This document discusses vulnerabilities in biometric recognition systems. It begins by noting that while biometrics offer promise for authentication, spoofing attacks remain too easy. It then provides examples of recent fingerprint and facial spoofing attacks against Samsung and iPhone devices. The document outlines different types of presentation attacks and discusses presentation attack detection methods. It also explains how machine learning systems can be deceived through adversarial examples and perturbations. The document notes vulnerabilities in using biometrics on mobile devices and discusses how templates and systems must evolve for stronger security. It concludes by mentioning the potential role of blockchain.