Apps Designed to Make Your Smartphone Safer

Blog Date:  3/23/2017
Author:  Ray Coulombe

Biometrics are a newer solution to an age old problem when it comes to cellphones. But using your fingerprint to unlock your phone is no longer a novelty. Have you thought about what happens when your fingerprints are stolen? When your photo is cloned?

Cyber security experts are trying new technology for cellphones and computer that actually recognize you from a variety of factors. Actually, your phone probably knows you better than you think.

In fact, the average smartphone has ten sensors measuring exact details about you, your habits and your location. Think: GPS, Bluetooth, Wi-Fi, a gyroscope, accelerometer, magnetometer and much more.

John Whaley, the chief executive of UnifyID, has a master’s degree in computer science from MIT and a doctorate from Standford. His start-up, UnifyID, is offering new authentication technology, that Whaley says can identify you after merely a few seconds of walking with a phone in your pocket. “We can tell what floor of a building you’re on,” he says in an interview with the News Observer. “We can tell if you are inside or outside of that building.”

Your smartphone knows the angle in which you hold your device, how much pressure you use, how much of your finger touches the sensor, your type speed, your swiping angles, what time you move around in the morning and more. “Once you combine a large number of these factors together, we can actually get to 99.999 percent accuracy about it being you versus not you,” Whaley said in the interview. “At that threshold, you can actually use this for authentication and you don’t have to use passwords anymore.”

But UnifyID isn’t the only company understanding your behavior on your phone. A professor at the University of Maryland helped create an app to determine when people are most vulnerable to cybercrime with their phones. The app, MADCAP, tracks your location and the apps you’re using to determine when and where you are when your phone is most susceptible to hacking.

The researcher’s goal is to “understand how folks apply security on their smartphones and to understand if we can nudge them to behave more security on their phones,” he said in an interview with University of Maryland newspaper. It turns out that most people don’t understand how public, unprotected Wi-Fi networks are unsafe, or that you can get a virus on your phone similar to a virus on your computer.

But more than just understand how we are vulnerable to cybercrime, Whaley and his team at UnifyID are providing ways to make it safer when we’re on any form of technology. What Whaley calls “implicit authentication” may change the way humans interact with all kinds of technology. Think: ATMs may recognize us as we approach by recognition through our cellphone.

Overall, Whaley says the downside to using biometrics in cyber security isn’t fully understood because of the gap between their perceived value and the true value. Fingerprints aren’t 100 percent secure! In fact, the Federal Office of Personnel Management was hacked in 2015, leaving 5.6 million people with stolen fingerprints. Ever seen a spy movie? Fingerprints can actually be lifted quite easily from glass doors, cups, and more. And, stealing biometrics isn’t like stealing passwords: You can’t change your fingerprints or your face—yet, you can change a password.

The difference with companies like UnifyID is that “implicit authentication,” where the user doesn’t actively verify his or her identity. Instead, the security is in the background always and the smartphone is taking constant data to test against the regular patterns of the user.

This is another form and interesting implementation of behavioral analytics, promising a more effective way to make your devices less susceptible to cybercrime.

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>