Tag Archive for: builds

Genesis HealthCare System Builds on its Investment in BIO-key Biometric Authentication Security as it Migrates to Epic Hyperdrive


BIO-key International, Inc.

BIO-key International, Inc.

ZANESVILLE, Ohio and HOLMDEL, N.J., Dec. 14, 2023 (GLOBE NEWSWIRE) — BIO-key® International, Inc. (NASDAQ: BKYI), an innovative provider of workforce and customer Identity and Access Management (IAM) featuring passwordless, phoneless and token-less Identity-Bound Biometric (IBB) authentication solutions, announced that its longstanding customer Genesis HealthCare System, the largest healthcare provider in its six-county region of Ohio, will add BIO-key’s PortalGuard IAM platform to support its existing BIO-key biometric authentication investment as it migrates to Epic Systems’ Hyperdrive end-user application interface. Genesis HealthCare has a network of more than 300 physicians and 4,000 employees across 27 locations.

PortalGuard’s standards-based integration with Hyperdrive allows Genesis HealthCare System to continue enjoying the security and streamlined biometric authentication user experience that BIO-key provides without re-enrolling employees or adopting more cumbersome and expensive multi-factor authentication solutions.

Named by Computerworld as one of the 100 Best Places to Work in IT every year since 2017, Genesis Healthcare utilizes BIO-key biometric software and hardware to secure and streamline its users’ login experience for Epic. By deploying PortalGuard IAM, it is able to maintain a consistent user experience and simplify the Hyperdrive migration. PortalGuard fully supports Hyperdrive’s modern authentication approach through its SAML Identity Provider (IdP) capabilities. PortalGuard provides seventeen authentication factor options, including WEB-key fingerprint authentication, the same core BIO-key biometric authentication platform regularly used by thousands of Genesis HealthCare employees. Additionally, users can now use PortalGuard for biometric authentication in other hospital applications through its support for standard IdP integration options like SAML, OAUTH, and OpenID Connect.

“Epic is a mission-critical application for many of BIO-key’s hospital customers, and implementing PortalGuard SAML SSO allows Genesis to maintain streamlined workflows and ensure secure access to patient information with IBB,” said Mark…

Source…

iPhone hack: NSO malware builds a computer inside your phone to steal data


An incredibly sophisticated piece of malware developed by the Israeli tech firm NSO Group works by creating an entirely separate computer inside the memory of an iPhone, allowing attackers to snoop and steal data



Technology



16 December 2021

iPhones

The hack targeted iPhones

Photo by Richard Drew/AP/Shutterstock

NSO Group, an Israeli tech firm, developed malware to hack iPhones by creating a “computer within a computer” capable of stealing sensitive data and sitting undetected for months or even years, researchers at Google have revealed.

The malware is part of NSO Group’s Pegasus software tool, which it is thought to have sold to countries including Azerbaijan, Bahrain, Saudi Arabia, India and the United Arab Emirates. US law-makers have called for sanctions against the firm.

Pegasus allows a user to read data from smartphones and spy via their microphones and cameras. The latest feature of the tool to emerge publicly, which has been called ForcedEntry, is also one of the most powerful and concerning to date, according to security experts.

The technical details were unravelled by members of the Project Zero security team at Google with the help of Citizen Lab at the University of Toronto in Canada, which investigates computer security and its impact on human rights. The attack is a “zero click” vulnerability, which means that the target doesn’t need to be tricked into clicking a link, putting even careful and technically savvy users at risk.

A specially crafted iMessage is sent to the target’s iPhone containing a fake GIF animation. Due to the way Apple’s…

Source…

Microsoft Weekly: Android on Windows, WHQL-signed malware, and 21H2 builds


Microsoft Weekly logo with an Android icon inside a Windows logo on the left and red padlocks on the

We’re at the end of the week, which means that it’s time to look at what happened in the world of Microsoft in the past few days. Windows 10 was primarily Microsoft’s focus in terms of new builds, but as we know, the upcoming version 21H2 build is just enablement package so don’t raise your expectations too much. More interestingly, Windows Subsystem for Android finally landed on preview builds of Windows 11. In the cybersecurity space, we also found out that Microsoft digitally signed a driver that was actually malware that can wreak havoc. Find out more about this in our weekly digest for October 17 – October 22.

Windows builds

Windows 10 logo with November 2021 Update written below it in blue

After giving Windows 11 all the attention for the past few weeks, Microsoft finally decided to give some love to Windows 10 too. The company released builds 19043.1319 and 19044.1319 for Insiders running version 21H1 or 21H2, respectively, in the Release Preview ring. Both builds have identical change logs, which makes sense because 21H2 is just an enablement package for 21H1 after all. Tons of bugs were squashed including those that affected subtitles from displaying on certain streaming sites or video playing apps. Enhancements were also made in the department of memory leaks and ransomware protections. You likely won’t notice any front-end enhancements if you install either of these builds though.

If you were thinking that build 19044.1319 will be the launch version of Windows 10 version 21H2 – when it eventually rolls out -, you’d be mistaken. Microsoft finally revealed that build 19044.1288 is a candidate build for that rollout and is now available for those on the Release Preview ring. The company has released ISOs too. The improvements offered in 19044.1319 will be provided in the next Patch Tuesday update. While a firm release date wasn’t disclosed, Microsoft referred to version 21H2 as the “November 2021 Update”, but also stated that out of the three noteworthy features promised for the update, a new Windows Hello for Business deployment method dubbed “cloud trust” won’t be ready for primetime. You can find out more about what to expect from Windows 10 November 2021 Update in our guide here.

Source…

Team builds first hacker-resistant cloud software system


Columbia Engineering team builds first hacker-resistant cloud software system
Microverification of cloud hypervisors. Credit: Jason Nieh and Ronghui Gu/Columbia Engineering

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions of customers is essential. This is true for large and small organizations alike. But up to now, there has been no way to guarantee that a software system is secure from bugs, hackers, and vulnerabilities.

Columbia Engineering researchers may have solved this security issue. They have developed SeKVM, the first system that guarantees—through a mathematical proof—the security of virtual machines in the cloud. In a new paper to be presented on May 26, 2021, at the 42nd IEEE Symposium on Security & Privacy, the researchers hope to lay the foundation for future innovations in system software verification, leading to a new generation of cyber-resilient system software.

SeKVM is the first formally verified system for cloud computing. Formal verification is a critical step as it is the process of proving that software is mathematically correct, that the program’s code works as it should, and there are no hidden security bugs to worry about.

“This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure,” said Jason Nieh, professor of computer science and co-director of the Software Systems Laboratory. “This means that users’ data are correctly managed by software running in the cloud and are safe from security bugs and hackers.”

The construction of correct and secure system software has been one of the grand challenges of computing. |Nieh has worked on different aspects of software systems since joining Columbia Engineering in 1999. When Ronghui Gu, the Tang Family Assistant Professor of Computer Science and an expert in formal verification, joined the computer science department in 2018, he and Nieh decided to…

Source…