EAST LANSING — No two people are believed to have identical fingerprints, but researchers from New York University and Michigan State University have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other devices can be more vulnerable than previously thought.
The vulnerability lies in the fact that fingerprint-based authentication systems feature small sensors that do not capture a user’s full fingerprint. Instead, they scan and store partial fingerprints, and many phones allow users to enroll several different fingers in their authentication system. Identity is confirmed when a user’s fingerprint matches any of the saved partial prints. The researchers hypothesized that there could be enough similarities among different people’s partial prints that one could create a “MasterPrint.”
Continue reading MSU, NYU researchers find partial fingerprint may trick smartphones
ROYAL OAK – On the M2 TechCast Monday Oct. 10, Steve Smith will outline the role C/D/H played in helping Delphi win the Microsoft Ignite 2016 Mealogix MetroHero Award, Janet Tyler from Red Level will update the latest news from the managed service provider, Dan Lohrmann will update the latest cybersecurity threats, and Terry Bean will wrap the TEDxDetroit conference, which was held on Oct. 6.
The M2 TechCast airs live on the internet from 3 to 4 p.m. Eastern time each Monday at http://www.podcastdetroit.com. And you can listen to past episodes by clicking on http://www.podcastdetroit.com/artist/mi-tech-cast/.
The M2 TechCast is hosted by Mike Brennan, founder and publisher of Michigan Technology News, http://www.mitechnews.com, and Matt Roush, director of the university news bureau at Lawrence Technological University in Southfield. Both have covered high-tech in Michigan as journalists for more than 20 years.
The M2 TechCast is part of Podcast Detroit, a network of more than 50 locally produced podcasts on a wide variety of topics, anchored by IT in the D. the nation’s No. 1 tech podcast, which regularly draws more than 500,000 listeners a week. IT in the D airs live Monday nights from 9 to 11 p.m. Eastern time.
LANSING – The fifth annual Michigan state cyber summit is set for October — and event at which experts from across the globe will gather to discuss the thorny cybersecurity attacks that plague businesses, government and personal Internet users.
The 2016 North American International Cyber Summit is scheduled for Oct. 17 at the Cobo Center in Detroit.
Continue reading State Sets Fifth Cybersecurity Summit
ANN ARBOR — The Ann Arbor-based two-factor access authentication developer Duo Security has released a new study of its installed base of more than 1 million mobile devices. The results aren’t pretty for the Android operating system, and aren’t that much better for Apple’s iOS.
Continue reading Duo Security Study Finds Major Security Holes In Mobile Devices
TROY — Walsh College will offer a new cybersecurity concentration in its Master of Science in Information Technology degree program in January 2016 to meet the increased demand for advanced education in this growing IT specialization.
Separately, a free webinar titled “Next Generation Cyber Warriors – Cyber 4.0” is scheduled from 12:30 p.m. to 1:30 p.m., Wednesday, Jan. 20. It is available to the public, but registration is required at http://www.walshcollege.edu/webseries. Spaces are limited.
Continue reading Walsh College Adding Cybersecurity Concentration, Sets Webinar
TRAVERSE CITY — A new study from the Traverse City-based cybersecurity research firm Ponemon Institute says 75 percent of organizations in the United States are not prepared to respond to cyberattacks, leaving them vulnerable to the increasing intensity and volume of security breaches.
The study, called “The Cyber Resilient Organization: Learning to Thrive Against Threats,” benchmarks U.S. organizations’ “cyber resilience” and gives them ways to improve and measure their cyber resilience over time. Cyber resdilience is found to be the most potent weapon organizations have in prevailing against the mounting threats they face.
The study — written by Larry Ponemon, chairman and founder of the Ponemon Institute, with founding sponsor Resilient Systems, a Cambridge, Mass.-based provider of cyberattack incident response technologies — surveyed more than 600 IT and security executives about their organizations’ approaches to becoming more resilient in the face of increasingly problematic and frequent cyberattacks.
Continue reading TC Firm’s Study Shows Importance Of ‘Cyber Resilience’
ALLEN PARK — Baker College of Allen Park will add five new programs to its 2015 fall roster — three in manufacturing and one each in health sciences and computer information systems. Classes begin Monday, Sept. 28.
The programs are a bachelor’s degree in cyber defense, associate degrees in hemodialysis patient care technician, advanced manufacturing technology and mechanical technology, and a certificate in CNC machinist.
Continue reading Baker College Adds Programs In Manufacturing, IT, Health
TRAVERSE CITY — The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks, exposing millions of patients and their medical records, according to the latest study from Traverse City’s Ponemon Institute, sponsored by Portland, Ore.-based security consultants ID Experts.
The Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that criminal attacks in healthcare are up 125 percent since 2010 and are now the leading cause of data breach.
The findings also show that most healthcare organizations are still unprepared to address this rapidly changing cyber threat environment and lack the resources and processes to protect patient data.
Continue reading Criminal Attacks Now Lead Healthcare Data Breaches
SOUTHFIELD — The North American International Cyber Summit 2015, hosted by Michigan Gov. Rick Snyder, has issued a call for presentations.
The event will be held Oct. 25 and 26 at Cobo Center in Detroit. The submission deadline is Monday, May 4.
People with knowledge of cybersecurity issues are now invited to submit a presentation proposal. Presentation time slots are 30 to 45 minutes. They may feature a case study or proven example that addresses any of the following areas of cyber security and awareness: business, education, home users and families, law enforcement, government, defense, healthcare and finance.
Continue reading 2015 Cyber Summit Issues Call For Presentations
HOUGHTON — Imagine the smart home of the future. Thanks to a central controller and wi-fi, not only does the thermostat power up and warm or cool the house as you are heading home. Smart light bulbs come on low at dusk and brighten up as the sky gets darker;your washing machine starts a load of clothes when the electricity is cheapest; your smart refrigerator thaws the roast in one section, while another keeps your cheese ready to slice and yet another chills your beer. The doors lock automatically behind you and unlock as you approach — but stay locked for anyone else. A two-way nannycam lets you keep an eye on the kids while a sprinkler waters your lawn when water demand is lowest.
But what if a hacker gained access to your central controller? Your roast is frozen, your milk is sour, and the heat has been on full blast all day when you finally break into your house through a window because your front door won’t unlock. The washing machine and dishwasher have been running at peak prices for electricity, and the kids have torn their room apart while it looked like they were peacefully napping.
In fact, if the hacker got to every smart home in the neighborhood, utility bills would shoot up and brownouts, if not blackouts would be imminent.
It’s a cybersecurity nightmare. And it’s exactly what Shiyan Hu is working to prevent.
Continue reading MTU Prof: Hackers Could Make Smart Homes Stupid — or Worse