{"id":6205,"date":"2015-09-09T08:52:41","date_gmt":"2015-09-09T12:52:41","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6205"},"modified":"2019-11-22T10:12:53","modified_gmt":"2019-11-22T10:12:53","slug":"ifa15-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/ifa15-security\/6205\/","title":{"rendered":"IFA 2015: security all the go"},"content":{"rendered":"<p>The new trend on IFA 2015 \u2014 a trade show for consumer electronics \u2014 is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they are making connections between our everyday life and technology.<\/p>\n<p>For example, during a presentation from Kaspersky Lab, <a href=\"http:\/\/www.wired.co.uk\/news\/archive\/2015-09\/03\/i-became-a-cyborg-at-ifa\" target=\"_blank\" rel=\"noopener nofollow\">a man had a chip installed in his body<\/a>. Now we carry gadgets on our wrists or in pockets, but in a few years, you\u2019ll see that under-skin chips being widespread.<\/p>\n<p>The Internet of Everything will take place of the Internet of Things (which is still very young though). In the global net every living being will have equal rights, as will a freezer or an iron.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"The internet of things may turn into the internet of everything\" <a href=\"https:\/\/twitter.com\/seancostigan?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@seancostigan<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/KLcsd?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KLcsd<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/481408827615903744?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 24, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This description can sound creepy, especially for fans of the \u2018Matrix\u2019 movie trilogy or for those who are familiar with the anti-utopia literature genre. And not without a reason: existing solutions are not secure enough. The pioneering software has numerous holes, which can be exploited by hackers for many reasons, including identity theft.<\/p>\n<div id=\"attachment_6208\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/09\/05194859\/ifa15-bionicman.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6208\" class=\"size-large wp-image-6208\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/09\/05194859\/ifa15-bionicman-1024x672.jpg\" alt=\"Rainer Bock \u2014 the third BionicMan in Kaspersky Lab\" width=\"1024\" height=\"672\"><\/a><p id=\"caption-attachment-6208\" class=\"wp-caption-text\">Rainer Bock \u2014 the third <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/bionicmandiary\" target=\"_blank\" rel=\"noopener nofollow\">BionicMan<\/a> in Kaspersky Lab<\/p><\/div>\n<p>The data stored in current chips are protected by a 4-digit PIN, which means that it is very easy to hack it. Implanted chips have a humble performance (e.g., you can store only about 880 bytes of data). This also makes it significantly harder to protect them.<\/p>\n<p>Of course, the best security is enabled by the action radius \u2013 roughly about 5 cm. A hacker would need to get really close to you to steal your data. But that\u2019s a temporary limitation: when chips spread further, a criminal will be able go to a subway and harvest an upscale number of people\u2019s\u2019 IDS.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What purpose does a biochip serve? Read more from <a href=\"https:\/\/twitter.com\/hashtag\/BionicManDiary?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BionicManDiary<\/a> <a href=\"http:\/\/t.co\/i0cKRrW1Ld\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/i0cKRrW1Ld<\/a> <a href=\"http:\/\/t.co\/A7kPRYlICs\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/A7kPRYlICs<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/612995702797545472?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In the mean time smartphone manufacturers have adopted fingerprint sensor technology: this idea clearly sparks the imagination of market players, as now even B-level devices (such as Chinese ZTE) are equipped with biometric sensors.<\/p>\n<p>New ways of using sensors are emerging. Earlier they did not work as an alternative for <a href=\"https:\/\/www.kaspersky.com\/blog\/multi-factor-authentication\/9669\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">password-free authentication<\/a>. When you failed to unlock your phone after a dozen tries, you had to enter your password any way \u2014 a commonplace situation, because first-generation sensors work was far from flawless.<\/p>\n<p>So we had a non-working toy, used for nothing but dubious additional protection. Then Apple rattled up the morass: the company presented the Apple Pay system (which is yet to gain popularity) together with an acceptable sensor, which enabled authentication for the new payment system.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hacking the <a href=\"https:\/\/twitter.com\/hashtag\/iPhone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iPhone<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Fingerprint?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Fingerprint<\/a> Scanner: Kaspersky Lab's <a href=\"https:\/\/twitter.com\/emm_david?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@emm_david<\/a> Explains <a href=\"http:\/\/t.co\/OO5eSGMaQK\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/OO5eSGMaQK<\/a> via <a href=\"https:\/\/twitter.com\/AP?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@AP<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/382580532070338561?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 24, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Now manufacturers compete inventing how to exploit a fingerprint image sensor innovatively. Huawei uses this technology in the Mate S model touch panels designed for image scrolling and call response. Sony implemented fingerprint authentication with the help of new ultrasound sensor Qualcomm SenseID (we\u2019ve already written about it in the MWC post), and supported Fido services as well.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/MWC2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#MWC2015<\/a>: four promising IT <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> trends <a href=\"https:\/\/t.co\/d9P5V0mEEA\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/d9P5V0mEEA<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/575447415853088768?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 11, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>No, not the FidoNet, but FIDO Alliance \u2014 group of companies, which develop an integral network for password-free authentication. It can be implied for payments, website authentication and all other actions which require your digital ID.<\/p>\n<p>FIDO uses the password-free UAF protocol (Universal Authentification Framework), which has a simple mechanism of work. While logging on, the system makes a link, which lets you use a gadget instead of a password; it also enables biometric authentication on a device, via a fingerprint, face or voice recognition, etc. You can also have mixed combinations of different factors for better security, because it would be hard for a criminal to fraud all biometric elements.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RT <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a>: <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Google<\/a> Joins FIDO Alliance Effort to Move Beyond <a href=\"https:\/\/twitter.com\/hashtag\/Passwords?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Passwords<\/a> \u2013 <a href=\"http:\/\/t.co\/Y1aZeBVH2P\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/Y1aZeBVH2P<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/327893635418972160?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 26, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>FIDO also uses the two-factor authentication solution U2X. It let\u2019s you use a simple four-digit PIN together with a hardware encryption module. No more you need to be linked to one device; instead you can use different devices with the help of a key, e.g., enabled as a USB-token or as an NFC-tag for mobile devices. And an implanted chip can be used as such tag.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Next step into #password-free era with new #biometrics standards #IFA15<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fma75&amp;text=Next+step+into+%23password-free+era+with+new+%23biometrics+standards+%23IFA15\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Then everything works as usual: two keys, private and public, are created. The first one is stored on a smartphone locally and is not sent to any third-party resource; the second key is used at authorization request. No passwords at al!<\/p>\n<p>It doesn\u2019t look like an innovation, but FIDO Alliance develops a common standard, which will be supported by all developers. Now this alliance includes more than 200 companies, including Visa, Mastercard, PayPal, Google, and Microsoft \u2014 so chances are high that this standard is the thing of the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab\u2019s observations from the trade show.<\/p>\n","protected":false},"author":540,"featured_media":6207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[1126,1127,842,930,1128,1129,636,770,434,43,192,394,97,1130,45,161],"class_list":{"0":"post-6205","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-biometrics","10":"tag-fingerprint-sensors","11":"tag-future","12":"tag-gadgets","13":"tag-ifa-2015","14":"tag-ifa15","15":"tag-internet-of-things","16":"tag-iot","17":"tag-mobile-devices","18":"tag-privacy","19":"tag-protection","20":"tag-qualcomm","21":"tag-security-2","22":"tag-senseid","23":"tag-smartphones","24":"tag-sony"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ifa15-security\/6205\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ifa15-security\/5940\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ifa15-security\/6152\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ifa15-security\/6787\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ifa15-security\/6573\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ifa15-security\/8812\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ifa15-security\/9763\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ifa15-security\/5658\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ifa15-security\/6125\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ifa15-security\/8836\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ifa15-security\/8812\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ifa15-security\/9763\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ifa15-security\/9763\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/biometrics\/","name":"biometrics"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/540"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6205"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6205\/revisions"}],"predecessor-version":[{"id":17865,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6205\/revisions\/17865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6207"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}