Quantcast
Channel: Cyber Defense Archives - MITechNews
Viewing all 480 articles
Browse latest View live

US DOT Secretary Foxx Detroit Auto Cybersecurity Speech Now Online

$
0
0

DETROIT – U.S. Transportation Secretary Anthony Foxx’s speech at the inaugural Billington Auto Cybersecurity conference last Friday at Cobo Center is now posted online for you to watch.

Highlights of his speech include:

The US DOT will soon (weeks perhaps months) be issuing its own report on auto cybersecurity and the threats posed by the connected vehicles that could be targeted by hackers.

The US population will increase by 70 million people over the next 30 years.

By 2045, 75 percent of Americans will live in 11 mega regions that don’t have the infrastructure to accommodate growth. There will be a 45 percent increase in freight volume on the roads, waterways and rails.

Connected and autonomous vehicles will only be successful if cybersecurity best practices are adopted by all 18 world automakers.

View Secretary Foxx’ 25-minute speech by clicking on the arrow in the image above.

The post US DOT Secretary Foxx Detroit Auto Cybersecurity Speech Now Online appeared first on MITechNews.


Putin’s Russian Hackers Behind Wikileaks Democrat National Committee eMail Dump

$
0
0

WASHINGTON DC – Reports surfaced over the weekend that points squarely at a Russian intelligence group that was the source of the most recent Wikileaks email dump – this one aimed at influencing the U.S. election.

Cybersecurity experts confirmed – based on digital forensic evidence – that a hacking group backed by Russian President Vladimir Putin broke into the email system of the Democrat Party, stole thousands of sensitive messages and then published them through an obliging third party in a way that was strategically timed to influence the United States presidential election, damaging Democrat nominee Hillary Clinton.

On Friday, Wikileaks published 20,000 emails stolen from the Democratic National Committee. They reveal, among other things, thuggish infighting, a push by a top DNC official to use Bernie Sanders’ religious convictions against him in the South, and attempts to strong-arm media outlets. In other words, they reveal the Washington campaign monster for what it is.

Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clinton’s Presidential campaign.

To read the rest of this story, click on http://www.defenseone.com/technology/2016/07/how-putin-weaponized-wikileaks-influence-election-american-president/130163/

The post Putin’s Russian Hackers Behind Wikileaks Democrat National Committee eMail Dump appeared first on MITechNews.

Internet Advisor: Lohrmann Provides Michigan Cyber Militia Update

$
0
0

DETROIT – Dan Lohrmann, led Michigan’s cybersecurity and technology infrastructure teams from 2002-2014, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. During that time he was involved in crafting the state’s response to the tidal wave of cyber attacks that grew bigger and more vicious. One of those responses was the catchy “Cyber Militia.” On this Internet Advisor podcast, he describes how that concept has progressed to the formation of the Michigan Cyber Civilian Corps (MiC3) and who can be involved.

To listen, click on http://internetadvisor.net/wp-content/uploads/2016/07/1629-Dan-Lohrmann-Cyber-Security.mp3

Internet Advisor is heard live each Saturday from 4 to 6 pm on WJR Newsradio 760 in Detroit. MITechNews.Com Editor Mike Brennan presents top tech headlines at 4:50 pm. The show also is syndicated at the stations listed below.

Welcome Network Affiliates

WJRW

AM

1340

Grand Rapids

Sun 1p-2p

WJIM

AM

1240

Lansing

Sun 2p-4p

WKMI

AM

1360

Kalamazoo

Sun 12p-1p

WKLQ

AM

1490

Whitehall/Muskegon

Sat 4p-6p, Sun 12p-2p

The post Internet Advisor: Lohrmann Provides Michigan Cyber Militia Update appeared first on MITechNews.

Obama Makes FBI Lead Government Agency To Respond To Cyberattacks

$
0
0

WASHINGTON DC – Who’s in charge of responding to “cyber incidents” in the US? As of today, it’s the Federal Bureau of Investigation.

President Barack Obama outlined a new policy for responding to cyberattacks on both the government and US industry on Tuesday, making the FBI the lead agency regardless of where the attack seems to be coming from. The federal agency will coordinate responses to attacks even if it turns out they’re coming from foreign hackers, including foreign governments.

“[C]ertain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts,” Obama wrote in the policy directive released Tuesday.

The announcement comes as the FBI launches an investigation into who hacked the Democratic National Committee and reportedly leaked sensitive emails from Democratic Party leaders to WikiLeaks. It also comes as the government and private industry grapple with whether the US should retaliate against hacking attacks.

The policy doesn’t touch on how the FBI might interact with the US military. The US Cyber Command, run by the director of the NSA, is in charge of carrying out military cyberattacks for the US as well as securing military networks and information.

According to a fact sheet released with the policy directive Tuesday, the new approach is meant to focus on “significant” incidents, which could likely “result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.”

This story was reported by CNET.Com.

The post Obama Makes FBI Lead Government Agency To Respond To Cyberattacks appeared first on MITechNews.

Report: Keysniffer Hack Can Detect Passwords From Wireless Keyboards

$
0
0

SAN FRANCISCO – Using an attack that researchers at cybersecurity firm Bastille are calling “keysniffer,” hackers can detect every key you press on your wireless keyboard. Think about that next time you’re using your laptop in a coffee shop.

That means they can pick up your passwords and maybe the answers to your security questions, like your mother’s maiden name. The flaw affects keyboards manufactured by big names such as HP, Toshiba and General Electric. So far, bad news.

The good news? To use “keysniffer” on you, hackers would have to be pretty close. The attack works within 250 feet, which is about three-fourths the length of a football field. So international hackers aren’t going to get you, and neither is anyone else who isn’t in your physical neighborhood. But public Wi-Fi spaces? Hum. 

Like many vulnerable internet-connected devices, these keyboards are most at risk when someone with bad motives happens to be nearby — or, more likely, has specifically targeted you. The same was true of flaws found in Hello Barbie, a doll that connects to Wi-Fi and learns to interact with its human friends.

Still, the reason your keyboard might be a touch vulnerable is disconcerting. The vulnerable keyboards are sending out each character you type over an unencrypted connection, according to Bastille researchers. That means the data flowing from your keyboard to your computer isn’t scrambled, and it’s no sweat for hackers to intercept and read.

Researchers from Bastille, led by Marc Newlin, said they tested low-cost keyboards from 12 manufacturers. In addition to keyboards from HP, Toshiba and General Electric (which licenses its name to manufacturer Jasco for keyboards), wireless keyboards from Kensington, Radio Shack, Anker, EagleTec and Best Buy’s Insignia brand were vulnerable.

Denise Nelson, a spokeswoman for Kensington, said the company is working with Bastille on security issues. “They have taken all measures that they possibly can to close any security gaps,” she said.

Nelson said new Kensington keyboards will feature an encrypted connection going forward. However, she did not know whether wireless keyboards already in use were still unencrypted. She added that the Kensington support team is ready to help customers resolve any issues.

Jasco is aware of the report from Bastille and “will work directly with its customers of this product to address any issues or concerns,” the company said in a statement. Jasco is “committed to delivering secure products to its customers and would like to express its appreciation to Bastille Threat Research Group for reporting these issues.”

The rest of the manufacturers named by Bastille did not respond to requests for comment. (Editor’s note: Anker eventually responded; see update note at bottom of story.)

Bastille’s website offers a list of the exact models affected.

This story was published by CNET.Com.

The post Report: Keysniffer Hack Can Detect Passwords From Wireless Keyboards appeared first on MITechNews.

CloudTech1 University’s Next Showcase – Business Continuity And Disaster Recovery

$
0
0

TROY – Managed service provider CloudTech1 on Aug. 23 at Automation Alley headquarters will be discussing Business Continuity and Disaster Recovery. A disaster doesn’t have to be a disaster. 

Disasters happen. It is part of life. Hopefully you and your company never have to go through one. The key is preparedness. How do you prepare and protect?  If a small to medium business is unprepared for a disaster and one occurs there is a 90 percent chance your company closes the doors within a year. 

WHEN

Tuesday, August 23 from 11:00 AM to 1:00 PM (EDT) – Add to Calendar

WHERE

Automation Alley – 2675 Bellingham Drive, Troy, MI 48083-2044 – View Map

To register, click on https://www.eventbrite.com/e/game-changing-cloud-technology-a-cloudtech1-university-event-tickets-25600250037?inf_contact_key=b579c9179df1a291c5eb034b29fabd6c42f1493cd8a9606960a15036d736030e

The post CloudTech1 University’s Next Showcase – Business Continuity And Disaster Recovery appeared first on MITechNews.

Understanding New Hacktivism: Where Next for Hackers With a Cause?

$
0
0

LANSING – In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving a diverse set of causes around the globe.

A quick recap of the top online security stories in 2016 include a significant increase in ransomware emergencies, scary growth in online fraud such as whaling, terrorist use of social media and a long list of new malware threats.

But the surge in hacktivism trend has brought about the deepest and widest global cybersecurity impact, in my view.

As our offline and online worlds merge together as never before, hacktivism has become a weapon that brings global media attention and offers protestors a cyber “march on Washington” without large numbers of people. No doubt, the hacktivism topic moved onto center stage this past week with the release of hacked Democratic National Committee (DNC) emails by WikiLeaks.  

Some call it cyberespionage, while others call it radical transparency, but more and more people are starting to make the case for digital disobedience.

Anonymous and WikiLeaks are two of the most well-known hacktivist organizations, but the list of known hacktivist organizations is much longer.

Global anti-establishment causes have turned to hacktivism to release information that furthers their cause(s) in various ways. And these causes can be very diverse and range from national elections to offshore financial accounts to the Flint water emergency. What complicates matters is that many hackers do not fit neatly into legal and illegal categories, and the same people may hack for a variety of financial reasons or societal causes.

Many believe that nation states may have joined these causes — even ifhacktivist leaders, and leaders in countries such as Russia, deny the charge. Organizations like WikiLeaks claim that they are helping society by being a data broker and releasing information that the public “needs to see” in their view.

To read the rest of this story, click on http://www.govtech.com/blogs/lohrmann-on-cybersecurity/understanding-new-hacktivism-where-next-for-hackers-with-a-cause.html

The post Understanding New Hacktivism: Where Next for Hackers With a Cause? appeared first on MITechNews.

New Ransomeware Target: Smart Thermostats

$
0
0

LAS VEGAS – One day, your thermostat will get hacked by some cybercriminal hundreds of miles away who will lock it with malware and demand a ransom to get it back to normal, leaving you literally in the cold until you pay up a few hundred dollars.

This has been a scenario that security experts have touted as one of the theoretical dangers of the rise of the Internet of Things, internet-connected devices that are often insecure. On Saturday, what sounds like a Mr. Robot plot line came one step closer to being reality, when two white hat hackers showed off the first-ever ransomware that works against a “smart” device, in this case a thermostat.

Luckily, Andrew Tierney and Ken Munro, the two security researchers who created the ransomware, actually have no ill intention. They just wanted to make a point: some Internet of Things devices fail to take simple security precautions, leaving users in danger.

“We don’t have any control over our devices, and don’t really know what they’re doing and how they’re doing it,” Tierney told Motherboard. “And if they start doing something you don’t understand, you don’t really have a way of dealing with it.”

Tierney and Munro, who both work UK-based security firm Pen Test Partners, demonstrated their thermostat ransomware proof-of-concept at the hacking conference Def Con on Saturday, fulfilling the pessimistic predictions of some people in security world.

The two took advantage of a bug in a particular thermostat, but declined to reveal which one since they haven’t had a chance to contact the company and get it fixed yet. The two said they found the vulnerability just a few days before Def Con, adding that they plan to contact the company to get it fixed on Monday. They also said the fix should be easy to deploy.

To read the rest of this story at Motherboard, click on http://motherboard.vice.com/read/internet-of-things-ransomware-smart-thermostat

The post New Ransomeware Target: Smart Thermostats appeared first on MITechNews.


M2 TechCast: Beckers Talks Disaster Recovery Event Aug. 23 At Automation Alley

$
0
0

ROYAL OAK – Rick Beckers, CEO of CloudTech1, talks about his brain child, the CloudTech1 University. His company is a managed service provider that evolved into a cloud service provider. So he wanted to help folks understand all about the cloud and what it can do. In June he launched his CloudTech1 University to teach business people who want to learn more about the cloud, as well as business professionals and techies the latest wrinkles with the cloud.

The program includes a meal and an update, first from Rochester Hills where CloudTech1 is based. And now Troy. Others will be rolling out soon in Novi and Ann Arbor. The August 23 event – on business continuity and disaster recovery – from 11 am to 1 pm is scheduled for Automation Alley headquarters in Troy. Automation Alley – 2675 Bellingham Drive, Troy, MI 48083-2044 – View Map

To listen to the podcast, click on https://soundcloud.com/podcastdetroit/m2-episode-44-cloudtech

To register for the next event, click on http://cloudtech1.com/events/

The post M2 TechCast: Beckers Talks Disaster Recovery Event Aug. 23 At Automation Alley appeared first on MITechNews.

CloudTech1 University Sept. 21 Class Focuses On Network Security

$
0
0

 ROCHESTER HILLS – Join CloudTech1 University at its Education Center on September 21st at 11am to enjoy some food, to have some fun and learn about Network Security, a strategy no business can afford to ignore.

CloudTech1 University has become an ideal place to learn cloud basics and ask questions about the security of your business network. Each company is unique. Each company needs to stay on top of all the security updates.

CloudTech1 University offers a sales-pitch free environment that is informative. Students – either business executives or tech professionals – can win a gift card.

The August 23 Showcase, featuring business continuity and disaster recovery, is less than two weeks away. Check is out here if you haven’t registered already!

 

 

 

The post CloudTech1 University Sept. 21 Class Focuses On Network Security appeared first on MITechNews.

Research Shows 30 Percent Of Employees May Fall For Phishing Attacks

$
0
0

ANN ARBOR – The Ann Arbor two-factor security developer Duo Security this week published research that illustrates the risk phishing attacks present to business.

Since its July 2016 launch, about 400 companies have begun using Duo Insight, a free tool that lets IT teams run internal phishing simulations. Of the 11,542 users who received a phishing email from their IT team, 31 percent of organizations are at risk of a data breach due to phishing attacks.

Based on the data from Duo Insight, in a real-world scenario, attackers can run a phishing campaign that takes only 5 minutes to put together, and within 25 minutes they’ve got access to corporate data resulting in a data breach.

Data analysis from Duo Labs uncovered that:
* 31 percent of users clicked the link in the phishing email sent by their internal team.
* Those users who clicked the link in the phishing campaign open their organizations to hackers through unsecured internet browsers, plugins (Flash and Java), and out-of-date operating systems on their devices.
* Hackers can easily exploit those vulnerabilities and get even more than they would get with just a set of credentials. In this case, attackers would have complete control over the compromised device.
* Worse still, 17 percent of users entered their username and password, giving an attacker in a real-world scenario the keys to corporate data.

The goal of Duo Insight is to offer organizations of all sizes a free internal phishing drill system that allows them to simulate a phishing attack on their employees in five minutes. With the results of those simulations, administrators can identify potential security weaknesses and make the case for investing in stronger security solutions or better employee education.

In addition, IT teams will better understand the security health, or lack thereof, of all of the devices accessing corporate data. With that information, they can create internal programs to keep employee devices up-to-date and secured against known vulnerabilities.

The company said businesses can run free phishing drills with Duo Insight at https://insight.duo.com to assess risk of phishing attacks that could lead to data breaches.

This story was published in Technology Century by Matt Roush.

The post Research Shows 30 Percent Of Employees May Fall For Phishing Attacks appeared first on MITechNews.

NSA Whistle Blower Snowden Says Russian Hack Of Democrat Party Server Diplomatic Signaling

$
0
0

MOSCOW – NSA whistle blower Edward Snowden said his old employer was likely hacked by his new host, Russia.

Snowden tweeted Tuesday that the auction of malicious software files allegedly stolen from the NSA may actually be diplomatic signaling by Russia. The software, a set of digital tools, is being auctioned by a group that says it stole the cyber weapons from another group allegedly linked to the NSA.

Snowden’s comments are just the latest twist in the drama of an alleged hack of the NSA. A group calling itself The Shadow Brokers posted part of the software online earlier this week to entice bids for the rest of it.

In a 13-tweet blast, Snowden said the auction may be a signal to the US to think twice before retaliating over the hack of two Democratic Party organizations. Those hacks were widely seen as attempts by Moscow to influence the US electoral process.

Snowden wrote the “circumstantial evidence and conventional wisdom” suggested Russia was behind the alleged hack. Possession of the cyber tools serves as a warning that someone could prove US involvement in other cyberattacks.

His conclusion: The leak is a reminder to the US that things could get ugly quickly.

Snowden, a former NSA contractor, has been in exile in Russia since June 2013. Snowden rocketed to international fame after releasing a trove of documents detailing the extent of the intelligence agency’s operations.

This story was published by CNET. To subscribe, click on www.cnet.com

The post NSA Whistle Blower Snowden Says Russian Hack Of Democrat Party Server Diplomatic Signaling appeared first on MITechNews.

Getting Middle And High School Students Inspired By STEM Topic Of ISACA Detroit Meeting

$
0
0

TROY – Inspiring middle and high school student to study STEM (Science Technology Engineering and Math) will be the pre-dinner topic for the Sept. 21 ISACA Detroit chapter meeting. Also on the agenda is a talk by Tamara and Daniel Shoemaker from the University of Detroit-Mercy.  Deadline to register is Sept. 16.

The after dinner topic will be vulnerability management by Zee Abdelnabi.

WHEN
September 21, 2016 4:30 PM-7:45 PM

WHERE
Michigan State University Mgmt. Edu. Center
811 West Square Lake Road, Troy, Michigan 48098-2831, USA

FEE
View Event Fees

View Chapter Meeting Summary

RSVP
Noon on Friday, September 16

The post Getting Middle And High School Students Inspired By STEM Topic Of ISACA Detroit Meeting appeared first on MITechNews.

Trident Spyware Invades Apple iPhones Unless You Update Immediately

$
0
0

CUPERTINO – If you have an iPhone be afraid, be very afraid. A terrifying new spyware, dubbed Trident, can break through the security protection to read texts and email, record calls (including WhatsApp and Viber calls), track your location and turn on your phone’s camera and microphone.

Trident exploits three zero-day vulnerabilities in iOS 9 to form an “attack chain” that can break through Apple’s (relatively) secure platform. According to University of Toronto’s Citizen Lab, Trident is used in a spyware product developed by Israel-based “cyber war” company NSO Group (which is reportedly owned by an American venture capital firm).

Citizen Lab and Lookout became aware of the issue when links containing the Trident exploit and the spyware were sent to Ahmed Mansoor, a human rights defender based in the United Arab Emirates. Mansoor did not click on the links and instead forwarded the emails to Citizen Lab, but had he clicked on the links, his phone would have been remotely jailbroken and invaded by NSO Group’s “government-exclusive” spyware. Upon confirming the zero-day iOS vulnerabilities, Citizen Lab and Lookout notified Apple — and now Apple has released a fix.

If you want to update your phone, click on this link: http://www.cnet.com/how-to/iphone-ios-security-update-malware/

The post Trident Spyware Invades Apple iPhones Unless You Update Immediately appeared first on MITechNews.

Cyber-Security Certificate Courses Launching at Macomb-OU INCubator

$
0
0

AUBURN HILLS – The Macomb-Oakland University Incubator is launching the first cyber-security certificate courses at its Velocity Hub of the Michigan Cyber range powered by Merit Network, the nation’s largest unclassified training cyber range.

These certifications provide the proper tools students and IT professionals need in order to stand out and excel in the cyber-security industry.

Upcoming Cybersecurity Certificate Courses

Certified Penetration Testing Engineer (C)PTE): Learn Fundamental and Advanced Skills in Penetration Testing
September 26 – 30
Certified Information Systems Security Officer (C)ISSO): Learn to Analyze and Mitigate IT Security Threats and Risk
November 7 – 11
To register, click on https://www.merit.edu/courses-events/course-certified-penetration-testing-engineer-cpte-september-2016/

The post Cyber-Security Certificate Courses Launching at Macomb-OU INCubator appeared first on MITechNews.


Details Released On North American International Cyber Summit 2016

$
0
0

DETROIT – Details on the North American International Cyber Summit 2016 were released Thursday. What’s new is the High School Cyber Challenge. Also on tap is the Annual International Invitation Cyber Competition.

As in previous year’s the Summit, scheduled for Oct. 17, will bring together experts from across the globe to address a variety of cyber-security issues impacting the world. It is hosted by Michigan Governor Rick Snyder, and once again set to take place in the heart of Downtown Detroit at Cobo Center.

The State of Michigan has long been considered a national leader on cyber security, leading the discussion on emerging trends and best practices in policy, law and all manner of public and private interests. The agenda for the event will feature internationally recognized speakers as well as experts from around the country to lead featured breakout sessions on the hottest industry topic:

  • Business
  • Education/Families
  • Information Technology
  • Economic Development
  • Law Enforcement
  • State & Local Government
  • Defense
  • Automotive
  • International Cyber Exercise

New for 2016: High School Cyber Challenge

Teams of high school students from around the state will compete against each other in a unique cyber competition. These students have completed Round  1 of the competition and have scored high enough to be invited to go head-to-head in a fast-paced cyber challenge! Students will complete the challenge from 8 am until 12 pm with the top 3 teams receiving awards.

Back again for 2016: Annual International Invitation Cyber Competition

Don’t miss out on the annual international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. For six hours during the Summit teams will compete for control of elements of infrastructure by planting and maintaining an encrypted beacon on servers, routers, or workstations. The team controlling the most infrastructure elements, in other words, having the most active beacons, by the end of the exercise wins. Participating teams will operate from their own location and access the exercise through the Cyber Range. Each team will attempt to penetrate and control elements of critical infrastructure within the MCR’s training environment, called Alphaville.

New  Pricing for 2016

Cost is $74 to attend. NOTE: Discount price of $49 for students or members of the following organizations: ISSA, InfraGard, West Michigan Cyber Security Consortium, ISACA, Mi-GMIS, members of the military and WC4.

Register at www.michigan.gov/cybersummit

The post Details Released On North American International Cyber Summit 2016 appeared first on MITechNews.

Report: Fingerprints Common Enough To Fool Mobile Phone Security Systems

$
0
0

EAST LANSING – No two people are believed to have identical fingerprints, but researchers from New York University and Michigan State University have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.

The vulnerability lies in the fact that fingerprint-based authentication systems feature small sensors that do not capture a user’s full fingerprint. Instead, they scan and store partial fingerprints, and many phones allow users to enroll several different fingers in their authentication system. Identity is confirmed when a user’s fingerprint matches any of the saved partial prints. The researchers hypothesized that there could be enough similarities among different people’s partial prints that one could create a “MasterPrint.”

Arun Ross, MSU professor of computer science and engineering and co-author of the study, said a number of electronic devices such as smartphones are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the resulting images are limited in size. To compensate, these devices often acquire multiple partial impressions of a single finger during enrollment to ensure that at least one of them will successfully match with the image obtained from the user during authentication. This introduces a vulnerability that needs to be carefully addressed.

“As fingerprint sensors become smaller in size, it is imperative for the resolution of the sensor to be significantly improved in order for it to capture additional fingerprint features,” Ross said. “If resolution is not improved, the distinctiveness of a user’s fingerprint will be inevitably compromised. The empirical analysis conducted in this research clearly substantiates this.”

Ross said the research team is currently investigating ways to address the vulnerability highlighted in this work. This could entail developing effective anti-spoofing schemes; carefully selecting the number and nature of partial impressions of a user during enrollment; improving the resolution of small-sized sensors to facilitate extraction of more discriminative features; developing matchers that utilize both minutiae and texture information; and designing more effective fusion schemes to combine the information presented by multiple partial impressions of a user.

Nasir Memon, NYU professor of computer science and engineering and the research team leader, said the MasterPrint concept bears similarity to a hacker who attempts to crack a PIN-based system using a commonly adopted password such as 1234. 

“About 4 percent of the time, the password 1234 will be correct, which is a relatively high probability when you’re just guessing,” said Memon.

The researchers, whose work was funded by the National Science Foundation, undertook their analysis using 8,200 partial fingerprints. Using commercial fingerprint verification software, they found an average of 92 potential MasterPrints for every randomly sampled batch of 800 partial prints. (They defined a MasterPrint as one that matches at least 4 percent of the other prints in the randomly sampled batch.)

On the contrary, they found just one full-fingerprint MasterPrint in a sample of 800 full prints. “Not surprisingly, there’s a much greater chance of falsely matching a partial print than a full one, and most devices only rely on partials for identification,” said Memon.

The team analyzed the attributes of MasterPrints culled from real fingerprint images, and then built an algorithm for creating synthetic partial MasterPrints. Experiments showed that synthetic partial prints have an even wider matching potential, making them even likelier to fool biometric security systems than real partial fingerprints. With MasterPrints derived from real human fingerprints, the team reported successfully matching between 26 and 65 percent of users, depending on how many partial fingerprint impressions were stored for each user and assuming a maximum number of five attempts per authentication. For synthetic MasterPrints, the matching possibilities were even higher. 

The higher the number of partial fingerprints a smartphone stores for each user, the more vulnerable it is.

The researchers emphasize that their work was done in a simulated environment, but note that improvements in creating synthetic prints and techniques for transferring digital MasterPrints to physical artifacts in order to spoof an operational device pose significant concerns. The high matching capability of MasterPrints points to the challenges of designing trustworthy fingerprint-based authentication systems, and reinforces the need for multi-factor authentication schemes to enhance the security of these systems. The researchers believe this work may inform future designs. Meanwhile, unlocking a mobile device with a code remains more secure, Memon said.

“MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems” will appear in the journal IEEE Transactions on Information Forensics & Security.

The post Report: Fingerprints Common Enough To Fool Mobile Phone Security Systems appeared first on MITechNews.

Cyber Security Breakfast Seminar Set For May 3 At James B. Henry Center

$
0
0

LANSING – ASK, an IT and security consulting company, and Foster Swift Collins & Smith, PC, a Michigan law firm, announced this week they will hosting a complimentary cyber security breakfast seminar for clients and professionals May 3 at the James B. Henry Center.

The event will feature Information Security Professionals from ASK and attorneys from Foster Swift, along with Thomas Holt, PhD, Professor College of Social Science, School of Criminal Justice. Attendees can expect to learn about emerging trends in cyber security, action steps to take to protect their business, and why cybercrime cannot be ignored.

In recent years, cyber security has become a top concern for business owners. Small and medium businesses are now prime targets – not just the Fortune 500 businesses. As technology advances, so does the complexity and degree to which cybercrime can jeopardize a business’s data, reputation, and worse yet, diminish their promise of a future.

At the ASK/Foster Swift Cyber Security Event, ASK will address the emerging trends in cyber security and provide recommended tools businesses should have in place. ASK will also address steps business owners should take when they do experience a breach.

“It’s not a matter of if a business is breached, but when,” says Josh Gembala, ASK cyber security expert. “We say that ‘hope is not a strategy’ for the sole reason that every business will experience a cyber-attack at some level. Business owners can’t sit back and hope that it won’t happen to them. They need to have the tools to help protect their business now, and have a plan in place for when they are breached.”

Holt, an expert on the issues of cybercrime, computer hacking, data breach, malware, and identity theft, will also go into detail on the role the Internet plays in cybercrime. Holt will inform attendees of the risks businesses acquire and the hard reality businesses face today.

“If we don’t understand the scope of this problem, if we just treat it as a nuisance, then we’re going to enable and embolden this as a form of crime that won’t stop,” says Holt.

Executives, business owners and all management personnel are encouraged to attend this event. Space is limited.

To register, visit http://bit.ly/LansingCyberSecurity.

The post Cyber Security Breakfast Seminar Set For May 3 At James B. Henry Center appeared first on MITechNews.

Report: Phishing, Hacking, Malware Top Cyber Security Incidents In 2016

$
0
0

NEW YORK – Phishing, hacking and malware incidents accounted for the plurality of cyber security incidents for the second year in a row, at 43 percent – a 12 percentage point jump from a year earlier, a report contends. In finance and insurance, employee action or mistakes were cited as the top reason for cyber incidents.

Ransomware attacks – where malware prevents or limits users from accessing their system until a ransom is paid – have increased by 500 percent from a year earlier, according to the BakerHostetler 2017 Data Security Incident Response Report.

The report provides a broad range of lessons to help executives identify risks, appraise response metrics and apply company-specific risk mitigation strategies based on an analysis of more than 450 cyber incidents that BakerHostetler’s Privacy and Data Protection team handled last year. The firm’s experience shows that companies should be focused on the basics, such as education and awareness programs, data inventory efforts, risk assessments, and threat information sharing.

“Like other material risks companies face, cybersecurity readiness requires an enterprisewide approach tailored to the culture and industry of the company,” said Theodore Kobus, leader of the Privacy and Data Protection team. “There is no one-size-fits-all approach.”

The BakerHostetler report details the typical ransomware scenario and the challenges that such incidents present. “Having a regularly scheduled system backup and a bitcoin wallet to pay a ransom will help with operational resiliency. Ransomware is not likely to go away, and incidents will probably increase over the short term, so companies should be prepared.”

Included in the report is a checklist of actions companies can take to minimize their risk against these attacks and to respond promptly and thoroughly should a cyber breach occur. Topping the list is increasing awareness of cybersecurity issues through training and education. In addition, the report lists six other core steps most businesses should take to prepare for an incident and mitigate risk.

Kobus continued: “It’s no longer a question of which industries are most at risk. All industries are faced with the task of managing dynamic data security risks. Even companies in the retail, restaurant and hospitality industries, while highly regulated, had the fourth-highest rate of data security incidents.”

Key statistics from BakerHostetler’s 2017 Data Security Incident Response Report:

Incident causes: Phishing/hacking/malware 43%, employee action/mistake 32%, lost/stolen device or records 18%, other criminal acts 4%, internal theft 3%.
Industries affected: Healthcare 35%, finance and insurance 16%, education 14%, retail/restaurant/hospitality 13%, other 9%, business and professional services 8%, and government 5%.

Company size by revenue: Less than $100 million 39%, between $100 million and $500 million 33%, $500 million to $1 billion 17%, and greater than $1 billion 11%.

Most breaches discovered internally: 64% of breaches were internally discovered (and self-reported) compared with 36% that were externally discovered. In 2015, only 52% of incidents were self-reported.

Incident response timeline: On average 61 days from occurrence to discovery; eight days from discovery to containment; 40 days from engagement of forensics until investigation is complete; 41 days from discovery to notification.

Notifications and lawsuits filed: In 257 incidents where notification to individuals was given, only nine lawsuits were filed. This is partially explained by companies being prepared to better manage incidents.

No notification required: 44% of incidents covered by the report required no notification to individuals – similar to 2015 results.

Average size of notification: Incidents in the retail/restaurant/hospitality industry had the highest average notification at 297,000, followed by government at 134,000 and healthcare at 61,000. All other industries had less than 10,000 notifications per incident.

Forensic investigation costs: The average total cost of forensic investigations in 2016 was
$62,290, with the highest costs in excess of $750,000.

Healthcare: The number of incidents rose last year, but the average size of the incidents decreased. Of the incidents analyzed by the BakerHostetler report, 35% were in healthcare, yet the average size of the incident notification was 61,000 – only the third highest of all industries surveyed. \

Triggering state breach notification laws: Just over half of cyber incidents last year (55%) were subject to state breach notification statutes – down slightly from the year prior. Of the incidents where notification was required, the highest percentages were those involving Social Security numbers (43%) and healthcare information (37%). Only 12% of cases involved payment card data.

Active state attorneys general: AG’s made inquiries after notifications were made in 29% of incidents, although overall regulatory investigations and inquiries were down to 11% in 2016, from 24% in 2015, and litigation was down to 3% last year compared with 6% the prior year.

Back to the basics

The first line of defense in protecting a company’s data and reputation during a cybersecurity incident is to outfit the organization with baseline procedures and processes to reduce the company’s risk profile. By focusing on key areas like employee awareness and education, companies can help prevent incidents while laying the groundwork for a successful response and reducing the likelihood events will be severe should they happen.

“Employees are often cited as a company’s greatest asset. In the cybersecurity arena, they can also be a liability. The report’s numbers reinforce the ongoing need to focus on effective employee awareness and training. They also show that a defense-in-depth approach is necessary, because even well-trained employees can make mistakes or be tricked,” said Kobus.

The full 2017 BakerHostetler Data Security Incident Response Report can be found here. The Privacy and Data Protection team will host a webinar on the findings on May 9 at noon ET.

The post Report: Phishing, Hacking, Malware Top Cyber Security Incidents In 2016 appeared first on MITechNews.

Red Level Security Expert Explains How Businesses Can Keep Networks Safe

$
0
0

ROYAL OAK – Mark Dreyer, a Senior Consultant at Red Level, just returned from a Microsoft security conference before he appeared April 17 on M2 TechCast providing him with a lot of information about ways in which businesses can keep the bad guys out of their networks.

In this interview, Dryer answers the following questions:

Can business networks remain secure with just a good firewall?

What’s the difference between Mobile Device Management and Bring Your Own Device?

What process is required to manage an application?

What are features that must be included in application policy?

Why would a company choose to go with a Mobile Device Management approach instead of just managing apps?

To learn the answers, click on https://soundcloud.com/podcastdetroit/m2techcast-episode-78-red-level-mark-dreyer-sr

The post Red Level Security Expert Explains How Businesses Can Keep Networks Safe appeared first on MITechNews.

Viewing all 480 articles
Browse latest View live




Latest Images