Skip to main content

Posts

Showing posts from July, 2021

Bypassing Windows Face Recognition without being a Shapeshifter

Biometric authentication has seen rapid adoption by users all across the globe due to fewer security risks and faster response. A password less approach alleviates a diverse number of security risks. One of the most embraced password less authentication approaches is Windows Hello, which lets the user log in password less through pin code, fingerprint, or facial recognition. According to Microsoft around 84.7 percent of Windows 10 users use Hello to login into their systems. Each person has a unique biometric so without plastic surgery, it would be impossible to use someone else’s system with a biometric authentication enabled thus, making it one of the best security options or so was thought until recently. CyberArk Labs research team has been exploring potential vulnerabilities in systems using Windows Hello to strengthen the future of biometric security. The result was the discovery of a security flaw with a CVE of 5.7 which allows a cyber attacker to bypass Windows Hello’s facial r...

Cyber Surakshit Bharat: An initiative towards strengthening cybersecurity

With the advancement in the Digital field and human subsistence has been inclined towards the digital world, which has led to the emergence of a paramount question that is Cyber Security and Privacy of an active cyberspace user. Thus, to build a reliable cyber-secure world for Indian Citizens Ministry of Information and Technology (MeitY) in association with NeGD has launched a Private-Public Sector Partnership imitative in 2018 which is known as CYBER SURAKSHIT BHARAT INITIATIVE. This initiative of Cyber Surakshit Bharat has been launched with a vision to strengthen the cyber-security ecosystem of India as it would also encourage Citizens to shift towards Digitalization from the old school approach of paperwork. The intent behind the Cyber Surakshit Bharat initiative The intent behind the launch of the Cyber-Surakshit Bharat Initiative is to ensure awareness amongst and across government departments about cybercrime, and adequate safety measures for ‘chief Information Security Office...

Implications of The Information Technology (Intermediary Guidelines & Digital Media Ethics Code) Rules, 2021

  On 25 th February 2021, the Ministry of Electronics and Information Technology released the notification of the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 in supersession of the Information Technology (Intermediaries Guidelines) Rules, 2011. What does the law say? The new rules have differentiated between the ‘social media intermediary’ and ‘significant social media intermediary.’ Significant social media intermediaries are the ones with more than 5 million users and they have to observe additional due diligence according to the new rules. Observance of due diligence entails that such intermediaries have to publish their rules and regulations, privacy policy and user agreement for access or usage of its computer resource by any person on its website or mobile-based application or both. The users must be informed about the prohibited content. Also, such prohibited information must not be hosted, stored or published by the intermedia...

Backdoor Tracking - End to Fundamental User Privacy?

  Privacy in today's cyber world is an essential aspect of life but the right to privacy has been under attack internationally in recent years, as seen by the fact that encryption technology faced various challenges throughout the world in 2020 alone. From the proposal of a bill in the United States Senate requiring a bypass in any encryption technology to the suspension of ProtonMail in Russia. India is no exception to this trend, with the introduction of Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 which proposes to make the tracing of content mandatory that is shared on social media. This could mean the decline of end-to-end encryption.  Traceability- an end to encryption Tracking and Monitoring the data has been going on since the inception of controversial section 5 of the Indian Telegraph Act, 1885, which sanctioned interception and monitoring of communication.  Section 69 of the Information Technology Act of 2000 previo...

Pegasus Spyware: Everything one should know

  Pegasus is a world-leading cyber intelligence technology that allows law enforcement and intelligence organizations to extract critical information from almost any mobile device remotely and surreptitiously. Veterans of top intelligence agencies created this mind-blowing technology to provide governments with a means to deal with today's highly dynamic cyber battlefield's new communications interception problems. Pegasus bridges a significant technological gap by collecting new data from mobile devices to provide the most precise and comprehensive data for security operations. The Root of Pegasus Spyware Pegasus spyware first acquired the limelight in 2019 when various WhatsApp users, including journalists, activists, academics, and even lawyers, became Pegasus spyware victims. People allege that the government is carrying out pre-planned cyber-attacks. The conventional argument is that the spyware was created by an Israeli cyber tech company, NSO Group and sold to different ...

The Ubiquitous Facial Recognition System

1.1 Taylor Swift using Facial Recognition for Safety   The world is familiar with Swift and her number of known stalkers but did you know Taylor fought them off using facial recognition? According to Rolling Stone, during her shows, images taken from kiosks (stand-alone booth to take pictures and other services) were sent back to a command post, back in Nashville where they cross-referenced a database of people who had been identified as potential stalkers who’ve harmed the pop star in previous stadiums and concerts using facial recognition. This system uses biometrics to map facial features from a photograph or video and then compares the information with a database of known faces to find a match hence can effectively help verify personal identity, yes-Face Detection! Breaking down the science behind biometric symmetry, in about 100 words! 1.2 Facial recognition can identify people by measuring distinguishable features on the face 1.3 Key Facial Features for Detection Step 1 . A ...