Outline. Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

Size: px
Start display at page:

Download "Outline. Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion"

Transcription

1

2 Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

3 Traditional two factor Authentication

4 Traditional two factor Authentication

5 Sound Proof Two factor Authentication

6 Sound Proof Two factor Authentication

7 Security of Sound-Proof Goal is to defeat a remote attacker Assumption: Attacker cannot guess the victim environment

8 Our Attack Approach No need to predict the ambient environment of the phone. Rather, make the phone create predictable or previously know sounds.

9 Contributions made Novel attack against a notable zero-effort 2FA scheme. Correlation analysis of the attack system. Real-world attack strategies based on population statistics.

10 Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

11 Threat Model The Attacker Knows victim s credentials from a leaked Database. Has not compromised user s phone. Is not co-located with the victim. Knows user s Phone #, and other personal information.

12 Sound-Proof Architecture

13 Sound-Proof Correlation Algorithm One-third octave band: Divides audio into bands ranging from 50Hz to 4kHz. Results 20 One-third octave bands. Compute maximum cross-correlation for each band Corr(i,j) = max(crosscorr(xi,xj))

14 Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

15 Attack Details

16 Types of Attacks Ringtone Attacks e.g. Phone Call, Viber, Whatsapp, Facebook, Skype, FaceTime. App Notification Attack e.g. SMS, Skype, Whatsapp, Viber.

17 Parameterization for Attack Evaluation Collected audio samples at different locations, such as lab/office, Home, Café, Library. Total 525 audio pairs samples collected. Correlation thresholds chosen for attack evaluations are: Tc = , 0.18, 0.2

18 Attack Success Rate

19 Population Statistics Recruited 113 Amazon Mechanical Turk workers. Found two most popular phone brands iphone (39%) and Samsung (27%) Queried Type of Ringtone default, vibrate or silent In different situations while at work, home or asleep

20 Popular ringtone setting for Samsung and iphone

21 Popular ringtone setting for Samsung and iphone

22 Popular ringtone setting for Samsung and iphone

23 Popular ringtone setting for Samsung and iphone

24 Real World Attack Strategy Survey result help to device a real-world attack strategy Attack strategy contains of multiple rounds Different type of attack on each round. Compromised user accounts(cn) can be computed by CN(i) = device * state * Itt(k) * UN(i-1) Fraction of compromised user account at ith round.

25 Real World Attack Strategy Survey result help to device a real-world attack strategy Attack strategy contains of multiple rounds Different type of attack on each round. Compromised user accounts(cn) can be computed by CN(i) = device * state * Itt(k) * UN(i-1) Probability of owning a specific type of device

26 Real World Attack Strategy Survey result help to device a real-world attack strategy Attack strategy contains of multiple rounds Different type of attack on each round. Compromised user accounts(cn) can be computed by CN(i) = device * state * Itt(k) * UN(i-1) Probability of phone being in a particular state.

27 Real World Attack Strategy Survey result help to device a real-world attack strategy Attack strategy contains of multiple rounds Different type of attack on each round. Compromised user accounts(cn) can be computed by CN(i) = device * state * Itt(k) * UN(i-1) Interative Success rate = [ 1 ( 1 x ) ^ k ], k = 3

28 Real World Attack Strategy Survey result help to device a real-world attack strategy Attack strategy contains of multiple rounds Different type of attack on each round. Compromised user accounts(cn) can be computed by CN(i) = device * state * ltt(k) * UN(i-1) Uncompromised User Accounts from the previous round.

29 A Real World Attack

30 A Real World Attack

31 A Real World Attack

32 A Real World Attack

33 Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

34 Potential Mitigations Disabling TSA during call/notification. Customized ringtone frequently Mixing sound and vibration. Blocking sound creation during recording Detection of device emitted audio during recording.

35 Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

36 Discussion: Other Security Applications Sound-based co-presence detection. Sound-based device pairing.

37 Conclusions Zero-effort TFA based on ambient audio is an attractive proposition. We showed it is susceptible to practical remote attack. Demands mitigation strategies Mitigation should not compromise usability.

38

U.S. Mobile Consumers and OTT Services: Who uses which apps to watch video and connect? Market Study 2Q 2017

U.S. Mobile Consumers and OTT Services: Who uses which apps to watch video and connect? Market Study 2Q 2017 U.S. Mobile Consumers and OTT Services: Who uses which apps to watch video and connect? Market Study 2Q 2017 U.S. Mobile Consumers and OTT Services: Who uses which apps to watch video and connect? Market

More information

QUICK GUIDE. This guide is to help you understand what's included, how to use the SIM card and give you additional useful information.

QUICK GUIDE. This guide is to help you understand what's included, how to use the SIM card and give you additional useful information. QUICK GUIDE Japan 5GB Data Travel SIM Card HELLO! Thanks for purchasing from us! This guide is to help you understand what's included, how to use the SIM card and give you additional useful information.

More information

QUICK GUIDE. This guide is to help you understand what's included, how to use the SIM card and give you additional useful information.

QUICK GUIDE. This guide is to help you understand what's included, how to use the SIM card and give you additional useful information. QUICK GUIDE USA 4GB Travel SIM Card HELLO! Thanks for purchasing from us! This guide is to help you understand what's included, how to use the SIM card and give you additional useful information. Save

More information

How to change message ringtone in android phone. How to change message ringtone in android phone.zip

How to change message ringtone in android phone. How to change message ringtone in android phone.zip How to change message ringtone in android phone How to change message ringtone in android phone.zip Simple guide on how to change ringtone in Windows 10 mobile by importing your favorite music or sound

More information

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 August 2017 Date Version Description August 2017 1.0 Initial Draft 1. Single Sign On... 2 2. To register for SSO on the Global ID webpage...

More information

Guess Who s Texting You?

Guess Who s Texting You? TelcoSecDay @ Troopers 3/20/12 Heidelberg, Germany Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser SBA Research, Vienna, Austria Source: path.com

More information

User SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to!

User SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to! User SIM Guide Hello Thanks for purchasing & welcome to SimsDirect! This guide is here to help you use your SIM while traveling. Contact us We are responsive between 10AM-6PM AEST. @m.me/simsdirect @SimsDirect

More information

Authentication with Minimal User Interaction

Authentication with Minimal User Interaction Authentication with Minimal User Interaction Authentication Authentication - Verification of a user, usually through the use of private credentials. What you know - Username/Password combination What you

More information

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors Neil Zhenqiang Gong Iowa State University Bin Liu Rutgers University 25 th USENIX Security Symposium,

More information

www.hollieguard.com @hollie_guard Welcome to your User Guide Launched in October 2015, Hollie Guard is taking the mobile world by storm. With more than 20,000 downloads and users since its release. It

More information

Detecting Denial of Service Attacks in Tor

Detecting Denial of Service Attacks in Tor Norman Danner Danny Krizanc Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Financial Cryptography and Data Security 2009 Outline 1 Background

More information

OAuth securing the insecure

OAuth securing the insecure Black Hat US 2011 khash kiani khash@thinksec.com OAuth securing the insecure roadmap OAuth flow malicious sample applications mobile OAuth google app web-based OAuth facebook app insecure implementation

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

User Manual Smartwatch SW15

User Manual Smartwatch SW15 User Manual Smartwatch SW15! 1. Functions Health and exercise -Pedometer Built-in accelerometer checks and tracks your exercise time, fat burning, temperature, speed and distance. -Sleep Monitor Built-in

More information

Password Management. Eugene Davis UAH Information Security Club January 10, 2013

Password Management. Eugene Davis UAH Information Security Club January 10, 2013 Password Management Eugene Davis UAH Information Security Club January 10, 2013 Password Basics Passwords perform service across a broad range of applications Can act as a way to authenticate a user to

More information

Customer A - Dropbox. Issued to: Report date:

Customer A - Dropbox. Issued to: Report date: Customer A - Dropbox Issued to: example@example.com Report date: 2015-03-03 Example - dropbox 2015-03-03 Table of Contents Overview 3 Summary 3 Findings 4 User Activities 5 Over time 5 Activity bands 5

More information

GYROPHONE RECOGNIZING SPEECH FROM GYROSCOPE SIGNALS. Yan Michalevsky (1), Gabi Nakibly (2) and Dan Boneh (1)

GYROPHONE RECOGNIZING SPEECH FROM GYROSCOPE SIGNALS. Yan Michalevsky (1), Gabi Nakibly (2) and Dan Boneh (1) GYROPHONE RECOGNIZING SPEECH FROM GYROSCOPE SIGNALS Yan Michalevsky (1), Gabi Nakibly (2) and Dan Boneh (1) (1) Stanford University (2) National Research and Simulation Center, Rafael Ltd. 0 MICROPHONE

More information

S1 Smart Watch APPS GUIDE. Models: S1, S1C & S1 PLUS

S1 Smart Watch APPS GUIDE. Models: S1, S1C & S1 PLUS S1 Smart Watch APPS GUIDE Models: S1, S1C & S1 PLUS SETTINGS The settings app in the S1 allows you to make adjustments on all local settings on the watch. You can change the look of the screen, sound and

More information

Perslink Security. Perslink Security. Eleonora Petridou Pascal Cuylaerts. System And Network Engineering University of Amsterdam.

Perslink Security. Perslink Security. Eleonora Petridou Pascal Cuylaerts. System And Network Engineering University of Amsterdam. Eleonora Petridou Pascal Cuylaerts System And Network Engineering University of Amsterdam June 30, 2011 Outline Research question About Perslink Approach Manual inspection Automated tests Vulnerabilities

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

How to (not) Share a Password:

How to (not) Share a Password: How to (not) Share a Password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor Benny Pinkas Eyal Ronen Passwords First modern use in MIT's CTSS (1961) Passwords

More information

Developing an End-to-End Secure Chat Application

Developing an End-to-End Secure Chat Application 108 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017 Developing an End-to-End Secure Chat Application Noor Sabah, Jamal M. Kadhim and Ban N. Dhannoon Department

More information

Identification Schemes

Identification Schemes Identification Schemes Lecture Outline Identification schemes passwords one-time passwords challenge-response zero knowledge proof protocols Authentication Data source authentication (message authentication):

More information

Securing Office 365 & Other SaaS

Securing Office 365 & Other SaaS Securing Office 365 & Other SaaS PrecisionAccess Vidder, Inc. Securing Office 365 & Other SaaS 1 Executive Summary Securing Office 365 means securing Email, SharePoint, OneDrive, and a number of other

More information

Skype for Business for Android

Skype for Business for Android Skype for Business for Android November 2015 Topics in this guide include: Joining meetings Updating availability status Managing contacts Having conversations Customizing your settings For more information

More information

MASS PERSONALIZATION HOW TO KEEP A HUMAN TOUCH WITH CHATBOTS? C H A T B O T A G E N C Y TALK-A-BOT

MASS PERSONALIZATION HOW TO KEEP A HUMAN TOUCH WITH CHATBOTS? C H A T B O T A G E N C Y TALK-A-BOT MASS PERSONALIZATION HOW TO KEEP A HUMAN TOUCH WITH CHATBOTS? C H A T B O T A G E N C Y TALK-A-BOT TALK-A-BOT was founded in August 2016 the first Chatbot Agency of the CEE region We are online Top 4 downloaded

More information

Security Issues In Mobile IP

Security Issues In Mobile IP Security Issues In Mobile IP Zhang Chao Tsinghua University Electronic Engineering 1 OUTLINE 1.Introduction 2.Typical threats 3. Mobile IPv6 and new threats 4.Open issues 2 OUTLINE 1.Introduction 2.Typical

More information

Protecting High Value Domains

Protecting High Value Domains Protecting High Value Domains SSAC Public Meeting ICANN Cairo 2008 1 What is a high value domain? Working definition: high value domain (HVD) One or a set of names which define an organization's online

More information

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices W I S S E N T E C H N I K L E I D E N S C H A F T PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices IAIK, Graz University of Technology, Austria www.iaik.tugraz.at 2 Outline Introduction

More information

EEH Mobile Interface. NC State University Senior Design Project. April 22, Laura Owczarski Joseph Jarriel

EEH Mobile Interface. NC State University Senior Design Project. April 22, Laura Owczarski Joseph Jarriel EEH Mobile Interface NC State University Senior Design Project Laura Owczarski leowczar@ncsu.edu Joseph Jarriel jmjarrie@ncsu.edu April 22, 2016 Daniel Defisher dedefish@ncsu.edu Soumil Verma sverma2@ncsu.edu

More information

Skype Instructions For Samsung Galaxy S3 Apps

Skype Instructions For Samsung Galaxy S3 Apps Skype Instructions For Samsung Galaxy S3 Apps And Games 8 Parts: How to Clear the Cache on Your Samsung Galaxy S3 Clearing the History on Your Tap the Apps icon located on the lower right corner of your

More information

Cracked Spyphone - 1 Month free software sites full-version ]

Cracked Spyphone - 1 Month free software sites full-version ] Cracked Spyphone - 1 Month free software sites full-version ] Description: A ton of advanced technology in a single spy application. Spyera is powerful than ever! Live Call Listening Listen in to live

More information

Login as Commander Enter Commaner Username Here 2. Enter Password Here 3. Press Login to Login as Commander

Login as Commander Enter Commaner Username Here 2. Enter Password Here 3. Press Login to Login as Commander Login as Commander https://raptorsecuritysoftware.com/ 2 3. Enter Commaner Username Here 2. Enter Password Here 3. Press Login to Login as Commander 4 After Login This Screen Will Show 4. To Create Agent

More information

Wireless Independence Now! An Educational Workshop reviewing accessibility features on: Smartphones Phablets Tablets

Wireless Independence Now! An Educational Workshop reviewing accessibility features on: Smartphones Phablets Tablets Wireless Independence Now! An Educational Workshop reviewing accessibility features on: Smartphones Phablets Tablets 1 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all

More information

ACN Companion Application Frequently Asked Questions

ACN Companion Application Frequently Asked Questions ACN Companion Application Frequently Asked Questions Contents USING THE ACN COMPANION APP... 2 GENERAL GUIDELINES... 2 PLACING/ RECEIVING CALLS... 4 FEATURES... 6 TROUBLE-SHOOTING... 7 OTHER... 8 Using

More information

Last mile authentication problem

Last mile authentication problem Last mile authentication problem Exploiting the missing link in end-to-end secure communication DEF CON 26 Our team Sid Rao Doctoral Candidate Aalto University Finland Thanh Bui Doctoral Candidate Aalto

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

SECURE COMMUNICATIONS: PAST, PRESENT, FUTURE

SECURE COMMUNICATIONS: PAST, PRESENT, FUTURE SECURE COMMUNICATIONS: PAST, PRESENT, FUTURE Jean-Philippe Aumasson P U B L I C THE SPEAKER PhD in cryptography from EPFL & FHNW, 2009 Principal Cryptographer at Kudelski Security Designed popular algorithms:

More information

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus 1 60 Second AWS Security Review 2 AWS Terminology Identity and Access Management (IAM) - AWS Security Service to manage

More information

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking

More information

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<<

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<< Iphone Setting Privacy Microphone Viber Set To On In privacy setting i don't find facetime accessing microphone. iphone 4S Again while using viber, if I set it to loud speaker, rare end doesn't hear my

More information

Skype Instructions For Samsung Galaxy S2 Users

Skype Instructions For Samsung Galaxy S2 Users Skype Instructions For Samsung Galaxy S2 Users Android. Asus Memo Pad 7, Asus ZenFone 5, Huawei Honor 6, Lenovo A10-70 Samsung Galaxy Note Pro 12.2, Samsung Galaxy S2 Plus, Samsung Galaxy S3 The above

More information

USER PERCEPTION OF DELETING INSTANT MESSAGES EuroUSEC 18, London, UK, 23 April 2018

USER PERCEPTION OF DELETING INSTANT MESSAGES EuroUSEC 18, London, UK, 23 April 2018 OVERVIEW Instant Messaging New WhatsApp feature introduced October 2017 Delete messages for everyone Do users delete messages? How do other messengers do this? Do users know what happens? What do users

More information

End-to-End Measurements of Spoofing Attacks. Hang Hu, Gang Wang Computer Science, Virginia Tech

End-to-End Measurements of  Spoofing Attacks. Hang Hu, Gang Wang Computer Science, Virginia Tech End-to-End Measurements of Email Spoofing Attacks Hang Hu, Gang Wang hanghu@vt.edu Computer Science, Virginia Tech Spear Phishing is a Big Threat Spear phishing: targeted phishing attack, often involves

More information

What is Skype for Business?

What is Skype for Business? What is Skype for? Skype for is the secure collaboration tool that enables you to send instant messages to colleagues using NHSmail both inside and outside of your organisation The tool also provides you

More information

How to (not) Share a Password:

How to (not) Share a Password: How to (not) Share a Password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor Benny Pinkas Eyal Ronen Passwords First modern use in MIT's CTSS (1961) Passwords

More information

Brosix vs. Skype for Business

Brosix vs. Skype for Business Brosix vs. Skype for Business COMPARISON REPORT BROSIX WEB CONTROL BROSIX FEATURES SKYPE FOR BUSINESS PRICING MODELS Brosix and Skype for Business are two of the most popular enterprise instant messaging

More information

S1 Smart Watch APPS GUIDE. Models: S1, S1C & S1 PLUS

S1 Smart Watch APPS GUIDE. Models: S1, S1C & S1 PLUS S1 Smart Watch APPS GUIDE Models: S1, S1C & S1 PLUS SETTINGS The settings app in the S1 allows you to make adjustments on all local settings on the watch. You can change the look of the screen, sound and

More information

Chrome Extension Security Architecture

Chrome Extension Security Architecture Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture

More information

Volume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies I. INTRODUCTION

Volume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies I. INTRODUCTION ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

Putting security first for critical online brand assets. cscdigitalbrand.services

Putting security first for critical online brand assets. cscdigitalbrand.services Putting security first for critical online brand assets cscdigitalbrand.services 2 As the most security conscious digital brand service provider, our clients trust us to take care of their businesses and

More information

MAN-IN-THE-MACHINE: EXPLOIT ILL-SECURE COMMUNICATION INSIDE THE COMPUTER

MAN-IN-THE-MACHINE: EXPLOIT ILL-SECURE COMMUNICATION INSIDE THE COMPUTER MAN-IN-THE-MACHINE: EXPLOIT ILL-SECURE COMMUNICATION INSIDE THE COMPUTER Thanh Bui*, Siddharth Rao*, Markku Antikainen, Viswanathan Bojan*, Tuomas Aura* *Aalto University, Finland University of Helsinki,

More information

MOBILE SOUTH AFRICA REPORT 2017

MOBILE SOUTH AFRICA REPORT 2017 MOBILE SOUTH AFRICA REPORT 2017 OVERVIEW In 2016, almost 70% of South Africans browsed the web on their mobile. From 2015, this was an increase of 15% - mobile is, and should be, top of mind for the digital

More information

Social Sharing in the Mobile World. January 2017

Social Sharing in the Mobile World. January 2017 Social Sharing in the Mobile World January 2017 Survey Methodology: 1571 interviews (online) Adults 18-54 811 men; 760 women Interviews conducted 1/12/17 1/18/17 All respondents own a smartphone Data weighted

More information

Introduction...1. Authentication Methods...1. Classes of Attacks on Authentication Mechanisms...4. Security Analysis of Authentication Mechanisms...

Introduction...1. Authentication Methods...1. Classes of Attacks on Authentication Mechanisms...4. Security Analysis of Authentication Mechanisms... WHITE PAPER A Security Survey of Strong Authentication Technologies Contents Introduction...1 Authentication Methods...1 Classes of Attacks on Authentication Mechanisms...4 Security Analysis of Authentication

More information

Personalized Mobile Application Discovery

Personalized Mobile Application Discovery Personalized Mobile Application Discovery Bo Yan and Guanling Chen Department of Computer Science University of Massachusetts Lowell How to Find Apps Search by keywords or browse by categories Personalized

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/

More information

Pass, No Record: An Android Password Manager

Pass, No Record: An Android Password Manager Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server

More information

& Cross-Channel Customer Engagement RFP Guide

& Cross-Channel Customer Engagement RFP Guide Email & Cross-Channel Customer Engagement RFP Guide Customer Engagement in a Perpetually Connected World Today s perpetually connected customer is interacting with your brand through digital, mobile &

More information

User Guide: Adding a Device in Duo and Managing Settings

User Guide: Adding a Device in Duo and Managing Settings User Guide: Adding a Device in Duo and Managing Settings The Duo Mobile application provides an extra layer of security when it is incorporated into the login process for applications or web sites such

More information

Remote Desktop Security for the SMB

Remote Desktop Security for the SMB A BWW Media Group Brand Petri Webinar Brief October 5th, 2018 Remote Desktop Security for the SMB Presenter: Michael Otey Moderator: Brad Sams, Petri IT Knowledgebase, Executive Editor at Petri.com There

More information

Skype for Business for ios

Skype for Business for ios Skype for Business for ios Skype for Business for ios is a productivity app that brings Skype Meetings, presence, instant messaging (IM), voice, and video capabilities to your ios mobile device. It has

More information

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the

More information

CounterPath Bria Stretto Solution. Solution Brief.

CounterPath Bria Stretto Solution. Solution Brief. Solution Brief Introduction Bria Stretto TM is CounterPath s off-the-shelf softphone solution for enterprise customers, to complement the enterprise s existing VoIP service. Bria Stretto combines CounterPath

More information

SDR Guide to Complete the SDR

SDR Guide to Complete the SDR I. General Information You must list the Yale Servers & if Virtual their host Business Associate Agreement (BAA ) in place. Required for the new HIPAA rules Contract questions are critical if using 3 Lock

More information

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS SESSION ID: MBS-W04 THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS Nadir Izrael CTO & Co-Founder Armis, Inc. Ben Seri Head of Research Armis, Inc. Placeholder Slide: Image of spread of infection Placeholder

More information

Usable Security Introduction to User Authentication and Human Interaction Proof Research

Usable Security Introduction to User Authentication and Human Interaction Proof Research Usable Security Introduction to User Authentication and Human Interaction Proof Research Argyris C. Constantinides PhD Student Department of Computer Science University of Cyprus 1 Agenda Introduction

More information

SMS and MMS Messaging

SMS and MMS Messaging 301 Chapter 11 SMS and MMS Messaging SMS stands for Short Messaging Service and it is commonly referred to as Text Messaging. Text messages are usually limited to 160 characters and are a great way to

More information

User SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to!

User SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to! User SIM Guide Hello Thanks for purchasing & welcome to SimsDirect! This guide is here to help you use your SIM while traveling. Contact us We are responsive between 10AM-6PM AEST. @m.me/simsdirect @SimsDirect

More information

Intel Analysis of Speculative Execution Side Channels

Intel Analysis of Speculative Execution Side Channels Intel Analysis of Speculative Execution Side Channels White Paper Revision 1.0 January 2018 Document Number: 336983-001 Intel technologies features and benefits depend on system configuration and may require

More information

Step by step guide to two-factor authentication in MYOB Advanced

Step by step guide to two-factor authentication in MYOB Advanced Step by step guide to two-factor authentication in MYOB Advanced September 2018 Version no. 1.0 Table of Contents Introduction... 3 Registration... 4 Standard registration process... 4 Two-factor authentication

More information

Video and Audio Communication

Video and Audio Communication Skype - making video and phone conversations If you don't already have Skype on your PC, use the Microsoft Store to locate Skype and install it. Allow the install to access your camera and microphone when

More information

The most extensive identity protection plan available

The most extensive identity protection plan available The most extensive identity protection plan available AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A Sharing data is now a fact of daily life. Our work requires personal

More information

Mobile Banking Release August 8, 2016

Mobile Banking Release August 8, 2016 Please update your Presidio Mobile Banking app in the app store to version 5.2 in order for the following new features to be available on your device. Although our targeted live date is scheduled for Monday,

More information

Applications. View All Applications. . Inbox

Applications. View All Applications.  . Inbox View All, page 1 Email, page 1 Jabber, page 7 Meetings, page 11 People, page 14 WebEx, page 20 More, page 23 View All Tap to display all installed applications. Email The Email application allows you to

More information

Applications. View All Applications. People. Contact Details

Applications. View All Applications. People. Contact Details View All, page 1 People, page 1 Email, page 7 Jabber, page 13 Meetings, page 17 WebEx, page 20 More, page 24 View All Tap to display all installed applications. People Use the People application to store,

More information

CHAPTER NINE. Messaging and texting. Introduction. Messaging is accessible

CHAPTER NINE. Messaging and texting. Introduction. Messaging is accessible Faughnan / SPHONE4ALL / 1 CHAPTER NINE Messaging and texting Introduction When is package coming? Hi do you need me to snowblow driveway? Could you come to my room? We are watching duck dynasty. These

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

TRENDY PRO FITNESS TRACKER USER GUIDE

TRENDY PRO FITNESS TRACKER USER GUIDE 2017 TRENDY PRO FITNESS TRACKER USER GUIDE Page1 Charging your TRENDY PRO Fitness Tracker Hold the tracker with both hands by the bracelet, pull the band that s next to the Touch key to reveal 2 gold strips.

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

Imprivata ID Enrollment Instructions iphone instructions

Imprivata ID Enrollment Instructions iphone instructions Imprivata ID Enrollment Instructions iphone instructions Imprivata ID is the system EvergreenHealth uses to provide an extra layer of security in addition to username/password when logging in remotely

More information

IVM 4. Audio Presets Details SST 4. AKG Acoustics 2008

IVM 4. Audio Presets Details SST 4. AKG Acoustics 2008 IVM 4 Audio Presets Details SST 4 AKG Acoustics 2008 2 COMPRESSOR All COMPRESSOR Presets have one GOAL: Create a precise and well-balanced monitoring level by maintaining all sound nuances and a natural

More information

Protecting Against Online Banking Fraud with F5

Protecting Against Online Banking Fraud with F5 Protecting Against Online Banking Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware,

More information

New Paradigms of Digital Identity:

New Paradigms of Digital Identity: A Telefonica White Paper New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) February 2016 1. Introduction The concept of identity has always been the key factor

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

Double up on security for Active Directory and cloud app authentication

Double up on security for Active Directory and cloud app authentication Double up on security for Active Directory and cloud app authentication user name Login Introduction Although information technology has come a long way over the past couple decades, the digital identities

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

2.8" QUICK START GUIDE 4044V. rd ④. Removing or installing the back cover. Removing or installing battery. Charging the battery.

2.8 QUICK START GUIDE 4044V. rd ④. Removing or installing the back cover. Removing or installing battery. Charging the battery. ① Removing or installing the back cover. QUICK START GUIDE ② 2.8" Removing or installing battery. Charging the battery. SIM ③ ca rd ④ SD ca ⑤ rd To insert a SIM or MicroSD card, push the SIM or MicroSD

More information

Infinite Convergence Mobile Messaging Study Findings Sheet

Infinite Convergence Mobile Messaging Study Findings Sheet Infinite Convergence Mobile Messaging Study Findings Sheet 1 Methodology: Infinite Convergence Solutions completed this study to provide enterprises in the financial, healthcare, retail and legal industries

More information

Hallo iphone Edition User Guide

Hallo iphone Edition User Guide Hallo iphone Edition User Guide 1 About Hallo iphone Edition Hallo iphone Edition is a SIP-based phone for the Apple iphone mobile digital device. With Hallo iphone Edition (Hallo), you can use the Wi-Fi

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Give Me Letters 2, 3 and 6! Partial Password Implementations and Attacks

Give Me Letters 2, 3 and 6! Partial Password Implementations and Attacks Give Me Letters 2, 3 and 6! Partial Password Implementations and Attacks David Aspinall, University of Edinburgh, UK Mike Just, Glasgow Caledonian University, UK Financial Cryptography and Data Security,

More information

Mobile Messaging Apps Study : India. August 2014

Mobile Messaging Apps Study : India. August 2014 Mobile Messaging Apps Study : India August 2014 Contents 1. Research Objectives & Methodology 2. Key Findings 3. Mobile Consumption Behavior 4. Message Apps Usage & Behaviors Download Intent App Awareness

More information