Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label FIDO. Show all posts

CISA's Enhanced Mobile Security Recommendations Following U.S. Telecom Breach

 



The Cybersecurity and Infrastructure Security Agency (CISA) issued updated recommendations in December 2024 aimed at enhancing mobile phone cybersecurity. Following a significant hack involving major U.S. telecom companies like AT&T, Verizon, and Lumen Technologies, these guidelines focus on adopting more secure multifactor authentication (MFA) methods. 
  
Understanding MFA and Its Vulnerabilities 
 
Multifactor authentication (MFA) is a popular cybersecurity measure requiring users to provide additional verification beyond a password. Common practices include:
  • Text Message Verification: Receiving a one-time code via SMS.
  • Device-Based Approvals: Confirming login attempts on associated devices.
However, CISA has raised concerns about the vulnerability of certain MFA techniques, particularly text-based verification. Text message-based MFA, while convenient, is susceptible to interception by hackers. 

The breach highlighted flaws in text messaging systems, particularly when messages were sent between incompatible platforms like Android and iPhone. Malicious actors exploited these weaknesses to intercept authentication codes and gain unauthorized access to user accounts. While CISA continues to advocate for MFA, it strongly urges users to shift away from text-based methods. 

  
Recommendations for Safer Alternatives 

 
CISA recommends adopting authenticator apps as a more secure MFA option. These apps generate time-sensitive codes that operate independently of messaging systems, making them less prone to interception. However, they remain vulnerable to phishing attacks, where users may be tricked into revealing sensitive information. 

For users seeking the most secure MFA solution, CISA suggests transitioning to phishing-resistant methods like the FIDO (Fast Identity Online) protocol. Developed by the FIDO Alliance, this technology eliminates traditional passwords and uses:
  • Digital Passkeys: Unique codes linked to user accounts.
  • Physical USB Devices: Hardware keys that connect to computers.
The FIDO protocol also supports PINs and biometric identifiers like fingerprints and facial recognition, providing a robust defense against phishing attempts. 

CISA’s latest recommendations highlight the growing need for stronger cybersecurity measures. By moving away from text-based MFA and adopting secure alternatives like authenticator apps and the FIDO protocol, users can better protect their personal information and maintain digital security in an increasingly interconnected world.

Passkeys: Your Safe Vault for Data Security


Passwords need to be fixed. They're difficult to remember and simple to guess, and protecting them from threat actors is a hassle. To take care of this issue, the Fast Identity Online Alliance (FIDO) created passkeys, a type of passwordless authentication tech. Passkeys take out the need to enter your email address or secret key into login handles around the web, making it harder for threat actors to take your credentials and get into your data.

What is a Passkey?

A passkey is a way of signing in to applications and sites without using a username and secret word mix. It's a couple of cryptography keys created by your gadget. Public and confidential keys squeeze to make a passkey that opens your record. Applications or sites store your unique public key. Your confidential key is just put away on your device, and after your device authenticates your identity, the two keys join to allow you to log in to your record.

Advantages of Passkeys

Passkeys have a lot of advantages; for instance, they can't be assumed or shared. Passkeys are safe from phishing attempts since they're unknown to the destinations they're made for, so they won't chip away at fake carbon copy locations. In particular, if your info is ever leaked, your passkeys can't be taken by hacking into an organization's server or data set, making the information taken out in such hacks less important to threat actors

The most effective method to Get Passkeys

Passkeys are one of a kind to each application or site and are put away in a secret phrase director's vault or your device’s keychain. Normally, the device or programming producing the passkeys uses a biometric verification instrument, like FaceID or TouchID, to confirm your identity. On the off chance that a secret hint is the passkey source, you can sign in to the application using areas of strength for a secret word rather than biometric verification.

Passkeys: Where can we use them?

Many websites, including Best Buy, eBay, Google, Kayak, and PayPal, support passkeys. 1Password, a password management company, has a community site where users may report websites that allow passkey logins. Some of the sites on that list still require a standard username and password for initial account creation and logins, such as Adobe.com, but you can set up a passkey to use for future logins by accessing the Settings menu.