Tag Archives: completely

Physical security keys eliminate phishing at Google

Google claims it has completely eliminated successful phishing attacks against its employees through the use of physical security keys and Universal Second Factor.

Google began introducing and evaluating physical security keys in 2014 and by early 2017 all 85,000-plus Google employees were required to use them when accessing company accounts. In the time since, the company told Brian Krebs, no employee has been successfully phished.

A Google spokesperson said the decision to use the Universal Second Factor (U2F) physical security keys instead of software-based one-time-password (OTP) authentication was based on internal testing.

“We believe security keys offer the strongest protections against phishing,” a Google spokesperson wrote via email. “We did a two-year study that showed that OTP-based authentication had an average failure rate of 3%, and with U2F security keys, we experienced zero percent failure.”

Lane Thames, senior security researcher at Tripwire, based in Portland, Ore., said the main reason these software-based apps are less secure is “because attackers can potentially intercept these OTPs remotely.”

“Another issue is the bulk production of OTPs that users can store locally or even print. This is done in order to make the 2FA [two-factor authentication] process a little easier for end users or so end users can save OTPs for later use, if they don’t have access to their phones when the code is needed,” Thames wrote via email. “This is akin to a similar problem where users write passwords and leave them around their workspace.”

However, John Callahan, CTO at Veridium, an identity and access management software vendor based in Quincy, Mass., noted that there are also benefits to users opting for 2FA via smartphone.

“Some people who use a U2F key fear losing it or damaging it. This is where biometrics can play a key role. Methods using biometrics are helping to prevent attacks,” Callahan wrote via email. “Using biometrics with the Google Authenticator app is a secure solution, because a mobile phone is always nearby to authenticate a transaction.”

Moving companies to physical security keys

Physical security keys implementing U2F was the core part of Google’s Advanced Protection Program, which it rolled out as a way for high-risk users to protect their Google accounts. A physical security key, like a YubiKey, can authenticate a user simply by inserting the key into a computer, tapping it against an NFC-capable smartphone or connecting to an iOS device via Bluetooth.

Nadav Avital, threat research manager at Imperva, based in Redwood Shores, Calif., said, “in an ideal world,” more companies would require multifactor authentication (MFA).

In general, physical keys offer better security, because software-based authentication relies on a shared secret between the client and the provider that can be discovered.
Nadav Avitalthreat research manager at Imperva

“In general, physical keys offer better security, because software-based authentication relies on a shared secret between the client and the provider that can be discovered. Unfortunately, most people don’t use [2FA or MFA], neither physical nor software-based, because they don’t understand the implications or because they prefer simplicity over security,” Avital wrote via email. “Clients can suffer from fraud, data theft or identity theft, while the company can suffer from reputation damage, financial damage from potential lawsuits and more.”

Richard Ford, chief scientist at Forcepoint, a cybersecurity company based in Austin, Texas, said worrying about the best way to implement 2FA might be premature, as “we still have oodles of companies still using simple usernames and password.”

“Getting off that simple combo to something more secure provides an immediate plus up for security. Look at your risk profile, and try and peer a little into the future,” Ford said. “Remember, what you plan today won’t be reality for a while, so you want to skate to where the puck is going. With that said, please don’t let perfect be the enemy of good.”

Petitioning the board

Experts noted that not all IT teams will have as easy a time convincing the board to invest in making physical security keys or another form of multifactor authentication a requirement as Google would.

Matthew Gardiner, cybersecurity expert at Mimecast, a web and email security company based in Lexington, Mass., suggested framing the issue in terms of risk reduction.

“It is hard to quantify risk unless you have experienced a recent breach. Using MFA is not a theoretical idea; it is now a security best practice that is incredibly cheap and easy to use from a multitude vendors and cloud service providers,” Gardiner wrote via email. “I can only assume that if organizations are still only using a single-factor of authentication in support of B-to-B or B-to-E applications that they must think they have nothing of value to attackers.”

Ford said it was probably best not to spear phish the board for effect, “no matter how tempting that might be.”

“I would, however, suggest that the Google data itself can be of tremendous value. Boards understand risk in the scope of the business, and I think there’s plenty of data now out there to support the investment in more sophisticated authentication mechanisms,” Ford wrote. “Start with a discussion around Google and their recent successes in this space, and also have a reasoned — and money-based — discussion about the data you have at risk. If you arm the board with the right data points, they will very likely make the right decision.”

For Sale – Thinkpad X230 i5 3220M 2.6GHz / 8GB RAM / Windows 7 Pro

Have completely switched over to Mac now so no longer needed.

Great workhorse machine never set a foot wrong.

– Thinkpad x230
– i5 3220m 2.6 GHz
– 8GB RAM
– No HDD
– IPS screen
– 2 x Chargers
– Battery
– Windows 7 Pro license key which has been upgraded to Windows 10 Pro so should still work according to this Microsoft page – https://support.microsoft.com/en-gb/help/12435/windows-10-upgrade-faq

Some of the paint at the top of the lid is peeling. Will add photos shortly to show any wear on the chassis.

Price and currency: £240
Delivery: Delivery cost is included within my country
Payment method: BT
Location: London
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Thinkpad X230 i5 3220M 2.6GHz / 8GB RAM / Windows 7 Pro

Have completely switched over to Mac now so no longer needed.

Great workhorse machine never set a foot wrong.

– Thinkpad x230
– i5 3220m 2.6 GHz
– 8GB RAM
– No HDD
– IPS screen
– 2 x Chargers
– Battery
– Windows 7 Pro license key which has been upgraded to Windows 10 Pro so should still work according to this Microsoft page – https://support.microsoft.com/en-gb/help/12435/windows-10-upgrade-faq

Some of the paint at the top of the lid is peeling. Will add photos shortly to show any wear on the chassis.

Price and currency: £240
Delivery: Delivery cost is included within my country
Payment method: BT
Location: London
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Mobile threat defense helps fill EMM’s gaps

SAN DIEGO — As more IT pros realize that EMM doesn’t completely protect mobile data, they’re taking a closer look at mobile threat defense tools.

Enterprise mobility management (EMM) allows IT to enforce security policies and control what users do on their devices. But attacks on mobile operating systems and devices are becoming more common as hackers identify vulnerabilities, and organizations need clear insight into these threats and their potential effects. Mobile threat defense tools can help with that piece of the security puzzle, said analysts and attendees here at the Gartner Catalyst conference.

“EMM is more of just the management; it’s just pushing a policy to the phone,” said Seth Wiese, an IT security administrator at Kuraray America, a chemicals manufacturer in Houston.

Mobile threat defense tools supplement EMM by continuously monitoring devices for malicious apps and other risks, and by providing analytics around app and network usage to prevent cyberattacks. Kuraray uses VMware AirWatch for EMM and wants to adopt this technology to get more monitoring capabilities and predictive analytics about its devices, Wiese said.

But for organizations just starting out with mobility, it can be a challenge to convince higher-ups that IT requires more than just EMM for security.

Patrick Hevesi, research director, GartnerPatrick Hevesi

“That comes down to dollars and sense,” said the director of enterprise solutions at a banking and investment firm, who requested anonymity because he is not authorized to speak publicly. “And how do you assign a cost value to data being lost?”

The bank uses Microsoft Intune to manage around 750 corporate-owned mobile devices, but there is definitely a need to supplement that software with mobile threat defense, the director said.

Mobile threat defense market heats up

Traditional security vendors are acquiring mobile threat defense startups to integrate this technology into their larger product offerings; see Symantec’s acquisition of Skycure last month.

Other vendors in the market include Appthority, Check Point and Zimperium. All of these offerings have different capabilities for analyzing devices, apps and operating systems to identify risks, and many use machine learning to detect patterns in user and app behavior and predict future threats.

“There’s not one tool,” said Patrick Hevesi, research director at Gartner, in a session. “Some tools detect. Some tools prevent. Some tools remediate. Some tools pop up an alert. So as you’re building this strategy, you need to start thinking about what attacks you’re most worried about.”

This approach can help IT decide what tool to buy. One organization could be prone to malware, while another may have users downloading unwanted applications, for instance. At Kuraray, data leakage is the biggest concern, Wiese said.

Every code written by someone can be exploited by someone else.
Patrick Hevesiresearch director, Gartner

The most common mobile attack vectors are websites, app stores, text messages and network vectors such as rogue access points on Wi-Fi networks, Hevesi said. Traditional antivirus software might not catch threats to mobile devices, and hackers have wised up and figured out where the vulnerabilities in mobile operating systems are, he said.

“Vulnerabilities exist on all mobile platforms,” he added. “It’s software. Every code written by someone can be exploited by someone else.”

Mobile threat defense best practices

As part of a strong mobile security strategy, IT should set up data classification levels that determine how much risk each user’s information presents and how much security they require, because not all will be the same, Hevesi said.

“Maybe your CEO just wants email, calendar, contacts,” he said. “So maybe you don’t need EMM for that and just use [Microsoft] Exchange ActiveSync and throw threat defense on there.”

Classifying data levels is the first step the banking and investment firm’s director wants to take as he evaluates mobile threat defense software.

“I’m trying to understand the users to figure out the risk profile,” he said.

IT should also limit the devices and operating systems that employees can use, to ensure they have the most secure and up-to-date versions available, and continuously educate users on how to avoid mobile threats. For instance, there’s a flashlight app on Google Play that requests permissions to access information in many other apps, Hevesi said.

“Train your users to say no,” he said.

For Sale – Billion BiPAC 7800NXL broadband router – Final price drop

For sale a completely unused and still factory sealed Billion 7800NXL router

Billion Products for SSL VPN, ADSL Modem/Router, Wireless ADSL Router, Powerline ADSL Router and Adapter, VoIP ADSL Modem/Router, Security Router, Broadband Router, SHDSL Bridge/Router, iBusiness Security, ISDN Product

I just never got around to playing with this and to be honest my RT-N16 with modded firmware does everything I need, for the moment.

This router is roughly 6-8 months old and has only ever been taken out of it’s box for checking contents and for it’s photo shot for AVF classifieds today.

Final price drop to £45 including P&P

If you have any questions please ask away

20170805_124007.jpg

20170804_143600.jpg

20170804_143715.jpg

20170804_143824.jpg

20170804_143838.jpg

20170804_143936.jpg

Price and currency: £45 inc P&P
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Marlborough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Billion BiPAC 7800NXL broadband router

For sale a completely unused and still factory sealed Billion 7800NXL router

20170804_143715.jpg

20170804_143824.jpg

20170804_143838.jpg

20170804_143936.jpg

Price and currency: £50 inc P&P
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Marlborough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Billion BiPAC 7800NXL broadband router

For sale a completely unused and still factory sealed Billion 7800NXL router

20170804_143715.jpg

20170804_143824.jpg

20170804_143838.jpg

20170804_143936.jpg

Price and currency: £55
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Marlborough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Billion BiPAC 7800NXL broadband router

For sale a completely unused and still factory sealed Billion 7800NXL router

20170804_143715.jpg

20170804_143824.jpg

20170804_143838.jpg

20170804_143936.jpg

Price and currency: £55
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Marlborough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Billion BiPAC 7800NXL broadband router

For sale a completely unused and still factory sealed Billion 7800NXL router

20170804_143715.jpg

20170804_143824.jpg

20170804_143838.jpg

20170804_143936.jpg

Price and currency: £60
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer
Location: Marlborough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.