Tag Archive for: Level

Exploring Biometrics and Trust at the Corporate Level


As the world continues to move essential functions to digital environments, companies need trustworthy methods for verifying who is behind the screen. Multifactor authentication (MFA) has become the standard for preventing cyberattacks, with the US National Cyber Security chief saying it could prevent 80% to 90% of attacks. MFA works by requiring multiple layers of authentication, such as one-time passwords (OTPs), physical hardware tokens, or soft tokens.

While these do a better job of securing access and data than traditional passwords, what are they really verifying? In the case of SMS-delivered OTPs, the system is verifying your access to a phone; with hardware tokens, it’s access to a physical card or device. But none of these require the actual person to confirm they are who they say they are. These methods rely on the assumption that the only person accessing these devices is their owner. Clearly, it’s a device, rather than a person, that is being verified. So what can organizations do to improve on traditional MFA methods and build trust with the people behind each digital interaction?

Some methods for MFA verification, including hardware tokens and SMS-based OTPs, have been widely adopted, but they present clear challenges for organizations. Phone-based options require access to a smartphone — not something everyone has and not something companies want out in all environments. Token-based systems are not much better; tokens can be lost, forgotten, or easily handed to another user. The clear solution is to have a biometric measurement that is entirely unique to the user as part of any MFA strategy. But not all biometric methods are created equal, and some still only establish trust at the device level.

Limitations of Device-Based Biometrics
Device-based biometrics, such as a fingerprint captured using the built-in sensor on a phone, PC, or dongle, are stored within the device that they are captured on. These systems offer a high level of convenience for the user, as well as strong security for personal use cases. However, device-based biometrics fall into the same trap as other MFA methods — it is still the device, and oftentimes an encrypted key, being verified, rather…

Source…

Poland raises cybersecurity threat level after Ukraine hack




Polish Prime Minister Mateusz Morawiecki ordered the move to protect against security breaches. EPA


© Tomasz Gzell
Polish Prime Minister Mateusz Morawiecki ordered the move to protect against security breaches. EPA

Poland has raised its cybersecurity terror threat level after Ukraine was hit by a major hack last week that took out several government websites.

Poland’s digital ministry said “the public administration will be obliged to conduct increased monitoring of the security of ICT (information and communication technology) systems”.

“It is due to the possibility of a security breach of electronic communications.”

The country will be placed on the lowest of four potential threat levels until January 23.

Poland last introduced the measure during a UN forum on internet governance in December.

Ukraine blames Russia for the attack, which hit 70 government websites, but Moscow rejected the accusations.

Tensions are extremely high between Moscow and Kiev, with about 100,000 Russian troops massed on the Ukraine border – leading to fears in some western capitals that an invasion is imminent.

Diplomatic efforts are under way between Russia and Nato – of which Poland is a member, but Ukraine is not – but have made little headway so far. Moscow insists it is not about to launch an invasion and has issued a raft of security-related demands to Nato to help stabilise the region.

Source…

SUSE Linux Enterprise Server 15 SP2 is Now EAL 4+ Level Certified for IBM Z, Arm, and x86-64


SUSE has announced that its flagship Linux distribution has earned Common Criteria EAL 4+ certification. SUSE Linux Enterprise Server (SLES) 15 SP2 is now EAL 4+ level certified for IBM Z, Arm, and x86-64 architectures, signifying compliance with the demanding security requirements for mission-critical infrastructure. SUSE’s Common Criteria EAL 4+ software supply chain certification includes secure production, delivery of updates, and protection of critical digital assets.

“In today’s age of advanced hacking and service disruption, Common Criteria EAL 4+ level certification for SLES provides confidence to critical service providers such as governments, finance and banking companies, healthcare organizations, water and power companies, telecommunications providers, and others innovating at the edge,” said Thomas Di Giacomo, SUSE chief technology and product officer. “SUSE’s commitment to open interoperability means SLES 15 customers around the world can be certain their operating system conforms to the highest international standards for computer security within their chosen IT infrastructure.”

This latest certification, the highest level attainable for an open source operating system, for SUSE Linux Enterprise on IBM Z demonstrates a continued prioritization on security and reliability, said Kara Todd, director of Linux, IBM Z and LinuxONE at IBM. “We are seeing an ever-growing number of exciting new Linux workloads which are a great fit for the underlying scalability, reliability and security that the IBM Z platform provides.”

According to SUSE, the exponentially growing number of IoT and edge computing devices has increased risk to networks and required countries to raise their compliance requirements for infrastructure providers, particularly those involved in services essential to their economies, governments, and health and safety of citizens. SUSE’s Common Criteria EAL 4+ certified secure software supply chain enables the highest security standards for edge and IoT devices for critical infrastructure providers such as telecommunications companies and others innovating at the edge.

For more information, visit www.suse.com.


Source…

How to Check Your Android Security Patch Level to See if You’re Protected Against the Latest Vulnerabilities « Android :: Gadget Hacks


Numerous potential exploits are found for every operating system each month, and Android is no exception. Trouble is, lots of Android devices don’t receive timely updates — but many are now getting regular monthly security patches to at least shore up these vulnerabilities.

If you want protection from the latest dangerous hack, you’ll need to be on the newest security patch level. Google publishes these each month alongside a report on what’s been changed, but they can only guarantee the updates will be sent out to their own Pixel devices. For all other phones, there’s a chance you might not receive the security patch in a timely manner, but at least there’s a way to check.

Checking Your Security Patch Level

Different Android skins place their settings in varying locations, so we’ve divided this guide up by manufacturer. If your OEM is not listed below, try the Google/Stock Android method, as it’s typically the most universal.

1. Samsung

Samsung has taken so much criticism over the years about their poor update schedules that, in response, they’ve slowly become one of the best Android OEMs at updating their phones.

To check your security patch level on a Galaxy phone, open Settings, then scroll down toward the bottom and select About Phone. Inside, tap Software Information, then you’ll see the Android security patch level at the very bottom of the list.

2. Google/Stock Android

Google is responsible for the base-level patches for all of Android, but they also handle all software updates for both the Pixel line and any Android One device.

To check your security patch level on a Google-developed phone, start by opening your Settings app. From there, scroll down and choose About Phone towards the bottom. Next, tap Android Version, then your Android security update level will be displayed towards the top of the screen.

3. OnePlus

OnePlus’ lauded OxygenOS skin is close to stock Android, but it still reorganizes the Settings menu a bit. OxygenOS is also updated fairly frequently.

To check your security patch level on a OnePlus phone, open your Settings app and scroll down almost all the way to the bottom to tap About Phone. Here, tap Android Version, then you’ll see your Android security update

Source…