behavioral biometrics

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard

Identifying People by Their Browsing Histories

Interesting paper: "Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories": We examine the threat to individuals' privacy based on the feasibility of reidentifying ...

Yet Another Biometric: Bioacoustic Signatures

Sound waves through the body are unique enough to be a biometric: "Modeling allowed us to infer what structures or material features of the human body actually differentiated people," explains Joo Yong ...
credentials

Centrify Automates Password Reconciliation via Client

Centrify has extended its password access management (PAM) service to enable password reconciliation on the client. Torsten George, cybersecurity evangelist for Centrify, said enabling password reconciliation using Centrify client software in conjunction ...
Security Boulevard

Identifying a Person Based on a Photo, LinkedIn and Etsy Profiles, and Other Internet Bread Crumbs

Interesting story of how the police can identify someone by following the evidence chain from website to website. According to filings in Blumenthal's case, FBI agents had little more to go on ...

Me on COVID-19 Contact Tracing Apps

I was quoted in BuzzFeed: "My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier, a privacy expert and fellow at the Berkman Klein Center for Internet ...

Modern Mass Surveillance: Identify, Correlate, Discriminate

Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville ...
machine authentication

Machine Authentication Solutions Plug an Emerging Security Hole

Machine authentication can address the growing power of machines and their ability in providing hackers with new entryways. Computer communications are changing, and system security must change as well. Traditionally, corporate security ...
Security Boulevard

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed for the Pentagon after US Special ...
access

Is 2FA Broken, or Just Evolving?

Earlier this year, only days after KnowB4’s chief hacking officer Kevin Mitnick demonstrated how to bypass two-factor authentication (2FA) on CNBC, security researcher Piotr Duszynski warned about a new penetration testing tool ...
Security Boulevard