A major security breach raises a key question: what happens when your biometric data is exfiltrated from a system?

A major security breach raises a key question: what happens when your biometric data is exfiltrated from a system?

As the researchers note, anyone who had found this database could use those admin passwords to take over a high-level BioStar 2 account with all user permissions and full clearances, and make changes to the security settings in an entire network.