Category Archives: Internet Security

How Healthcare Organizations Use AI to Boost and Simplify Security – HealthTech Magazine

As cybersecurity threats to healthcare grow in number and severity, artificial intelligence is helping providers detect vulnerabilities and respond to data breaches faster and with greater precision.

Given that 63 percent of organizations of all types dont have enough staff to monitor threats 24/7, according to a 2019 Ponemon report, the added defense is crucial. Its arguably even more important for the healthcare industry, whose data is often considered more valuable than Social Security and credit card numbers.

As a healthcare tool, AI can help predict falls in seniors and identify early signs of sepsis. Its also poised to shape many other facets, from disease detection to administrative tasks. As an IT defense mechanism, however, AI may be employed to recognize network behaviors unlikely to represent human action, keep watch for fraud threats and predict malware infections based on previously identified characteristics.

Such intuitive IT capacities offer preventative medicine, helping prevent the infection in the first place, says Rob Bathurst, an adviser for anti-virus software firm Cylance, in a recent white paper about AI and healthcare infrastructure.

Although most people might consider patient- and provider-facing uses as more common AI applications in healthcare, protection is gaining steam: AI-enabled security is among Gartners Top 10 Strategic Technology Trends for 2020. An Accenture report forecasts that AIs value in healthcare security will reach $2 billion annually by 2026.

Moreover, 69 percent of organizations believe AI will be necessary to respond to cybersecurity threats, a July 2019 report from Capgemini found.

MORE FROM HEALTHTECH:Learn how healthcare organizations should respond to a data breach.

At Florida-based Halifax Health, a firewall employs AI to detect attacks based on the wrapper that cybercriminals place around their malware payloads. This function, as CDW cybersecurity expert Alyssa Miller notes, enables Halifax to protect against even zero-day threats that target undiscovered weaknesses.

The AI strategy isnt taken lightly. At the end of the day, cybersecurity is a war, Halifax CIO Tom Stafford said earlier this year at HIMSS 2019 in Orlando, Fla. There are people trying to attack you and your data.

And consequences can be deadly: Ransomware and data breaches are linked to an increase in fatal heart attacks, an October 2019 study by Vanderbilt University found. The reason: Breaches prompt heightened cybersecurity measures for care teams, taking time away from quick treatment.

As a result, vendors are implementing AI in numerous security tools, Miller notes. This includes Cisco Systems, which employs the technology in its next-generation firewalls, its Cloudlock cloud access security broker solution, cognitive threat analytics and Cisco Advanced Malware Protection, among other solutions and services.

IBMs Watson, which uses AI, is helping expedite routine security assessments, reduce response times and false positives, and provide recommendations based on deep analysis, Healthcare Weekly notes. Thats a plus for stretched healthcare IT staffs.

AI has been a powerful tool for Boston Childrens Hospital, whose patient records in 2014 were targeted by the hacking group Anonymous. The technology has since helped the hospital strengthen existing security structures and protocols.

By using AI, we can do a better job at being more prospective and staying one step ahead and starting to be able to detect that anomalous behavior or activity as its happening, Dr. Daniel Nigrin, the hospitals senior vice president and CIO, said in a podcast interview with Emerj, an AI market research firm. Attacks change constantly.

Such behaviors, he noted, might be a user trying to access logs from the West Coast, or 500 doctors who attempt to view a patient record simultaneously.

As Boston Childrens AI strategy evolves, Nigrin advises his peers to follow his lead and cast a wide net when implementing their own defense.

We are looking at other industries to see what theyve done using AI, he said. I am eager to go outside my healthcare world to third parties and other verticals to see how theyve addressed the problem.

READ MORE: Can AI Help Patients Take Control of Their Care?

For the many positives that can result from implementing AI as part of a healthcare security strategy, the effort isnt foolproof. This is because cybercriminals are recognizing the growth of these defense mechanisms and leveraging them to their advantage.

Ron Mehring, CISO of Texas Health Resources, and Axel Wirth, former distinguished technical architect for Symantec, spoke about the threat at HIMSS 2019. AI can help hackers engage in sophisticated social engineering attacks tailored to specific targets, as well as realistic disinformation campaigns, Miller reports in her blog for CDW.

AI also can be used by hackers to find new vulnerabilities or to thwart an organizations AI-fueled defenses. Its what Richard Staynings, chief security strategist for biomedical Internet of Things startup Cylera, calls offensive AI intelligence that mutates to learn about a targeted environment and make detection harder.

That can trigger a host of unease: Did a physician really update a patients medical record or did Offensive AI do it? Can a doctor or nurse trust the validity of the electronic medical information presented to them? Staynings asked in an interview with Healthcare IT News. This is the new threat, and it is best executed by AI.

Organizations, then, must realize that AI-enabled security cant be left on autopilot after implementation, according to Reg Harnish, executive vice president at the Center for Internet Security. More important, a thorough risk evaluation should come first to best determine how AI can solve specific problems facing a hospital or clinic.

Otherwise, as Harnish told Healthcare IT News, if your job is cutting the board in half, no amount of hammers is going to help you do that effectively.

Go here to see the original:
How Healthcare Organizations Use AI to Boost and Simplify Security - HealthTech Magazine

How To Secure The Internet: Troy Hunt Talks Breaches, Passwords And IoT – Forbes

Troy Hunt's HaveIBeenPwned has become a phenomenal success.

Troy Hunt is busy. Hes been travelling across the world giving talks about security, and his much loved and lauded websiteHaveIBeenPwnedwent up for sale in June. But thats not before the sitewhich gives users the chance to see if their emails and passwords have been compromisedhad beenbaked into services such as Firefox and 1Password.

The acquisition is in its final stages, says Hunt. But he concedes that its just a huge amount of effort for one person: Even the acquisition itself.

To be fair to him, Hunt has done pretty well as one person. HIBP, as it has affectionately become known, has been a phenomenal success. As well as educating users on the importance of strong passwords, its raised awareness of credential stuffingwhere attackers will throw peoples credentials at a number of big services in the hope that the victim has reused their passwords.

Its due to this that Hunt could even be credited with improving the security of the web. The success of HaveIBeenPwned largely speaks for itself: Its a globally recognized tool adopted by millions of individuals, and its helped companies and individuals take an interest in their own online security posture, says security researcher Mike Thompson.

But despite the impending sale of HIBP, Hunts work is certainly not over.

On December 7 at 3 p.m. ET (8 p.m. GMT), Hunt will take part in a virtual conference organized by security researcher group The Beer Farmers,calledBeer Con One. The 24-hour event will see Hunt and other guests reflecting back on 2019 as well as the industry as a wholeto raisemoney for theElectronic Frontier Foundation (EFF)andMental Health Hackers.

As part of this, hell talk about one major attack vector that remains an issue: the so-called internet of things (IoT). Among the issues in IoT is the fact that product vendors so regularly fail to build in security from the start. Worse, when notified of a problem, vendors often fail to fix it.

Hunt cites the example of one of the biggest IoT issues this year: location tracking on childrens smartwatches. I bought my daughter one of these and found how she could be tracked, he says, explaining how he worked with security researcher Ken Munro at Pen Test Partners to solve the issue.He handled it so eloquently, but the vendor responded so badly. The PR made it out to be two hackers out to make money.

Another talking point that has dominated 2019 is data security and privacy practices of big tech companies such as Google and Facebook. So, as a security researcher who sees a lot of the issues firsthand, has Hunt deleted Facebook yet?

I think the privacy thing around this is fascinating, Hunt says. I havent deleted Facebook as my friends are on there. I use Google because its the best search engine, but its really interesting to see the challenges they have. They are told by authorities that they need to retain data for terrorismand then people want privacy.

There have been multiple breaches this year, so which were the worst? Hunt says one breach that affected him due to the scars it left was a zoophilia and bestiality site called Zooville. A vulnerability meant you could personally identify individuals. There were user names, email addresses, and IP addresses.

Before he even started, Hunt had some rather unexpected investigations to make. I had to work out: Is this legal? Different aspects of it are legal in different places. There was a little bit of me that was fascinated by how weird it was.

One of the biggest breaches of the year took place at the start of 2019. Revealed in January,Collection #1, saw more than a billion unique email address and password combinations posted to a hacking forum for anyone to see.

This mega-breach containing several data sets from different sources was first revealed by Hunt, and he says it was actually the catalyst for his sites sale. Predictably for a story so big, it gave HaveIBeenPwned a huge spike in customers.

However, many misinterpreted the story, and gave Hunt a hard time. It got interpreted by a number of people as the worlds largest data breachbut it was an amalgamation of different breaches.

Even so, it was important Collection #1 got the coverage: The exposed details could be used for credential stuffing attacks, seeing bots automatically testing millions of email and password combinations on a range of website login pages.

Credential stuffing has become massive this year, Hunt concedes.

This attack thrives on the chance that people reuse their passwords, which means hackers can throw these credentials at several services and bypass authentication on all of them.

Asked how people can be stopped reusing passwords, Hunt says: The only way you are going to not do that is using a password manager. Then two factor authentication (2FA).

Services can actually use thePwned Passwordservice on HIBP to prevent their users from using already breached passwords. People are using bad passwordswe need to save users from themselves, Hunt says.

But he points out that so far, stats show just 2% of people are using a password manager. In some cases, its because it is too complex. For this reason, Hunt doesnt discount using a physical password book.

You need to look at who your threat actor isits someone who can get the book. Its now someone who can break into your house, but then they dont want the book, they want the computer. The book is better than what 98% of people are doing: thats the discussion we want to be having.

Meanwhile, says Hunt, 2FA is a pain in the ass.

I am a proponent but the usability sucks. Or we end up with SMSyou can then do Sim swap attacks.

But at the same time, he says: People say using SMS for 2FA is like not having 2FA at all. Its always going to be bettercredential stuffing goes away.

Go here to see the original:
How To Secure The Internet: Troy Hunt Talks Breaches, Passwords And IoT - Forbes

How do I add a Trusted Site in Windows 10 – TWCN Tech News

If you trust a website but find that some of the functionalities of that site are not working, maybe due to the high security settings of your computer, you can make an exception by adding the site to the Trusted sites list. This post shows how to add a trusted site in Windows 10. This exception is applied to all browsers, including the new Microsoft Edge, Google Chrome, Firefox, Internet Explorer, etc.

Internet Security Options offers four different zones. These four zones are-

All these zones have a specific level of security for your computer browser and files.

The default for the Internet zone is Medium-high. If you want to add an exception, you have to add the site to the Trusted sites zone so that your computer can trust the website and overwrite all the other security zone settings.

To add a trusted site in Windows 10, you need to follow these steps-

Let us see the procedure in a bit more detail.

Search for internet options in the Taskbar search box and click the result. This will open the Internet Options window

After opening, you need to switch to the Security tab. Then, click the Trusted sites option and then click the Sites button.

Now you have to enter the website URL in the Add this website to the zone box. There are two ways to list a website.

First, you can write down the specific URL like this:

Second, you can paste something like this:

Lets assume that your desired website has several subdomains, and you want to add all of them to the Trusted sites list. Instead of writing each subdomain one after one, you can use a wildcard entry like the second example.

After that, click the Close and OK buttons to save your change.

You do not need to restart your computer to apply the change, and it applies to all the installed browsers.

If you have added a website mistakenly, and you want to remove it from the Trusted sites list, you need to follow these steps-

To get started, you need to open the same Internet Options window and go to theSecuritytab. Here you need to selectTrusted siteszone and click the Sitesbutton to unveil the list.

Following that, select a URL from the list, and click theRemovebutton.

Now you need to save your settings to apply the change.

Originally posted here:
How do I add a Trusted Site in Windows 10 - TWCN Tech News

Bargain alert: there’s up to $300 off MacBooks right now – Louder

You'd be forgiven for thinking that, surely, the best deals this cyber weekend must have been done and dusted already but not so fast, sport. We're nowhere near done yet, as Cyber Monday is still to come.

To mark Cyber Monday, Best Buy are offering up to $300 off their range of MacBooks. Now, MacBooks are good, but they're expensive and seldom discounted. Which makes this sale something of an event in itself.

On offer are a selection of MacBook Airsand MacBook Pros, with a range of specs covering pretty much everything. The MacBooks also come with a year of free Apple TV+, free Apple Music for four months for new subscribers, and a six month subscription to Trend Micro Internet Security.

We've picked out the biggest bargains below, but you can peruse the whole range on the Best Buy site.

Amazon.co.uk- new Cyber Monday deals every dayAdidas.co.uk- save up to 50%AO.com- Cyber Monday deals on appliances are live nowArgos.co.uk- top savings on toys, TV and more for ChristmasBoots.com- save up to half price on selected itemsCarphone Warhouse-Cyber Monday phone dealsConverse- save 20% off Chuck 70s.Currys.co.uk-Black Tag sale is now onDNA Fit-up to 40% off DNA test kitsDr Martens Cyber Monday offers now onlineEMP- for merch and rock'n'roll clothing. Save 20 on orders over 85Etsy original and collectible gift ideasFirebox- crazy gift ideas and the world's smallest turntableGoogle Store- a boatload of deals - including 70 off Pixel phonesHalfords- 20% off dash Cams, electric scooters and way moreI Want One Of Those.com- daft gifts and cool techJohn Lewis- Get great warranties with John Lewis' Cyber Monday offersLovehoney.co.uk- up to 50% off sex toys and moreMarshall- Cyber Monday now onlineMobiles.co.ukcheapest mobile phone dealsNike.co.uk- up to 30% off full price itemsNixon- home of the Metallica watchPureScooters.co.uk- up to 500 off electric scootersSimba Sleepsave up to 40% on mattresses for Cyber MondaySuperdrug- top Cyber Monday deals at SuperdrugTownsend Music- up to 75% off vinyl and CDsVery.co.uk- big savings on tech and more

More:
Bargain alert: there's up to $300 off MacBooks right now - Louder

‘Restore Internet in J&K without compromising national security’ – The Hindu

With the situation in Jammu and Kashmir returning to normality after the abrogation of the provisions of Article 370 of the Constitution, which gave it special status it is time for the Central government to take the potential risk of restoring the Internet connectivity in the region, said Lieutenant General Syed Ata Hasnain (retd), who commanded Army Corps in Jammu and Kashmir.

Taking part in the panel discussion on Kashmir: a peep into the future at the last day of Mangaluru Literary Festival 2019 here on Saturday, Mr. Hasnain said Internet connectivity has now assumed the status of human rights because of its multiple usages. Time has come to open the connectivity, without compromising on national security. The government of India has to take the potential risk, he said.

Mr. Hasnain said he has been a witness to the disturbances in 2005, 2008 and 2016 in the Kashmir valley when mobile phones were used to mobilise people. With Jammu and Kashmir now being a Union territory, the Cabinet Committee on Security will have to take an overview of the security in the Kashmir valley and take a decision on restoring Internet connection.

Senior journalist M.D. Nalpath said the mistake was made earlier by bringing in Article 370, which is based on the two-nation theory. Though we have same culture and DNA, an exception was made for Kashmir on the ground that it is a Muslim-majority State. We did a mistake earlier, he said.

On the claim by Bharatiya Janata Party that forming the government in Jammu Kashmir with the PDP was in order to facilitate abrogation the provisions in Article 370, Mr. Nalpath said alliance of BJP with Ajit Pawar in Maharashtra was more serious than its alliance with the PDP. Devendra Fadnavis gave lot of concessions to Ajit Pawar. He sat on the file seeking permission to prosecute Ajit Pawar who faced corruption charges, he said.

Senior international journalist Waeli Awwad said India should ensure that terrorist forces that destroyed Syria and Afghanistan do not gain ground in India. We (Syrians) have suffered. Do not allow them here. Build schools, provide jobs by opening industries and fight against these forces, he said, while emphasising the need to bring Kashmiris to the mainstream.

Jawaharlal Nehru University Professor Anand Ranganthan moderated the discussion.

You have reached your limit for free articles this month.

Register to The Hindu for free and get unlimited access for 30 days.

Find mobile-friendly version of articles from the day's newspaper in one easy-to-read list.

Enjoy reading as many articles as you wish without any limitations.

A select list of articles that match your interests and tastes.

Move smoothly between articles as our pages load instantly.

A one-stop-shop for seeing the latest updates, and managing your preferences.

We brief you on the latest and most important developments, three times a day.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.

Read the original post:
'Restore Internet in J&K without compromising national security' - The Hindu

Cyber crime: Hackers could gain access to your new internet connected car in seconds – Express

New vehicles fitted with over the air connected technology could be hacked and altered to send the cars anywhere a criminal chooses in a dramatic revelation.Cybersecurity expert Asaf Ashkenazi toldExpress.co.ukinternet connectivity in vehicles means anyone in the world can access a car which could be exploited by hackers.

The founder of cybersecurity firm Verimatrix says motoring companies must prevent easy access to a cars software and identify vulnerabilities to boost security.

The revolution means hackers can, in theory, gain access to connected vehicles which could lead to devastating consequences for road users.

Asaf Ashkenazi said: In fact, its accepted in the development community to expect a certain number of bugs even in finished code.

And thats the startling fact for many consumers that these bugs, whether identified or unidentified, could eventually be exploited by bad actors to attack todays vehicles that are so dependent on that software code to conduct countless actions or checks.

READ MORE:Criminals use WhatsApp to plan car thefts

He added the internet connectivity has created an opportunity for attacks which requires sophisticated code protection to avoid motorists from being exploited.

Modern vehicles are increasingly using technology and internet connectivity to provide road alerts and updates to vehicles.

According to data from the Society of Motor Manufacturers and Traders (SMMT) more than 2.5million road uses have cars featuring self-activating safety systems.

It is predicted the UK will reach a total of 8.6million connected cars in service by 2020.

DON'T MISSSAre electric cars safe to drive in the rain?[TIPS]Tesla new cybertruck destroyed in launch demo[VIDEO]Motorists are at risk from purchasing false parts for used cars[ADVICE]

Ashkenazisaid: Most of the car, though it may not be obvious to the driver, either already uses or at least has that connectivity. In the future, even more parts of the car will be connected.

Hackers forced Fiat Chrysler to recall 14million vehicles in the United States in 2015 after revealing one of their cars could be accessed by cyber criminals.

Security researchers proved it was possible to control the vehicle remotely just by tapping into the internet-connected entertainment system.

Tesla founder Elon Musk as also raised concerns hackers pose by being able to gain access to connected vehicles.

He previously warned it could be the end of tesla if a hacker managed to gainaccessto their autonomous vehicles and send them across the country.

America firm Upstream Security has recorded more than 260 worldwide cyber-attacks on cars since 2010 with 73 recorded alone throughout 2018.

Hackers are believed to be interested in gaining access to personal data stored in vehicles because of internet capabilities.

Vehicles are often paired with mobile devices which gives hackers potential access to contacts, emails and information about the destinations they have visited.

According to Upstream Security, there are more attacks on vehicles through servers than keyless car entry in the United States.

Reducing the threat to connected cars

Manufacturers have been investing in security and testing to make sure their cars are as safe as possible from cyber-attacks.

Engineering and defence firm Chemring says the only way to lower the risk is to introduce a baseline level of security that works across the industry.

They say the baseline standard must be adhered to by every manufacturer to guarantee the highest levels of protection.

Elon Musk has previously floated the idea of having an instant kill switch that would be able to turn off a cars internet connectivity and override the hackers to return the vehicle back to manual control.

Asaf Ashkenazi has toldExpress.co.ukhis Verimatrix firm is working to create security that prevents easy access to software and provides the latest possible security measures.

He adds: Good code protection makes it difficult to reverse engineer code, alerts to suspicious actions, and prevents unauthorised code execution in the first place.

Its absolutely needed into todays cars. Otherwise, the industry could face potentially chaotic or even dangerous scenarios that might affect far more than an automakers reputation.

The rest is here:
Cyber crime: Hackers could gain access to your new internet connected car in seconds - Express

Understanding Biometric Security: The Growing Threats and How to Beat Them – Techopedia

People prefer biometric security authentication to passwords because PINS and passwords readily get hacked and are challenging to remember. While passwords are the current what you know method, your physical characteristics are "what you are."

And there's only one you. (Read New Advances in Biometrics: A More Secure Password.)

But, picture this: a four-year-old child noticed that Amazon dropped gifts on their doorstep after her mother swiped her pinkie on the iPad's touchpad. So, the child used her sleeping mother's pinkie to unlock the device and, going to Amazon.com, one-clicked that beautiful pink bike.

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

True story. Incidents like that happen all the time. (Read How Passive Biometrics Can Help in IT Data Security.)

Gartner, a leading research and advisory company, claims certain physical and behavioral characteristics, like your facial features or the way you type, are more secure than your password.

In contrast, critics count millions of data breaches and they're growing every day.

Over the last decade, scientists unleashed various biometric verification identifiers to dramatically improve enterprise security.

The most common biometric identifiers are:

Join this interactive round table to learn more about HCI and how this technology helped a mid-sized, service-oriented, and process-intensive company to simplify its IT while providing better services, aligned to increasing business needs.

Used to unlock door panels, devices or computers of approved users, among other user cases.

More specifically the iris, sclera or retina, where devices equipped with cameras scan the unique patterns of your eyes.

For example, prompt server room doors to swing open automatically when cameras recognize the faces of trusted system administrators.

For example, digital assistants and telephone-based service portals use voice recognition to identify users and verify customers. (Read Voice Recognition Technology: Helpful or Painful?)

Other image-based authentication methods include facial contortions, veins in your hand, the shape of that hand, body odors, and the shape of your ears.

More recently, researchers at the University of Buffalo developed a way that you can use heartbeats for your new pass-code, while, at the same time, a $1,000 pocket-sized scanner hit the market for scanning DNA.

According to a recent Ping Identity survey, 92% of IT and security respondents rated biometric authentication as two of the top five most effective security controls, and 80% said it is effective for protecting data stored in a public cloud.

Around the same time, a Spiceworks survey reported that 62% of companies are already using biometric authentication, and another 24% plan to deploy it within the next two years.

The Amazon-grubbing child is one of scores of incidents that plays havoc with biometrics authentication. Two years ago, on a Qatar Airways flight a woman used her husbands fingerprint to unlock his phone while he was asleep, to divulge his infidelity.

It's super easy to copy fingerprints as cybersecurity and emerging technologies advisor, Joseph Steinberg remarks:

For well over a decade, I have been outspoken against the widespread use of fingerprints and most other forms of biometric authentication as a means for authenticating people among the serious problems with such schemes are the fact that biometric information is not secret (you leave your fingerprints on everything that you touch, and often show them in pictures, for example).

You want to know the cheapest simplest fastest way to crack into your boss iPad? Use play-dough.

And look for high-definition photos where your boss high-fives, makes the Vulcan peace sign or raises his hand to ask a question just like the hacker who recreated a German ministers fingerprints using photos of her hands in 2014.

There are bundles of other tricks that include researchers using voice scanners to impersonate your voice, iris scanners that match your retinas and face scanners that trick facial recognition login with photos from, say, Facebook even 3D-printed heads.

Aside from that, facial recognition devices can readily be fooled by false positives, such as if your voice is hoarse, you switch hair-styles, you wear sunglasses, or don a mask for Halloween.

So, fingerprints, voices and faces are out, but so, too, are heart-beats, DNA, body odors, and eyes. If they get compromised, you can't just roll out your eyeball and replace it with another

Biometric authentication is convenient, but privacy advocates fear biometric security erodes your privacy. Companies could easily collect and exploit your data on, say, where and when you typically use your phones.

Hackers could replicate and sell these biometrics for tracking and marketing your behavior and movements. As Robert Capps, VP of Business Development at NuData Security warns, Once biometric data is stolen and resold on the Dark Web, the risk of inappropriate access to a users accounts and identity will persist for that persons lifetime.

Even the multi-factor security model of Indias Aadhaar the worlds largest biometric identification system succumbed to hackers in 2018.

Had you been interested, you could have bought the personal data of more than one million citizens of India on WhatsApp for less than $10.

Susan Rebner, CEO of Cyleron, national security company, said she believes that's the next step and something her company's working on.

For example: devices analyze the way typists slide their fingers across desktops while sliding doors discern the person's stride; computers kick up at a person's finger impact on the keyboard, while mobiles recognize a user's hand tremor when punching numbers, among other items.

Other methods include speech recognition (used, for example, by USAAs mobile app) , well as signature verification (used, for instance, by banks on letterheads and other documents).

Any user behavior that veers from their norms and the device or system locks those users out.

You can protect passwords by hashing them into chains of digits and letters. Scientists say you can do the same with biometrics, encrypting them on a secure server.

In an interview for Biometric Update, Infinitys CEO Alfred Chan said their company's Quantum-Crypt technology developed hashed solutions for iris, fingerprints, and 2D face modalities, and is now exploring 3D modalities.

You can combine biometrics authentication with blockchain technology, or the decentralized ledger, where platforms are open-ended and shared by other participants. (Read Can the Blockchain Be Hacked?)

This means, any attempt to modify the data is detected by other users who subscribe to the platform.

While behavioral biometrics seems the most secure by far, analysts warn that the system needs to be regulated for data privacy and security and that the method needs broader testing to screen out false positives or false negatives.

On blockchain technology and hashed biometrics, MIT researchers recently showed how hackers could breach the allegedly "unhackable" blockchains.

Certainly, the same goes for cracking your hashed password to retrieve those biometrics.

Europeans have the General Data Protection Regulation (GDPR) that gives consumers protection over their personal data including biometrics. (Read How Cybercriminals Use GDPR as Leverage to Extort Companies.)

The U.S., to date, only has a hodgepodge of overlapping and contradictory laws from industry groups and federal as well as local government agencies - and that's despite its June 2015 hack of the US Office of Personnel Management where cybercriminals pilfered more than 5.6 million fingerprints of government officials.

If you're a business that wants to use biometrics authentication to shield your data, you're likely to benefit from this 1-2-3 proactive approach.

Regularly educate your staff on the biometrics security system you use and on how to ensure data privacy. You would also want to use strong passwords and store your biometrics in three places at best. Further, keep your operating system and Internet security software current so hackers can't crack it.

For greater security, use a combo of identifiers, so, for example, add fingerprints to facial recognition, like the new LG V30 smartphone that combines facial and voice recognition with fingerprint scanning. Some security systems also include additional features, such as age, gender, and height, in biometric data to thwart hackers.

Humans can dupe facial scanners by wearing a mask or makeup. Add a human to your security checkpoint for ultimate security.

Oh, and by the way...

You may want to observe the Illinois 2008 Biometric Information Privacy Act, where a company that collects its employees data must notify them on how the data will be used and stored and get their consent. Doing so saves you from privacy lawsuits from employees and customers whose biometric data you store.

Hackers are always going to be one step ahead of you.

Beat them to the trick by combining passwords with biometrics authentication systems and putting humans in the loop to improve security.

Also remember those privacy concerns.

While biometrics authentication technology is not foolproof, you may find it gives you less problems than passwords - as long as you keep on top of the system.

Original post:
Understanding Biometric Security: The Growing Threats and How to Beat Them - Techopedia

Podcast: Digital Trust in the Age of Deepfakes – insideHPC

Dave Maher, CTO ofIntertrust

In this podcast, the Radio Free HPC team catches up withDave Maher, CTO of internet security companyIntertrust, to share with us his deep knowledge of digital communication, identity management, data rights management, cryptography and digital certificates, blockchain, and much more.

Dave gave us the run down on Intertrust and his other roles in the cybersecurity arena. Dave also discusses the evolution of the internet and the rising need for security given that the internet has vastly changed since it began so long ago.

The main topic of the conversation is authenticity and truth. With the rise of deepfakes (images or videos that are convincingly falsified), how do we know that what were seeing and hearing is created by who we think and is what we think? This leads to a deep conversation on ways we can verify content so that we know that its authentic. There are many ways of approaching it, but some implementation of blockchain seems to be a promising route.

Download the MP3 *Subscribe on iTunes *RSS Feed *Follow us on Twitter

Sign up for the insideHPC Newsletter

View original post here:
Podcast: Digital Trust in the Age of Deepfakes - insideHPC

The Debate Over How to Encrypt the Internet of Things – WIRED

Internet-connected gadgets like lightbulbs and fitness trackers are notorious for poor security. That's partly because theyre often made cheaply and with haste, which leads to careless mistakes and outsourcing of problematic parts. But its also partly due to the lack of computing power in the first place; it's not so easy to encrypt all that data with limited resources. Or at least thats how the conventional wisdom goes.

But real-world data suggests that many of those ubiquitous tiny gadgets can run versions of traditional, time-tested encryption schemes. A team from the Swiss IoT encryption firm Teserakt argues that there's no need to reinvent the wheel when the real solution is simply holding IoT manufacturers to higher standards. They made their case at a National Institute of Standards and Technology conference in Maryland this month focused on developing lightweight cryptography for embedded devices.

But traditional cryptography, particularly the stalwart Advanced Encryption Standard, often works just fine in IoT devices, says Antony Vennard, Teserakt's chief engineer. The researchers have even observed a number of situations where security-conscious manufactures found ways to incorporate it, like in the embedded systems of cars. And other, independent studies have had similar findings.

"The lightweight competition is based on the idea that for embedded devicesthings like industrial controllers and smart cards like chip credit cardsAES is too heavy, too big. Using it takes up too much space and power," Vennard says. "But my passport has a chip in it that can run AES. Modern smart cards can run it. Fitness trackers like FitBits can run it. In our experience, AES is pretty much everywhere, even in embedded devices."

"Where it could get confusing is where people arent sure what level of security they need."

Antony Vennard, Teserakt

Its important to talk about the actual utility of lightweight encryption now, because it takes years for the cryptography community to develop and vet a new encryption scheme to ensure that its safe to use. NIST has already been working on lightweight cryptography since 2015. And once those standards are in place, it takes even more time to gain real-world experience implementing the scheme to catch mistakes. It adds a lot of time and potential risk to the process of securing these devices. If you can make existing encryption algorithms work on them instead, all the better.

In February, for example, Google debuted a method for encrypting most low-end Android devices regardless of how piddly their processors. Rather than a novel encryption scheme, it relied on clever implementations of AES and other existing cryptographic methods to reduce the chance of introducing a fundamental flaw. The method, dubbed Adiantum, is an impressive solution to one of Android's more daunting problems. But Johns Hopkins cryptographer Matthew Green points out that the lengths Google had to go to to achieve it may actually indicate a need for lightweight cryptography, rather than showing that it's worth sticking with AES. "It's not actually a great argument for 'AES is fast enough,'" Green says.

Though it may be possible to implement traditional encryption more widely than the IoT industry currently believes, Vennard admits that there are situations where lightweight encryption would be useful. Certain devices, particularly things like simple sensors in industrial control settings, are powered by microcontrollers so rudimentary that they really would require special encryption techniques to secure. But Vennard argues that the key is clearly defining these categories rather than creating a situation where developers and manufacturers don't know which cryptographic techniques should be used where.

"There are some cases where you might need lightweight crypto, but where it could get confusing is where people arent sure what level of security they need," Vennard says. "If people can use AESwe have about 20 years of experience implementing AESbut don't, that's a risk, because implementing something new is tricky."

It's also always possible that the US government knows something private researchers don't. Along with NIST, the National Security Agency, for example, has stressed the importance of developing next-generation cryptography schemes. That's partly because of the threat to encryption posed by the rise of quantum computing, but it's also because of the IoT security crisis.

View post:
The Debate Over How to Encrypt the Internet of Things - WIRED

The EU says security is not the only concern when it comes to 5G – CNBC

Aside from security risks, European governments should consider the wider consequences of handing out contracts to 5G suppliers, according to an EU document seen by CNBC and one which could have repercussions for the Chinese firm, Huawei, that is under scrutiny as a potential 5G supplier.

"In addition to the technical risks related to cybersecurity of 5G networks, also non-technical factors such as the legal and policy framework to which suppliers may be subject to in third countries, should be considered," a draft document prepared ahead of a meeting of European ministers and seen by CNBC said.

5G is the next generation of mobile internet technology, designed to deliver super-fast data speeds. However, the debate over the providers of 5G technology has become politicized, with officials in the U.S. and U.K., among other countries, expressing concerns that suppliers like Huawei could pose a security threat.

In the case of Huawei, there are specific concerns about its links to the Chinese government. Huawei has rebuffed those concerns, saying it is independent of the Chinese state and would not allow its technology to be used for any state surveillance, as some experts have suggested could happen.

The same EU document highlighted that European countries should "consider the need to diversify suppliers in order to avoid or limit the creation of a major dependency on a single supplier."

The draft document, which is set to be agreed on during the first week of December at a meeting of EU ministers, comes as the EU lays the foundations for the implementation of 5G over time.

The European Commission the EU's executive arm released a report last month assessing the risks of 5G. The report said that the roll-out of 5G networks is expected to "increase the exposure to attacks and more potential entry points for attackers."

It also said that "the risk profile of individual suppliers will become particularly important, including the likelihood of the supplier being subject to interference from a non-EU country."

A spokesperson for the European Commission, told CNBC via email last week, that the "report deliberately does not contain any references - explicit or implicit - to individual countries or suppliers."

"It follows an objective approach and identifies a number of strategic risks, which will help define appropriate mitigation measures," the spokesperson also said.

In Germany, the debate over 5G has intensified in recent weeks. Chancellor Angela Merkel decided not to stop Huawei from potentially supplying Germany's 5G networks. She said that all telecom providers will be allowed to participate in the roll-out of 5G in Germany provided they meet specific and tight security standards.

However, the German parliament as well as some senior government officials have criticized Merkel's decision.

German Foreign Minister Heiko Maas said earlier this month that Huawei is obliged to pass on information to the Chinese government and, as a result, he raised doubts as to whether the firm should be allowed to work in Germany.

However, all German telecom providers use Huawei equipment and have warned that banning Huawei would postpone the roll-out of 5G as well as cost billions of euros, the BBC reported.

Go here to read the rest:
The EU says security is not the only concern when it comes to 5G - CNBC