Phone Data Security at Your Fingertips

Researchers from New York University and Michigan State University say the key to phone data vulnerability is at your fingertips. Biometrics, namely fingerprints, are a common means of user authentication. But, is it as secure as it appears to be? In a study published in IEEE Transactions on Information Forensics and Security, researchers considered the possibility of hackers creating a set of synthetic or real “Master Fingerprints” able to log into a high rate of devices.

Smartphones’ sensor for collecting fingerprint data is too tiny to accommodate the whole print. So, users are prompted to give multiple impressions of the same finger when setting it up. A user is prompted to give [...]

Share

NIST Smart Grid, Vol. 2

The NIST has just released its latest version of standards for Smart Grid cybersecurity. It is hoped that this will set the standard for state laws and corporate [...]

Share

Identity Theft Task Force Recommendations

In May 2006, an Executive Order of the President created the Identity Theft Task Force. The Task Force includes members of several Federal agencies and departments. In September 2006, the Task Force released a number of recommendations ahead of the May 2007 document “Combatting ID Theft: Strategic Plan” in order to help agencies get a head start on the growing problem of identity [...]

Share

Missouri lawmakers follow rebel suit and reject REAL ID

Missouri state lawmakers overwhelmingly voted Wednesday to pass House Bill 361, effectively rejecting the provisions for compliance with the 2005 REAL ID Act. If the Governor does sign the legislation, the Show Me State will have a bit of cleanup to do, including what to do with the data already collected after pilot program, and what happens to the $22M in DHS [...]

Share

Finland's Fingerprinting Fiasco? Centralized private records database accessible by police

Finland will collect all their citizens’ fingerprints, store them in a central database and include them in passport ID chips. Singapore’s been doing this for several years, and the parallels and privacy implications are deeper than [...]

Share