Cybercriminals can use stolen photos to pass basic identity checks, register for online services, or bypass weak “selfie ...