{"id":2574,"date":"2017-12-20T13:41:01","date_gmt":"2017-12-20T16:41:01","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2574"},"modified":"2017-12-20T13:41:01","modified_gmt":"2017-12-20T16:41:01","slug":"cuando-las-amenazas-se-vuelven-raras-las-soluciones-de-seguridad-se-vuelven-mas-raras","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2574","title":{"rendered":"Cuando las amenazas se vuelven raras, las soluciones de seguridad se vuelven m\u00e1s raras"},"content":{"rendered":"<p>El a\u00f1o que viene, nuestros tel\u00e9fonos y computadoras ser\u00e1n la base para una carrera de armamentos entre extra\u00f1as amenazas nuevas y extra\u00f1as innovaciones en ciberseguridad.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/02\/20160225-stock-mwc-ericsson-booth-security-locks-100647686-large.jpg\" alt=\"20160225 stock mwc ericsson booth security locks\" width=\"297\" height=\"198\" \/>The world of security is getting super weird. And the solutions may be even weirder than the threats.<\/p>\n<p>I\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3237952\/mobile-wireless\/why-we-can-t-trust-smartphones-anymore.html\" target=\"_blank\" rel=\"noopener noreferrer\">told you last week<\/a>\u00a0that some of the biggest companies in technology have been caught deliberately introducing potential vulnerabilities into mobile operating systems and making no effort to inform users.<\/p>\n<p>One of those was introduced into Android by Google. In that case, Android had been caught transmitting location data that didn\u2019t require the GPS system in a phone, or even an installed SIM card. Google claimed that it never stored or used the data, and it later ended the practice.<\/p>\n<p>Tracking is a real problem for mobile apps, and this problem is underappreciated in considerations around BYOD policies.<\/p>\n<p>Yale University Law School\u2019s Privacy Lab and the France-based nonprofit Exodus Privacy have\u00a0<a href=\"https:\/\/github.com\/YalePrivacyLab\/tracker-profiles\" rel=\"nofollow\">documented<\/a>\u00a0that more than 75% of the more than 300 Android apps they looked at contained trackers of one kind or another, which mostly exist for advertising, behavioral analytics or location tracking.<\/p>\n<p>Most of that location tracking relies on accessing GPS information, which requires user opt-in. But now, researchers at Princeton University\u00a0<a href=\"https:\/\/www.princeton.edu\/news\/2017\/11\/29\/phones-vulnerable-location-tracking-even-when-gps-services\" rel=\"nofollow\">have demonstrated<\/a>\u00a0a potential privacy breach by creating an app called PinMe, which harvests location information on a smartphone without using GPS information.<\/p>\n<p>In general, our belief that turning off the location feature of phones protected us from location snoops has been invalidated.<\/p>\n<p>In fact, many of our assumptions around security are being challenged by new facts. Take two-factor authentication, for example.<\/p>\n<p>A report last month by Javelin Strategy &amp; Research\u00a0<a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/The-State-of-Authentication-Report.pdf\" rel=\"nofollow\">claimed<\/a>\u00a0that current applications of multi-factor authentication are \u201cbeing undermined.\u201d Two- or multi-factor authentication is also underutilized by enterprises, with just over one-third using \u201ctwo or more factors to secure access to their data and systems.\u201d<\/p>\n<p>So we can\u2019t trust two-factor authentication like we used to, and even if we could it\u2019s wildly underutilized.<\/p>\n<p>But surely we can trust Apple devices, right? Apple has a sterling reputation for strong security. Or, I should say, \u201chad\u201d such a reputation.<\/p>\n<p>Apple apologized and issued a patch this week for a\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3239027\/apple-mac\/apple-apologizes-issues-mac-login-security-patch.html\">major security flaw<\/a>that enabled anyone with physical access to an Apple computer running macOS High Sierra to gain full access without even using a password (<a href=\"https:\/\/twitter.com\/lemiorhan\/status\/935578694541770752\" rel=\"nofollow\">by simply using \u201croot\u201d as the username<\/a>).<\/p>\n<p>Apple fixed the flaw. But the fact that it existed at all is new and weird and challenges our beliefs about Apple\u2019s security cred.<\/p>\n<p>Apple\u2019s new Face ID authentication has been\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=i4YQRLQVixM\" rel=\"nofollow\">defeated by researchers<\/a>, and some security experts\u00a0<a href=\"https:\/\/twit.tv\/shows\/twit-bits\/episodes\/4554\" rel=\"nofollow\">refuse to use it<\/a>. The methods for overcoming Face ID range from simply finding someone who looks similar to creating a realistic mask to fool it. Cybercriminals are going to be building and wearing masks, apparently.<\/p>\n<aside id=\"\" class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\"><\/aside>\n<p>And some authentication systems sound worse than the risks they\u2019re supposed to protect us from.<\/p>\n<p><a href=\"https:\/\/www.reddit.com\/r\/socialmedia\/comments\/643co2\/facebook_wont_let_me_login_asks_for_me_to_upload\/\" rel=\"nofollow\">Facebook is reportedly<\/a>\u00a0testing an authentication scheme that requires users to take a selfie at the point of logging in. Many smartphone photos contain time and location information.<\/p>\n<p>In the past month or two, our assumptions around security have been upended. Things we used to believe were secure are not.<\/p>\n<p>And it\u2019s going to get worse before it gets better.<\/p>\n<p>The software security company\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/2018-threats-predictions\/\" rel=\"nofollow\">McAfee said<\/a>\u00a0this month that 2018 will be characterized by a new intensity in attacks, as \u201cadversaries will increase their use of machine learning to create attacks, experiment with combinations of machine learning and artificial intelligence (A.I.), and expand their efforts to discover and disrupt the machine learning models used by defenders.\u201d<\/p>\n<p>Our current security systems are broken, and \u201cadversaries\u201d are getting super sophisticated.<\/p>\n<p>What we need are much better and more extreme security measures that are also usable in real-world, everyday scenarios by regular users.<\/p>\n<p>But there\u2019s reason for optimism.<\/p>\n<h2><strong>When the threats get weird, the solution get even weirder<\/strong><\/h2>\n<p>Two Google researchers have developed a machine-learning technology that instantly detects whether anyone else is\u00a0<a href=\"https:\/\/nips.cc\/Conferences\/2017\/Schedule?showEvent=9757\" rel=\"nofollow\">looking at your smartphone screen<\/a>.<\/p>\n<p>The system combines facial recognition (who is on camera) and gaze detection (what they\u2019re looking at) to prevent \u201cshoulder surfers\u201d from sneaking a peek at your screen.<\/p>\n<p>The detection works in a fraction of a second, and in practical use a shoulder-surfer event could cause the screen to go dark.<\/p>\n<p>The face-recognition technology\u2019s ability is akin to the\u00a0<a href=\"https:\/\/buy.geni.us\/Proxy.ashx?TSID=14159&amp;GR_URL=https%3A%2F%2Fitunes.apple.com%2Fus%2Fapp%2Fnot-hotdog%2Fid1212457521%3Fmt%3D8\" rel=\"nofollow\">Not Hotdog app<\/a>from HBO\u2019s\u00a0<em>Silicon Valley<\/em>: It\u2019s not looking to identify everyone, merely to identify whether each human is the authorized user or not the authorized user. When the latter occurs, access is denied.<\/p>\n<p>This is obviously superior in concept to the current use of face recognition on smartphones, where the authorized face unlocks the device then, once unlocked, anyone can see what\u2019s on the screen.<\/p>\n<p>The key concept behind this technology is constant, real-time authentication, rather than authenticate once, then let anyone see or use the device afterward.<\/p>\n<p>Google is also thinking about a \u201cuser-detecting laptop lid,\u201d according to\u00a0<a href=\"http:\/\/www.patentlyapple.com\/patently-apple\/2017\/11\/google-patents-a-motorized-pixelbook-lid-that-opens-and-closes-with-a-simple-touch-auto-aligns-the-display-to-the-users-fa.html\" rel=\"nofollow\">a recently granted Google patent<\/a>.<\/p>\n<p>The patent describes a laptop lid that automatically opens for authorized users, then repositions itself to directly face you as you move your head around.<\/p>\n<p>It works by using two cameras \u2014 one on the outside of the lid, and one on the inside. These detect and recognize faces. When the authorized user approaches the Pixelbook (presumably), the lid physically unlocks and opens. After a certain amount of time after the authorized user has left the room, the laptop lid automatically closes and physically locks.<\/p>\n<p>The patent also holds out the possibility of using alternative means of authentication, namely NFC, Bluetooth pairing, voice ID, iris scanning or gesture recognition \u2014 or combinations of methods.<\/p>\n<p>From a security standpoint, the idea introduces a physical lock to authentication, with convenient, automatic unlocking for authenticated users.<\/p>\n<p>Some forms of authentication are being perfected, too. For example, voice ID in concept is great because it\u2019s easy \u2014 we\u2019re all going to be talking to our phones anyway, so authenticating with voice is natural. Unfortunately, it\u2019s easy to spoof.<\/p>\n<p>State University of Florida researchers have come up with technology that\u00a0<a href=\"https:\/\/acmccs.github.io\/papers\/p57-zhangA.pdf\" rel=\"nofollow\">verifies voice ID<\/a>. It\u2019s designed to be used with technologies that verify users based on patterns in their voice. Because these can be spoofed with high-quality recordings, the researchers came up with VoiceGesture, which uses a smartphone to transmit ultrasonic sound waves that are reflected off the user\u2019s face. It confirms that the authorized voice is in fact being spoken in real time by the physical person and is not a recording.<\/p>\n<p>All this technology, of course, uses A.I. And A.I. is the key to better cybersecurity going forward.<\/p>\n<p>It\u2019s a well-known maxim in IT that as soon as you idiot-proof something, they build a better idiot. Which is to say: Users are often the weakest link in any chain of security.<\/p>\n<p>That\u2019s why A.I. will come into play to help users make better decisions.<\/p>\n<p>A company called KnowBe4, for example, is building an A.I. virtual assistant that\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3239527\/phishing\/can-ai-eliminate-phishing.html\">advises users on security decisions<\/a>\u00a0(\u201cYou may not want to download that attachment, Dave\u201d).<\/p>\n<p>What you need to know is this: Yesterday\u2019s cyberattacks are going to be superseded in the year ahead by strange and unexpected new threats, many of which will deploy A.I. And the best (or only) defense will be weird new solutions themselves based on A.I.<\/p>\n<p>An A.I. arms race is coming. And it\u2019s going to be like nothing we\u2019ve ever seen.<\/p>\n<p><strong>Fuente:\u00a0<\/strong><em><a href=\"https:\/\/www.computerworld.com\/article\/3239684\/mobile-wireless\/when-the-threats-get-weird-the-security-solutions-get-weirder.html#tk.rss_security\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.computerworld.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El a\u00f1o que viene, nuestros tel\u00e9fonos y computadoras ser\u00e1n la base para una carrera de armamentos entre extra\u00f1as amenazas nuevas y extra\u00f1as innovaciones en ciberseguridad.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2574"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2574"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2574\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}