartphones to door access locks. While the technical details are complex, the essence of the threat lies in the ability to exploit the sounds generated as fingers traverse a screen.

PrintListener’s operational scope is vast and covert, utilising the microphones embedded in smartphones to record fingertip friction sounds. The researchers underscore the seriousness of this threat in a research paper titled ‘PrintListener: Uncovering the vulnerability of fingerprint authentication via the finger friction sound.’

In practical scenarios, PrintListener demonstrated concerning success rates, achieving a partial reconstruction of a person’s fingerprint 27.9% of the time and a full reconstruction 9.3% of the time. Given the widespread integration of fingerprint authentication in daily activities, including phone unlocks, online payments, and government identification, the implications are significant.

Understanding the Threat: How PrintListener Operates

To comprehend the magnitude of the threat, it’s crucial to delve into how PrintListener operates. The attacker initiates the assault armed with the victim’s contact information, which may include the victim’s phone number or account details for platforms like Google Meet, Skype, or Discord. The attacker then cleverly proceeds to infiltrate the victim’s digital space by initiating a voice or video call, connecting to voice collaboration software, or discreetly joining the same online voice or video conference.

To make matters worse, the attacker can deploy malware with recording permissions, operating stealthily in the background to capture the swiping friction sound. This method adds a layer of sophistication to the attack, enabling the extraction of intricate fingerprint patterns without the victim ever suspecting foul play.

Addressing this newfound vulnerability is crucial, considering the anticipated growth of the global fingerprint biometrics market to nearly $75 billion by 2032. The researchers suggest potential countermeasures, such as specialised screen protectors and the development of advanced sound analysis techniques.

However, the most practical advice offered by the researchers involves altering user behaviour. By refraining from swiping fingers on phone screens during audio and video calls, individuals can reduce the risk of falling victim to this stealthy attack. This precautionary measure extends beyond personal security, hinting at the broader societal impact, including potential threats to national security.

As we navigate an increasingly digitised world where biometric technologies permeate every facet of our lives, PrintListener serves as a stark reminder that the avenues for exploitation are ever-expanding. Balancing the convenience of biometric authentication with robust security measures becomes imperative to safeguard sensitive information and, by extension, national security.

News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

News Room is the editorial desk at National Security News. We cover breaking developments in geopolitics, defense, intelligence, and cybersecurity—publishing timely updates, explainers, and analysis from our reporting team and trusted contributors.

Keep Reading

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Fears of a new conflict in the Horn of Africa

Rockefeller Foundation report signals a new era for nuclear energy in the global south — and a strategic imperative for the West

President Trump declares national emergency on Cuba, creates novel tariff weapon to choke oil supply

President Trump leads new U.S.–Nigeria counterterrorism alliance

China is expanding its inter-continental ballistic missile arsenal faster than other nuclear armed power.

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

US and Iran agree to provisional ceasefire as Tehran says it will reopen strait of Hormuz

April 8, 2026

Trump warns ‘a whole civilisation will die tonight’ ahead of Iran Strait of Hormuz deadline

April 7, 2026

Trump’s first address to the nation since US strikes on Iran

April 2, 2026

United States could leave NATO, says Trump, as he claims Iran ‘wants a ceasefire’

April 2, 2026

The other prize of Operation Epic Fury: a new deal for Iran’s minorities

March 30, 2026

Latest Articles

Iran rejects United States President Donald Trump’s reported 15-point ceasefire plan as “excessive”

March 25, 2026

Iran paying petty criminal proxies to carry out attacks in UK

March 24, 2026

How MTN-Irancell enabled the IRGC’s ICBM programme

March 24, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?