TribLIVE

| Business


 
Larger text Larger text Smaller text Smaller text | Order Photo Reprints

Evernote hacking spawns new security standards

By The Los Angeles Times
Friday, June 21, 2013, 12:01 a.m.
 

In late February, a thief or thieves cracked into Evernote's digital vault filled with log-ins, passwords and email addresses belonging to 50 million users. It was a shocking cyberattack considering the Redwood City, Calif., company offers online lockers for people to safely store their files.

With its reputation on the line, the company quickly developed a security feature that may become the standard procedure for accessing online accounts: demanding two digital keys to gain entrance.

After inputting their passwords, Evernote customers who have opted to use the two-step feature must wait until the company sends a security code to their cellphones. Users must type in this additional code to gain access to their accounts.

Banks and other financial institutions have long had double-layered protection (i.e. asking a preset personal question such as “What was the name of your first pet?”). But a recent spate of major cyberattacks that have exposed hundreds of millions of personal accounts to hackers is increasing pressure on nonfinancial Web services to fortify their digital doors beyond a single password.

That's fueling a booming industry. Researchers are experimenting with futuristic electronics that are wearable or even digestible. And companies are working on making existing products harder to crack. Efforts include equipping smartphones and USB sticks with fingerprint scanners to identify users and developing keyboards that recognize an individual's touch.

Some of these technologies could take years to hit the market, if ever. Still, many in the industry say two-step authentication eventually will become as routine as brushing teeth.

Apple, Twitter, LinkedIn, Facebook, Dropbox, Microsoft, Yahoo and Google all offer some form of two-step verification. Typically, users can opt to receive the security code either through a text message or a smartphone application.

Getting consumers to take advantage of this extra security is another matter. At present, customers of these firms must voluntarily sign up to use the two-step verification. None of the companies would say how many of their users have opted in, but security experts said the numbers are probably small.

Although many people are willing to endure extra security to access computer systems for their jobs or to protect their banking or health insurance information, going through an extra layer to use social media or email is a hassle, said John Chuang, an information professor at the University of California-Berkeley.

“If I'm an employee and I need it to get my work done, I'm going to do it,” Chuang said. “Logging into Linked-In, that's a different calculus.”

Still, Google security engineer Mayank Upadhyay predicts users will become more accustomed to text-messaged codes as more companies offer the feature.

“The more people who have it, the faster the next set of people are enrolling in it because they've been told about it by friends,” he said.

Google is speeding ahead developing what it considers more secure and usable methods of two-step verification that could catch on with users.

By the end of this year, Google expects to have a limited number of users testing a USB thumb drive that could be used like a key. Users would first have to enter their personal identification number on the device before using it. When plugged into the computer, the USB stick would automatically log users into Google and other websites.

Google is part of an industry alliance trying to get more websites and technology companies to use the same security standards. The alliance's goal is to let users use any device of their choice, whether it's the USB stick, a phone with a special chip or a laptop with a fingerprint scanner.

Companies that manufacture the USB keys could choose to offer a fingerprint scanner or some other technology as a bonus. Users may scan their fingerprint once every morning to unlock their online life. A new scan and a PIN entry could be required before any financial transaction.

Mike DiPasquale, chief executive of fingerprint technology provider Bio-Key, said he expects fingerprint scanners to become a standard feature on phones because the technology costs just $2 a device. Mobile devices could also validate based on location, voice, touch or other biometrics.

DiPasquale said handset makers are realizing that smartphones and tablets are becoming a platform for every type of transaction.

“If security starts to fail, the whole premise behind e-banking, e-payments and e-commerce will come to a screeching halt,” he said.

 

 
 


Show commenting policy

Most-Read Business Headlines

  1. Western Pa. unemployment rate holds steady in August
  2. Cranberry-based Prodigo Solutions: Hospitals can reduce high supply costs
  3. With acquisition, PNC set to enter IPO market
  4. NHTSA probes sudden acceleration complaints in Toyota Corollas
  5. Consumer spending climbs as job gains boost incomes
  6. Another card system hack at Supervalu, Albertsons
  7. Allegheny Health Network expands women’s services in competition with UPMC
  8. Columbia Gas parent to spin off pipeline operations
  9. Stocks decline on overseas political troubles
  10. Airmall thriving despite fewer flyers at Pittsburgh International Airport
  11. Study: Wellness programs don't save money, but employee health improves
Subscribe today! Click here for our subscription offers.