State of the Authentication Landscape

Data Breach Today

Shane Weeden, and authentication expert with IBM Security, discusses the future of authentication and why he's encouraged by the FIDO2 initiative As we approach 2019, is it realistic to think the end of our dependency on traditional user names and passwords is in sight?

Reddit Breach Highlights Limits of SMS-Based Authentication

Krebs on Security

What’s interesting about the incident is that it showcases once again why relying on mobile text messages (SMS) for two-factor authentication (2FA) can lull companies and end users into a false sense of security. APP-BASED AUTHENTICATION.

Reddit Says Attackers Bypassed SMS-Based Authentication

Data Breach Today

Yes, Reddit Was Breached; No, Don't Dump Multifactor Authentication Reddit suffered a data breach in June after attackers managed to bypass its SMS-based two-factor authentication system.

Good Primer on Two-Factor Authentication Security

Schneier on Security

Stuart Schechter published a good primer on the security issues surrounding two-factor authentication. authentication twofactorauthentication usabilityWhile it's often an important security measure, it's not a panacea.

FFIEC Final Authentication Guidance

Data Breach Today

The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment

Authentication in the Era of Trusted Identity

Data Breach Today

OneSpan's David Vergara on the Combined Power of Legacy and Emerging Technologies At the advent of real-time payments, it's more critical than ever for organizations to quickly authenticate users and transactions.

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The Last Watchdog

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. An Israeli start-up, Silverfort , is seeking to make a great leap forward in the state-of-the-art of authentication systems. Silverfort has introduced new technology that is designed to help corporations address unprecedented authentication exposures spinning out of ‘digital transformation.’.

NEW TECH: Silverfort extends ‘adaptive multi-factor authentication’ via key partnerships

The Last Watchdog

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Silverfort’s innovation is a delivery system that enables this added measure of authentication to be delivered across many complex, dynamic systems on an as-needed basis. We can assess whether or not it is the real user before we even trigger multi factor authentication,” Kovetz says. “We

Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill

Schneier on Security

Transaction authentication is used to defend against these adversaries. This new iOS feature creates problems for the use of SMS in transaction authentication. apple authentication banking ios sms twofactorauthentication usability

NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

The Last Watchdog

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Silverfort’s innovation is a delivery system that enables this added measure of authentication to be delivered across many complex, dynamic systems on an as-needed basis. We can assess whether or not it is the real user before we even trigger multi factor authentication,” Kovetz says. “We

Authentication Grows Up

Dark Reading

Which forms of multi-factor authentication (MFA) are working, which are not, and where industry watchers think the market is headed

Enhanced FIDO Authentication Standard Expands to the Browser

Data Breach Today

A new version of the FIDO authentication standard is designed to enable the elimination of passwords for a broader range of devices, says Phil Dunkelberger, CEO of Nok Nok Labs, who describes the latest developments

Beyond Security: 4 Authentication Considerations For The Identity Revolution

Data Breach Today

Phishing Attack Bypasses Two-Factor Authentication

Dark Reading

Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts

Reddit Hack: Attack Bypasses 2-Factor Authentication

Adam Levin

The hacker or hackers bypassed the site’s 2-Factor Authentication associated with several employees credentialed to access sensitive data and used that access to take email addresses, server logs, and a decade-old database containing logins and passwords.

How to Secure Your Accounts With Better Two-Factor Authentication

WIRED Threat Level

Two-factor authentication is a must, but don't settle for the SMS version. Use a more secure authenticator app instead. Security

Facebook Is Beefing Up Its Two-Factor Authentication

WIRED Threat Level

The update, now available to most users, comes several months after Facebook was criticized for spamming users' two-factor authentication phone numbers. Security

Microsoft Flaw Allows Full Multi-Factor Authentication Bypass

Threatpost

Vulnerabilities Web Security Active Directory Federation Services adfs bypass Credentials CVE-2018-8340 Microsoft multi-factor authentication Okta patch Phishing vulnerabilityThis is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.

10 Steps for Creating Strong Customer Authentication

Dark Reading

Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help

libssh Authentication Bypass Makes it Trivial to Pwn Rafts of Servers

Threatpost

Cloud Security Vulnerabilities Web Security authentication bypass flaw CVE-2018-10933 github libssh Open Source Server takeover vulnerabilityThe flaw affects thousands of servers; but GitHub, a major libssh user, is unaffected.

Not All Multifactor Authentication Is Created Equal

Dark Reading

Users should be aware of the strengths and weaknesses of the various MFA methods

Instagram’s New Security Tools are a Welcome Step, But Not Enough

Krebs on Security

On Tuesday, the Facebook -owned social network said it is in the process of rolling out support for third-party authentication apps. New two-factor authentication options Instagram says it is rolling out to users over the next few weeks. Scroll down and tap Two-Factor Authentication.

Tools 163

Security pros need to move beyond broken two-factor authentication

Information Management Resources

Attacker sophistication is increasing, the cost of circumventing 2FA methods are decreasing, and any organization that settles for this 'good enough' authentication is vulnerable. Data security Cyber security Encryption

Google Employees Use a Physical Token as Their Second Authentication Factor

Schneier on Security

Krebs on Security is reporting that all 85,000 Google employees use two-factor authentication with a physical token. Users might be asked to authenticate using their security key for many different apps/reasons.

Beyond Passwords: Why Your Company Should Rethink Authentication

Dark Reading

Scaling security infrastructure requires scaling trust of users, devices, and methods of authentication. Here's how to get started

Black Hat 2018: Voice Authentication is Broken, Researchers Say

Threatpost

Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio. Black Hat Hacks Black Hat 2018 google Lyrebird machine learning Microsoft's Speaker Recognition API Siri Tacotron Voice Match Youtube

WPA3 Brings New Authentication and Encryption to Wi-Fi

Dark Reading

The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks

IoT 84

Less than 10% of Gmail Users Employ Two-Factor Authentication

Dark Reading

Google software engineer reveals lack of user adoption for stronger authentication

WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication

Dark Reading

New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct

Sphereon brings Blockchain-anchored Proof of Authenticity to Kofax Capture

Document Imaging Report

proof of authenticity. Easy to prove authenticity builds up trust for all parties. Blockchain Proof of Authenticity for Kofax Capture is available for pre-release from: [link].

Google: Security Keys Neutralized Employee Phishing

Krebs on Security

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g.,

Reddit Breach Stems from SMS Two-Factor Authentication Breakdown

Threatpost

A hacker has compromised Reddit's systems and was able to make away with email addresses and account credentials. Hacks Web Security breach compromise Credentials hack Reddit reddit hack SMS sms intercept Stolen Credentials Two-factor authenticaiton

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? Semafone won the recent PAYMNTS.com Voice Challenge with a way to use Amazon’s Alexa voice assistant as an out of band authentication mechanism. Authenticate me!

Critical Authentication Flaws in Cisco Policy Suite Patched

Threatpost

Cisco also pushed out seven high-severity fixes for its SD-WAN solution for business users, and a patch for a DoS flaw in the Cisco Nexus 9000 Series Fabric Switches. Vulnerabilities Cisco critical vulnerabilities Patches policy suite sd-wan Wireless carriers

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. At this point, they’ve already taken up a minute or more of the customer’s valuable time using knowledge-based authentication (KBA) methods that, quite frankly, can no longer assure that the person on the other end of the line is who they say they are. Prevention vs. clean up.

Troy Hunt on Passwords

Schneier on Security

He rightly points out that biometric authentication systems -- like Apple's Face ID and fingerprint authentication -- augment passwords rather than replace them. authentication biometrics passwords

Passwords: Here to Stay, Despite Smart Alternatives?

Threatpost

"Password-killing" authentication efforts may be on a road to nowhere. Breach Cloud Security Cryptography IoT Privacy Web Security alternatives Authentication Biometrics fido Password password killer passwords in use Troy Hunt webauthn

New Boom in Facial Recognition Tech Prompts Privacy Alarms

Threatpost

Government Privacy Videos American Civil LIberties Union ASIS International biometric authentication biometric database facial ID facial recognition RealNetworks Robie.AI Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. SureID

Tools 74

Who Am I? Best Practices for Next-Gen Authentication

Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords

Data Breaches at Timehop, Macy's Highlight Need for Multi-Factor Authentication

Dark Reading

Names, email addresses, and some phone numbers belonging to 21 million people exposed in Timehop intrusion; Macy's incident impacts 'small number' of customers

GCHQ on Quantum Key Distribution

Schneier on Security

Ubiquitous on-demand modern services (such as verifying identities and data integrity, establishing network sessions, providing access control, and automatic software updates) rely more on authentication and integrity mechanisms -- such as digital signatures -- than on encryption.

IoT 83

ThreatList: Password Hygiene Remains Lackluster in Global Businesses

Threatpost

Password-sharing persists, but at least multifactor authentication usage is up. Hacks Most Recent ThreatLists Privacy Web Security global businesses LastPass mfa multifactor authentication password hygiene password sharing security score the report threatlist

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords

Schneier on Security

In our empirical study, the number of candidate unlock patterns that an attacker must try to authenticate herself to a Samsung S4 Android phone can be reduced by up to 70% using this novel acoustic side-channel. authentication cellphones hacking passwords phones sidechannelattacks