Page 4,064«..1020..4,0634,0644,0654,066..4,0704,080..»

Cybersecurity: The web has a padlock problem – and your internet safety is at risk – ZDNet

Internet users are being taught to think about online security the wrong way, which experts warn might actually make them more vulnerable to hacking and cyberattacks.

Websites that want to demonstrate their secure credentials will usually do so by displaying a padlock sign in the address bar that aims to show the website is usingHTTPS encryption.

The Hypertext Transfer Protocol Secure (HTTPS) is the more secure version of the Hypertext Transfer Protocol (HTTP) used across the web to load pages using hypertext links it's there to transfer information between devices, allowing users to enter and receive information.

SEE: 10 tips for new cybersecurity pros (free PDF)

HTTPS encrypts that information, allowing the transmission of sensitive data such as logging into bank accounts, emails, or anything else involving personal information to be transferred securely. If this information is entered onto a website that is just using standard HTTP, there's the risk that the information can become visible to outsiders, especially as the information is transferred in plain text.

Websites secured with HTTPS display a green padlock in the URL bar to show that the website is secure. The aim of this is to reassure the user that the website is safe and they can enter personal information or bank details when required. Users have often been told that if they see this in the address bar, then the website is legitimate and they can trust it.

However, as security researcher Scott Helme warned in his keynote address at the SANS Institute and National Cyber Security Centre (NCSC) Cyber Threat 19 conference in London, this information is potentially misleading, because it isn't difficult for cyber attackers to register HTTPs domains for use inphishing attacksand other hacking campaigns.

But because web users have been told the padlock is a sign of safety, they're potentially vulnerable to falling victims to attacks.

"This is why phishers are using it on phishing sites, because they know that people who use the websites think that means its OK when it's not," said Helme. "The padlock doesn't guarantee safety, it never has, that's just a misunderstanding of the interpretation of what this actually means."

In December 2017, a television advert for Barclays Bank in the UK warned users to check for a green padlock to ensure that the website is genuine. There were complaints that this advice was misleading, because it would be possible for attackers to exploit HTTPS for their own ends.

The complaint was upheld by the Advertising Standards Authority, which concluded that the advice from Barclays was inaccurate because "the padlock measure alone could not ensure safety".

Because it turns out, it's actually relatively easy for a criminal to acquire HTTPS for malicious websites to help them look entirely legitimate. By buying a Transport Layer Security (TLS) certificate, attackers can encrypt traffic on their fake website and make it look legitimate. And because the traffic is encrypted, the browser can be fooled into believing that website is safe.

"Cyber criminals started to use HTTPS and their trust scores can be higher than normal websites, they really care about this stuff," said James Lyne, CTO at SANS Institute.

So by asking the user to notice when something is wrong, it's putting unfair pressure on them, especially, as Helme argued, as it doesn't happen in other aspects of life.

He pointed to cars and how there isn't a warning light that tells the driver everything is OK. That light only comes on when the driver needs to be aware of an issue, there's no light or alert that appears just to show that things are working as expected and that model should also be applied to the internet.

SEE:A winning strategy for cybersecurity(ZDNet special report) |Download the report as a PDF(TechRepublic)

"We should only be bugging the user with new information when there's a problem, not when everything is OK, not when the connection is secure. It should be that all connections are secure and that's the default and a non-encrypted connection is the exception," Helme explained.

"We need to flip the model around, we need encryption to become the default and non-encrypted HTTP to become the exception, the thing that we warn about like the warning light on your car, indicating there is a problem," he added.

Even now, encryption is sometimes discussed as if it's a bonus when using the internet, when it needs to become the standard way of doing things everywhere on the internet, Helme explained.

"We need it to become so ingrained and embedded into everything that we do that it's boring and we don't need to talk about it because it shouldn't be special. Encryption should be the boring default that we don't need to talk about," he said.

The security industry therefore needs to step up and help fix the issue, Helme argued, because by doing this, it takes the responsibility for deciding if a website is safe or not away from the user something that will help make the internet safer for everyone.

"We need to take encryption and make it the default, universal it needs to be everywhere," he said, adding: "The lack of encryption on the web is actually a bug. And what we're doing now isn't adding a new feature for an improvement or a new thing: we're going back and fixing a mistake we made in the beginning."

In the mean time, it's going to remain difficult to convince internet users that something they've been told means that a website can be trusted can't actually be used as an indicator of whether the page is safe or not.

"We've beaten into people that's safe, only go to websites with a padlock. But now it turns out that a cyber criminal can go out and buy a padlock for a dollar. That turns it around, so how do you unwire all of that?" said Paul Chichester, director of operations at the NCSC.

"Cybersecurity is a really challenging discipline to operate in. If you think about driving a car and, over many years of driving, you learn certain things and it doesn't generally change, the practices keep you safe. Nobody tells you not to use the brakes any more," he added.

SEE: 10 great gifts for the hacker in your life

To fix that, the industry needs to improve its messaging, because cybersecurity can be complicated for the average web user and changing advice all the time isn't going to help, especially if people stick to adhering to the first thing they were told like believing the padlock automatically means the website is safe.

"We're pivoting in much shorter periods of time and, even within our community, sharing practices can be tough, particularly when a new practice isn't as simple to convey as the original because those ideas stick," said Lyne. "That's where the average person has lost reasonable expectation it's genuinely hard".

More:
Cybersecurity: The web has a padlock problem - and your internet safety is at risk - ZDNet

Read More..

Chuck Todd challenges John Kennedy on Ukraine: Putin is only other person ‘selling this argument’ | TheHill – The Hill

NBC host Chuck ToddCharles (Chuck) David ToddRepublican Senator says he's 'very comfortable' with Trump making call on Navy SEAL review Sanders campaign says it reached 4 million individual donations Johnson: I'm writing a letter to 'lay out what I know' about Ukraine aid MORE on Sunday confronted Sen. John KennedyJohn Neely KennedyMORE (R-La.) over the unfounded theory that Ukraine interfered in the 2016 election, saying that Russian President Vladimir PutinVladimir Vladimirovich PutinDemocrats: The 'Do Quite a Lot' Party Rudy Giuliani's reputation will never recover from the impeachment hearings The Hill's Morning Report Dems and Trump score separate court wins MORE is the only other person outside the U.S. promulgating this argument.

Todd made the remarks on "Meet The Press" while pushing back against Kennedy's assertion that both Russia and Ukraine meddled in the latest U.S. presidential election.

Todd strongly disputed the accusations, noting that the U.S. intelligence community has concluded that Russia interfered in the 2016 election to boost President TrumpDonald John TrumpHouse Intelligence Committee to review impeachment investigation report Monday Comedian Rosanne Barr to speak at Trumpettes' Gala at Mar-A-Lago Israeli, Palestinian business leaders seek Trump boost for investment project MORE and harm Democratic presidential nominee Hillary ClintonHillary Diane Rodham ClintonStill upset by Trump's historic win? Beat him if you can in 2020 Michael Bloomberg's billions can't save an unserious campaign Fears mount about Biden's South Carolina firewall MORE. There is no evidence to suggest Ukraine meddled in the 2016 election.

Kennedy claimed that reporting in outlets such as Politico and The Economist indicated that the former Ukrainian presidentfavored Clinton over Trump.

WATCH: @ChuckTodd asks @SenJohnKennedy if he is "at all concerned that he has been duped" into believing that former Ukraine president worked for the Clinton campaign in 2016 #MTP #IfItsSunday@SenJohnKennedy: "No, just read the articles." pic.twitter.com/A0rLu03F8j

"You should read the articles, Chuck. Theyre very well documented," Kennedy said, apparently referencing reports about former Ukrainian President Petro Poroshenko's administration.

"The fact that Russia was so aggressive does not exclude the fact that President Poroshenko actively worked for Secretary Clinton," he later added, prompting Todd to quickly express dismay over the remark. It is unclear which report he was referencing when making the claim.

"My goodness. Wait a minute,Sen. Kennedy. You now have the president of Ukraine saying he actively worked for the Democratic nominee for president. I mean, now come on," Todd said. "You realize the only other person selling this argument outside the United States is is this man, Vladimir Putin."

Todd went on to accuse Kennedy of doing "exactly what the Russian operation is trying to get American politicians to do."

"Are you at all concerned that youve been duped?" he asked.

"No, just read the articles," Kennedy said.

Speaking at an economic forum in Russia last month, Putin said that he was thankful "internal political battles" were putting an end to accusations of Russian interference in the U.S.

"We see what is going on there in the U.S. now," Putin said. "Thank God nobody is accusing us anymore of interfering in the U.S. elections. Now theyre accusing Ukraine."

The conspiracy theory that Ukraine meddled in the 2016 election has gained increased attention as the House probes Trump's dealings with Ukraine.

During a July 25 phone call with Ukrainian President Volodymyr Zelensky, Trump asked the new leader to look into matters related to CrowdStrike, an internet security company that initiallyexaminedthe breach of the DNCservers in 2016. The request was an apparent reference to a conspiracy that casts doubt on the assessment that Russia was to blame for the hack of the DNC servers.

Multiple former administration officials have denounced the theories that Ukraine, not Russia, hacked the Democratic National Committee (DNC) and interfered in the 2016 election.Tom Bossert,a former homeland security adviser in the Trump administration, said in late September that the allegation was a "completely debunked" conspiracy theory.

Fiona Hill, a former top Russia analyst for the White House, testified last month thatthe claim was a "fictional narrative that has been perpetrated and propagated by the Russian security services themselves."

Kennedy last week suggested that there was still a possibility that Ukraine was responsible for the DNC hack. He walked back those comments days later but has continued to insist Ukraine interfered in other ways.

Trump, meanwhile, has continued to push the unsubstantiated allegations. In an appearance on "Fox & Friends" following Hill's deposition, the presidentclaimed thatofficials gave a DNC server to "CrowdStrike, which is a company owned by a very wealthy Ukrainian." CrowdStrike is a U.S.-based company.

Read the rest here:
Chuck Todd challenges John Kennedy on Ukraine: Putin is only other person 'selling this argument' | TheHill - The Hill

Read More..

How To Secure The Internet: Troy Hunt Talks Breaches, Passwords And IoT – Forbes

Troy Hunt's HaveIBeenPwned has become a phenomenal success.

Troy Hunt is busy. Hes been travelling across the world giving talks about security, and his much loved and lauded websiteHaveIBeenPwnedwent up for sale in June. But thats not before the sitewhich gives users the chance to see if their emails and passwords have been compromisedhad beenbaked into services such as Firefox and 1Password.

The acquisition is in its final stages, says Hunt. But he concedes that its just a huge amount of effort for one person: Even the acquisition itself.

To be fair to him, Hunt has done pretty well as one person. HIBP, as it has affectionately become known, has been a phenomenal success. As well as educating users on the importance of strong passwords, its raised awareness of credential stuffingwhere attackers will throw peoples credentials at a number of big services in the hope that the victim has reused their passwords.

Its due to this that Hunt could even be credited with improving the security of the web. The success of HaveIBeenPwned largely speaks for itself: Its a globally recognized tool adopted by millions of individuals, and its helped companies and individuals take an interest in their own online security posture, says security researcher Mike Thompson.

But despite the impending sale of HIBP, Hunts work is certainly not over.

On December 7 at 3 p.m. ET (8 p.m. GMT), Hunt will take part in a virtual conference organized by security researcher group The Beer Farmers,calledBeer Con One. The 24-hour event will see Hunt and other guests reflecting back on 2019 as well as the industry as a wholeto raisemoney for theElectronic Frontier Foundation (EFF)andMental Health Hackers.

As part of this, hell talk about one major attack vector that remains an issue: the so-called internet of things (IoT). Among the issues in IoT is the fact that product vendors so regularly fail to build in security from the start. Worse, when notified of a problem, vendors often fail to fix it.

Hunt cites the example of one of the biggest IoT issues this year: location tracking on childrens smartwatches. I bought my daughter one of these and found how she could be tracked, he says, explaining how he worked with security researcher Ken Munro at Pen Test Partners to solve the issue.He handled it so eloquently, but the vendor responded so badly. The PR made it out to be two hackers out to make money.

Another talking point that has dominated 2019 is data security and privacy practices of big tech companies such as Google and Facebook. So, as a security researcher who sees a lot of the issues firsthand, has Hunt deleted Facebook yet?

I think the privacy thing around this is fascinating, Hunt says. I havent deleted Facebook as my friends are on there. I use Google because its the best search engine, but its really interesting to see the challenges they have. They are told by authorities that they need to retain data for terrorismand then people want privacy.

There have been multiple breaches this year, so which were the worst? Hunt says one breach that affected him due to the scars it left was a zoophilia and bestiality site called Zooville. A vulnerability meant you could personally identify individuals. There were user names, email addresses, and IP addresses.

Before he even started, Hunt had some rather unexpected investigations to make. I had to work out: Is this legal? Different aspects of it are legal in different places. There was a little bit of me that was fascinated by how weird it was.

One of the biggest breaches of the year took place at the start of 2019. Revealed in January,Collection #1, saw more than a billion unique email address and password combinations posted to a hacking forum for anyone to see.

This mega-breach containing several data sets from different sources was first revealed by Hunt, and he says it was actually the catalyst for his sites sale. Predictably for a story so big, it gave HaveIBeenPwned a huge spike in customers.

However, many misinterpreted the story, and gave Hunt a hard time. It got interpreted by a number of people as the worlds largest data breachbut it was an amalgamation of different breaches.

Even so, it was important Collection #1 got the coverage: The exposed details could be used for credential stuffing attacks, seeing bots automatically testing millions of email and password combinations on a range of website login pages.

Credential stuffing has become massive this year, Hunt concedes.

This attack thrives on the chance that people reuse their passwords, which means hackers can throw these credentials at several services and bypass authentication on all of them.

Asked how people can be stopped reusing passwords, Hunt says: The only way you are going to not do that is using a password manager. Then two factor authentication (2FA).

Services can actually use thePwned Passwordservice on HIBP to prevent their users from using already breached passwords. People are using bad passwordswe need to save users from themselves, Hunt says.

But he points out that so far, stats show just 2% of people are using a password manager. In some cases, its because it is too complex. For this reason, Hunt doesnt discount using a physical password book.

You need to look at who your threat actor isits someone who can get the book. Its now someone who can break into your house, but then they dont want the book, they want the computer. The book is better than what 98% of people are doing: thats the discussion we want to be having.

Meanwhile, says Hunt, 2FA is a pain in the ass.

I am a proponent but the usability sucks. Or we end up with SMSyou can then do Sim swap attacks.

But at the same time, he says: People say using SMS for 2FA is like not having 2FA at all. Its always going to be bettercredential stuffing goes away.

Go here to see the original:
How To Secure The Internet: Troy Hunt Talks Breaches, Passwords And IoT - Forbes

Read More..

How Healthcare Organizations Use AI to Boost and Simplify Security – HealthTech Magazine

As cybersecurity threats to healthcare grow in number and severity, artificial intelligence is helping providers detect vulnerabilities and respond to data breaches faster and with greater precision.

Given that 63 percent of organizations of all types dont have enough staff to monitor threats 24/7, according to a 2019 Ponemon report, the added defense is crucial. Its arguably even more important for the healthcare industry, whose data is often considered more valuable than Social Security and credit card numbers.

As a healthcare tool, AI can help predict falls in seniors and identify early signs of sepsis. Its also poised to shape many other facets, from disease detection to administrative tasks. As an IT defense mechanism, however, AI may be employed to recognize network behaviors unlikely to represent human action, keep watch for fraud threats and predict malware infections based on previously identified characteristics.

Such intuitive IT capacities offer preventative medicine, helping prevent the infection in the first place, says Rob Bathurst, an adviser for anti-virus software firm Cylance, in a recent white paper about AI and healthcare infrastructure.

Although most people might consider patient- and provider-facing uses as more common AI applications in healthcare, protection is gaining steam: AI-enabled security is among Gartners Top 10 Strategic Technology Trends for 2020. An Accenture report forecasts that AIs value in healthcare security will reach $2 billion annually by 2026.

Moreover, 69 percent of organizations believe AI will be necessary to respond to cybersecurity threats, a July 2019 report from Capgemini found.

MORE FROM HEALTHTECH:Learn how healthcare organizations should respond to a data breach.

At Florida-based Halifax Health, a firewall employs AI to detect attacks based on the wrapper that cybercriminals place around their malware payloads. This function, as CDW cybersecurity expert Alyssa Miller notes, enables Halifax to protect against even zero-day threats that target undiscovered weaknesses.

The AI strategy isnt taken lightly. At the end of the day, cybersecurity is a war, Halifax CIO Tom Stafford said earlier this year at HIMSS 2019 in Orlando, Fla. There are people trying to attack you and your data.

And consequences can be deadly: Ransomware and data breaches are linked to an increase in fatal heart attacks, an October 2019 study by Vanderbilt University found. The reason: Breaches prompt heightened cybersecurity measures for care teams, taking time away from quick treatment.

As a result, vendors are implementing AI in numerous security tools, Miller notes. This includes Cisco Systems, which employs the technology in its next-generation firewalls, its Cloudlock cloud access security broker solution, cognitive threat analytics and Cisco Advanced Malware Protection, among other solutions and services.

IBMs Watson, which uses AI, is helping expedite routine security assessments, reduce response times and false positives, and provide recommendations based on deep analysis, Healthcare Weekly notes. Thats a plus for stretched healthcare IT staffs.

AI has been a powerful tool for Boston Childrens Hospital, whose patient records in 2014 were targeted by the hacking group Anonymous. The technology has since helped the hospital strengthen existing security structures and protocols.

By using AI, we can do a better job at being more prospective and staying one step ahead and starting to be able to detect that anomalous behavior or activity as its happening, Dr. Daniel Nigrin, the hospitals senior vice president and CIO, said in a podcast interview with Emerj, an AI market research firm. Attacks change constantly.

Such behaviors, he noted, might be a user trying to access logs from the West Coast, or 500 doctors who attempt to view a patient record simultaneously.

As Boston Childrens AI strategy evolves, Nigrin advises his peers to follow his lead and cast a wide net when implementing their own defense.

We are looking at other industries to see what theyve done using AI, he said. I am eager to go outside my healthcare world to third parties and other verticals to see how theyve addressed the problem.

READ MORE: Can AI Help Patients Take Control of Their Care?

For the many positives that can result from implementing AI as part of a healthcare security strategy, the effort isnt foolproof. This is because cybercriminals are recognizing the growth of these defense mechanisms and leveraging them to their advantage.

Ron Mehring, CISO of Texas Health Resources, and Axel Wirth, former distinguished technical architect for Symantec, spoke about the threat at HIMSS 2019. AI can help hackers engage in sophisticated social engineering attacks tailored to specific targets, as well as realistic disinformation campaigns, Miller reports in her blog for CDW.

AI also can be used by hackers to find new vulnerabilities or to thwart an organizations AI-fueled defenses. Its what Richard Staynings, chief security strategist for biomedical Internet of Things startup Cylera, calls offensive AI intelligence that mutates to learn about a targeted environment and make detection harder.

That can trigger a host of unease: Did a physician really update a patients medical record or did Offensive AI do it? Can a doctor or nurse trust the validity of the electronic medical information presented to them? Staynings asked in an interview with Healthcare IT News. This is the new threat, and it is best executed by AI.

Organizations, then, must realize that AI-enabled security cant be left on autopilot after implementation, according to Reg Harnish, executive vice president at the Center for Internet Security. More important, a thorough risk evaluation should come first to best determine how AI can solve specific problems facing a hospital or clinic.

Otherwise, as Harnish told Healthcare IT News, if your job is cutting the board in half, no amount of hammers is going to help you do that effectively.

Go here to see the original:
How Healthcare Organizations Use AI to Boost and Simplify Security - HealthTech Magazine

Read More..

How do I add a Trusted Site in Windows 10 – TWCN Tech News

If you trust a website but find that some of the functionalities of that site are not working, maybe due to the high security settings of your computer, you can make an exception by adding the site to the Trusted sites list. This post shows how to add a trusted site in Windows 10. This exception is applied to all browsers, including the new Microsoft Edge, Google Chrome, Firefox, Internet Explorer, etc.

Internet Security Options offers four different zones. These four zones are-

All these zones have a specific level of security for your computer browser and files.

The default for the Internet zone is Medium-high. If you want to add an exception, you have to add the site to the Trusted sites zone so that your computer can trust the website and overwrite all the other security zone settings.

To add a trusted site in Windows 10, you need to follow these steps-

Let us see the procedure in a bit more detail.

Search for internet options in the Taskbar search box and click the result. This will open the Internet Options window

After opening, you need to switch to the Security tab. Then, click the Trusted sites option and then click the Sites button.

Now you have to enter the website URL in the Add this website to the zone box. There are two ways to list a website.

First, you can write down the specific URL like this:

Second, you can paste something like this:

Lets assume that your desired website has several subdomains, and you want to add all of them to the Trusted sites list. Instead of writing each subdomain one after one, you can use a wildcard entry like the second example.

After that, click the Close and OK buttons to save your change.

You do not need to restart your computer to apply the change, and it applies to all the installed browsers.

If you have added a website mistakenly, and you want to remove it from the Trusted sites list, you need to follow these steps-

To get started, you need to open the same Internet Options window and go to theSecuritytab. Here you need to selectTrusted siteszone and click the Sitesbutton to unveil the list.

Following that, select a URL from the list, and click theRemovebutton.

Now you need to save your settings to apply the change.

Originally posted here:
How do I add a Trusted Site in Windows 10 - TWCN Tech News

Read More..

Bargain alert: there’s up to $300 off MacBooks right now – Louder

You'd be forgiven for thinking that, surely, the best deals this cyber weekend must have been done and dusted already but not so fast, sport. We're nowhere near done yet, as Cyber Monday is still to come.

To mark Cyber Monday, Best Buy are offering up to $300 off their range of MacBooks. Now, MacBooks are good, but they're expensive and seldom discounted. Which makes this sale something of an event in itself.

On offer are a selection of MacBook Airsand MacBook Pros, with a range of specs covering pretty much everything. The MacBooks also come with a year of free Apple TV+, free Apple Music for four months for new subscribers, and a six month subscription to Trend Micro Internet Security.

We've picked out the biggest bargains below, but you can peruse the whole range on the Best Buy site.

Amazon.co.uk- new Cyber Monday deals every dayAdidas.co.uk- save up to 50%AO.com- Cyber Monday deals on appliances are live nowArgos.co.uk- top savings on toys, TV and more for ChristmasBoots.com- save up to half price on selected itemsCarphone Warhouse-Cyber Monday phone dealsConverse- save 20% off Chuck 70s.Currys.co.uk-Black Tag sale is now onDNA Fit-up to 40% off DNA test kitsDr Martens Cyber Monday offers now onlineEMP- for merch and rock'n'roll clothing. Save 20 on orders over 85Etsy original and collectible gift ideasFirebox- crazy gift ideas and the world's smallest turntableGoogle Store- a boatload of deals - including 70 off Pixel phonesHalfords- 20% off dash Cams, electric scooters and way moreI Want One Of Those.com- daft gifts and cool techJohn Lewis- Get great warranties with John Lewis' Cyber Monday offersLovehoney.co.uk- up to 50% off sex toys and moreMarshall- Cyber Monday now onlineMobiles.co.ukcheapest mobile phone dealsNike.co.uk- up to 30% off full price itemsNixon- home of the Metallica watchPureScooters.co.uk- up to 500 off electric scootersSimba Sleepsave up to 40% on mattresses for Cyber MondaySuperdrug- top Cyber Monday deals at SuperdrugTownsend Music- up to 75% off vinyl and CDsVery.co.uk- big savings on tech and more

More:
Bargain alert: there's up to $300 off MacBooks right now - Louder

Read More..

‘Restore Internet in J&K without compromising national security’ – The Hindu

With the situation in Jammu and Kashmir returning to normality after the abrogation of the provisions of Article 370 of the Constitution, which gave it special status it is time for the Central government to take the potential risk of restoring the Internet connectivity in the region, said Lieutenant General Syed Ata Hasnain (retd), who commanded Army Corps in Jammu and Kashmir.

Taking part in the panel discussion on Kashmir: a peep into the future at the last day of Mangaluru Literary Festival 2019 here on Saturday, Mr. Hasnain said Internet connectivity has now assumed the status of human rights because of its multiple usages. Time has come to open the connectivity, without compromising on national security. The government of India has to take the potential risk, he said.

Mr. Hasnain said he has been a witness to the disturbances in 2005, 2008 and 2016 in the Kashmir valley when mobile phones were used to mobilise people. With Jammu and Kashmir now being a Union territory, the Cabinet Committee on Security will have to take an overview of the security in the Kashmir valley and take a decision on restoring Internet connection.

Senior journalist M.D. Nalpath said the mistake was made earlier by bringing in Article 370, which is based on the two-nation theory. Though we have same culture and DNA, an exception was made for Kashmir on the ground that it is a Muslim-majority State. We did a mistake earlier, he said.

On the claim by Bharatiya Janata Party that forming the government in Jammu Kashmir with the PDP was in order to facilitate abrogation the provisions in Article 370, Mr. Nalpath said alliance of BJP with Ajit Pawar in Maharashtra was more serious than its alliance with the PDP. Devendra Fadnavis gave lot of concessions to Ajit Pawar. He sat on the file seeking permission to prosecute Ajit Pawar who faced corruption charges, he said.

Senior international journalist Waeli Awwad said India should ensure that terrorist forces that destroyed Syria and Afghanistan do not gain ground in India. We (Syrians) have suffered. Do not allow them here. Build schools, provide jobs by opening industries and fight against these forces, he said, while emphasising the need to bring Kashmiris to the mainstream.

Jawaharlal Nehru University Professor Anand Ranganthan moderated the discussion.

You have reached your limit for free articles this month.

Register to The Hindu for free and get unlimited access for 30 days.

Find mobile-friendly version of articles from the day's newspaper in one easy-to-read list.

Enjoy reading as many articles as you wish without any limitations.

A select list of articles that match your interests and tastes.

Move smoothly between articles as our pages load instantly.

A one-stop-shop for seeing the latest updates, and managing your preferences.

We brief you on the latest and most important developments, three times a day.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.

Read the original post:
'Restore Internet in J&K without compromising national security' - The Hindu

Read More..

Cyber crime: Hackers could gain access to your new internet connected car in seconds – Express

New vehicles fitted with over the air connected technology could be hacked and altered to send the cars anywhere a criminal chooses in a dramatic revelation.Cybersecurity expert Asaf Ashkenazi toldExpress.co.ukinternet connectivity in vehicles means anyone in the world can access a car which could be exploited by hackers.

The founder of cybersecurity firm Verimatrix says motoring companies must prevent easy access to a cars software and identify vulnerabilities to boost security.

The revolution means hackers can, in theory, gain access to connected vehicles which could lead to devastating consequences for road users.

Asaf Ashkenazi said: In fact, its accepted in the development community to expect a certain number of bugs even in finished code.

And thats the startling fact for many consumers that these bugs, whether identified or unidentified, could eventually be exploited by bad actors to attack todays vehicles that are so dependent on that software code to conduct countless actions or checks.

READ MORE:Criminals use WhatsApp to plan car thefts

He added the internet connectivity has created an opportunity for attacks which requires sophisticated code protection to avoid motorists from being exploited.

Modern vehicles are increasingly using technology and internet connectivity to provide road alerts and updates to vehicles.

According to data from the Society of Motor Manufacturers and Traders (SMMT) more than 2.5million road uses have cars featuring self-activating safety systems.

It is predicted the UK will reach a total of 8.6million connected cars in service by 2020.

DON'T MISSSAre electric cars safe to drive in the rain?[TIPS]Tesla new cybertruck destroyed in launch demo[VIDEO]Motorists are at risk from purchasing false parts for used cars[ADVICE]

Ashkenazisaid: Most of the car, though it may not be obvious to the driver, either already uses or at least has that connectivity. In the future, even more parts of the car will be connected.

Hackers forced Fiat Chrysler to recall 14million vehicles in the United States in 2015 after revealing one of their cars could be accessed by cyber criminals.

Security researchers proved it was possible to control the vehicle remotely just by tapping into the internet-connected entertainment system.

Tesla founder Elon Musk as also raised concerns hackers pose by being able to gain access to connected vehicles.

He previously warned it could be the end of tesla if a hacker managed to gainaccessto their autonomous vehicles and send them across the country.

America firm Upstream Security has recorded more than 260 worldwide cyber-attacks on cars since 2010 with 73 recorded alone throughout 2018.

Hackers are believed to be interested in gaining access to personal data stored in vehicles because of internet capabilities.

Vehicles are often paired with mobile devices which gives hackers potential access to contacts, emails and information about the destinations they have visited.

According to Upstream Security, there are more attacks on vehicles through servers than keyless car entry in the United States.

Reducing the threat to connected cars

Manufacturers have been investing in security and testing to make sure their cars are as safe as possible from cyber-attacks.

Engineering and defence firm Chemring says the only way to lower the risk is to introduce a baseline level of security that works across the industry.

They say the baseline standard must be adhered to by every manufacturer to guarantee the highest levels of protection.

Elon Musk has previously floated the idea of having an instant kill switch that would be able to turn off a cars internet connectivity and override the hackers to return the vehicle back to manual control.

Asaf Ashkenazi has toldExpress.co.ukhis Verimatrix firm is working to create security that prevents easy access to software and provides the latest possible security measures.

He adds: Good code protection makes it difficult to reverse engineer code, alerts to suspicious actions, and prevents unauthorised code execution in the first place.

Its absolutely needed into todays cars. Otherwise, the industry could face potentially chaotic or even dangerous scenarios that might affect far more than an automakers reputation.

The rest is here:
Cyber crime: Hackers could gain access to your new internet connected car in seconds - Express

Read More..

Understanding Biometric Security: The Growing Threats and How to Beat Them – Techopedia

People prefer biometric security authentication to passwords because PINS and passwords readily get hacked and are challenging to remember. While passwords are the current what you know method, your physical characteristics are "what you are."

And there's only one you. (Read New Advances in Biometrics: A More Secure Password.)

But, picture this: a four-year-old child noticed that Amazon dropped gifts on their doorstep after her mother swiped her pinkie on the iPad's touchpad. So, the child used her sleeping mother's pinkie to unlock the device and, going to Amazon.com, one-clicked that beautiful pink bike.

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

True story. Incidents like that happen all the time. (Read How Passive Biometrics Can Help in IT Data Security.)

Gartner, a leading research and advisory company, claims certain physical and behavioral characteristics, like your facial features or the way you type, are more secure than your password.

In contrast, critics count millions of data breaches and they're growing every day.

Over the last decade, scientists unleashed various biometric verification identifiers to dramatically improve enterprise security.

The most common biometric identifiers are:

Join this interactive round table to learn more about HCI and how this technology helped a mid-sized, service-oriented, and process-intensive company to simplify its IT while providing better services, aligned to increasing business needs.

Used to unlock door panels, devices or computers of approved users, among other user cases.

More specifically the iris, sclera or retina, where devices equipped with cameras scan the unique patterns of your eyes.

For example, prompt server room doors to swing open automatically when cameras recognize the faces of trusted system administrators.

For example, digital assistants and telephone-based service portals use voice recognition to identify users and verify customers. (Read Voice Recognition Technology: Helpful or Painful?)

Other image-based authentication methods include facial contortions, veins in your hand, the shape of that hand, body odors, and the shape of your ears.

More recently, researchers at the University of Buffalo developed a way that you can use heartbeats for your new pass-code, while, at the same time, a $1,000 pocket-sized scanner hit the market for scanning DNA.

According to a recent Ping Identity survey, 92% of IT and security respondents rated biometric authentication as two of the top five most effective security controls, and 80% said it is effective for protecting data stored in a public cloud.

Around the same time, a Spiceworks survey reported that 62% of companies are already using biometric authentication, and another 24% plan to deploy it within the next two years.

The Amazon-grubbing child is one of scores of incidents that plays havoc with biometrics authentication. Two years ago, on a Qatar Airways flight a woman used her husbands fingerprint to unlock his phone while he was asleep, to divulge his infidelity.

It's super easy to copy fingerprints as cybersecurity and emerging technologies advisor, Joseph Steinberg remarks:

For well over a decade, I have been outspoken against the widespread use of fingerprints and most other forms of biometric authentication as a means for authenticating people among the serious problems with such schemes are the fact that biometric information is not secret (you leave your fingerprints on everything that you touch, and often show them in pictures, for example).

You want to know the cheapest simplest fastest way to crack into your boss iPad? Use play-dough.

And look for high-definition photos where your boss high-fives, makes the Vulcan peace sign or raises his hand to ask a question just like the hacker who recreated a German ministers fingerprints using photos of her hands in 2014.

There are bundles of other tricks that include researchers using voice scanners to impersonate your voice, iris scanners that match your retinas and face scanners that trick facial recognition login with photos from, say, Facebook even 3D-printed heads.

Aside from that, facial recognition devices can readily be fooled by false positives, such as if your voice is hoarse, you switch hair-styles, you wear sunglasses, or don a mask for Halloween.

So, fingerprints, voices and faces are out, but so, too, are heart-beats, DNA, body odors, and eyes. If they get compromised, you can't just roll out your eyeball and replace it with another

Biometric authentication is convenient, but privacy advocates fear biometric security erodes your privacy. Companies could easily collect and exploit your data on, say, where and when you typically use your phones.

Hackers could replicate and sell these biometrics for tracking and marketing your behavior and movements. As Robert Capps, VP of Business Development at NuData Security warns, Once biometric data is stolen and resold on the Dark Web, the risk of inappropriate access to a users accounts and identity will persist for that persons lifetime.

Even the multi-factor security model of Indias Aadhaar the worlds largest biometric identification system succumbed to hackers in 2018.

Had you been interested, you could have bought the personal data of more than one million citizens of India on WhatsApp for less than $10.

Susan Rebner, CEO of Cyleron, national security company, said she believes that's the next step and something her company's working on.

For example: devices analyze the way typists slide their fingers across desktops while sliding doors discern the person's stride; computers kick up at a person's finger impact on the keyboard, while mobiles recognize a user's hand tremor when punching numbers, among other items.

Other methods include speech recognition (used, for example, by USAAs mobile app) , well as signature verification (used, for instance, by banks on letterheads and other documents).

Any user behavior that veers from their norms and the device or system locks those users out.

You can protect passwords by hashing them into chains of digits and letters. Scientists say you can do the same with biometrics, encrypting them on a secure server.

In an interview for Biometric Update, Infinitys CEO Alfred Chan said their company's Quantum-Crypt technology developed hashed solutions for iris, fingerprints, and 2D face modalities, and is now exploring 3D modalities.

You can combine biometrics authentication with blockchain technology, or the decentralized ledger, where platforms are open-ended and shared by other participants. (Read Can the Blockchain Be Hacked?)

This means, any attempt to modify the data is detected by other users who subscribe to the platform.

While behavioral biometrics seems the most secure by far, analysts warn that the system needs to be regulated for data privacy and security and that the method needs broader testing to screen out false positives or false negatives.

On blockchain technology and hashed biometrics, MIT researchers recently showed how hackers could breach the allegedly "unhackable" blockchains.

Certainly, the same goes for cracking your hashed password to retrieve those biometrics.

Europeans have the General Data Protection Regulation (GDPR) that gives consumers protection over their personal data including biometrics. (Read How Cybercriminals Use GDPR as Leverage to Extort Companies.)

The U.S., to date, only has a hodgepodge of overlapping and contradictory laws from industry groups and federal as well as local government agencies - and that's despite its June 2015 hack of the US Office of Personnel Management where cybercriminals pilfered more than 5.6 million fingerprints of government officials.

If you're a business that wants to use biometrics authentication to shield your data, you're likely to benefit from this 1-2-3 proactive approach.

Regularly educate your staff on the biometrics security system you use and on how to ensure data privacy. You would also want to use strong passwords and store your biometrics in three places at best. Further, keep your operating system and Internet security software current so hackers can't crack it.

For greater security, use a combo of identifiers, so, for example, add fingerprints to facial recognition, like the new LG V30 smartphone that combines facial and voice recognition with fingerprint scanning. Some security systems also include additional features, such as age, gender, and height, in biometric data to thwart hackers.

Humans can dupe facial scanners by wearing a mask or makeup. Add a human to your security checkpoint for ultimate security.

Oh, and by the way...

You may want to observe the Illinois 2008 Biometric Information Privacy Act, where a company that collects its employees data must notify them on how the data will be used and stored and get their consent. Doing so saves you from privacy lawsuits from employees and customers whose biometric data you store.

Hackers are always going to be one step ahead of you.

Beat them to the trick by combining passwords with biometrics authentication systems and putting humans in the loop to improve security.

Also remember those privacy concerns.

While biometrics authentication technology is not foolproof, you may find it gives you less problems than passwords - as long as you keep on top of the system.

Original post:
Understanding Biometric Security: The Growing Threats and How to Beat Them - Techopedia

Read More..

Podcast: Digital Trust in the Age of Deepfakes – insideHPC

Dave Maher, CTO ofIntertrust

In this podcast, the Radio Free HPC team catches up withDave Maher, CTO of internet security companyIntertrust, to share with us his deep knowledge of digital communication, identity management, data rights management, cryptography and digital certificates, blockchain, and much more.

Dave gave us the run down on Intertrust and his other roles in the cybersecurity arena. Dave also discusses the evolution of the internet and the rising need for security given that the internet has vastly changed since it began so long ago.

The main topic of the conversation is authenticity and truth. With the rise of deepfakes (images or videos that are convincingly falsified), how do we know that what were seeing and hearing is created by who we think and is what we think? This leads to a deep conversation on ways we can verify content so that we know that its authentic. There are many ways of approaching it, but some implementation of blockchain seems to be a promising route.

Download the MP3 *Subscribe on iTunes *RSS Feed *Follow us on Twitter

Sign up for the insideHPC Newsletter

View original post here:
Podcast: Digital Trust in the Age of Deepfakes - insideHPC

Read More..