Ancestry.com now holds the genetic code of more than five million people — the largest private database of DNA in corporate history. The firm says it has state-of-the-art security systems in place to prevent hacking and security breaches of its genetic database. However, a three-month investigation has uncovered a pattern of ‘breached promises to customers’ and security concerns, according to a news report in today’s Daily Mail.
Last year, cyber criminals managed to infiltrate RootsWeb, which is owned and operated by Ancestry. The hackers stole the login details of aorund 55,000 Ancestry customers who used the same email and password combination on RootsWeb. Ryan Wilk, Vice President at NuData Security commented below.
“Bad actors are constantly trying to engineer new ways of bypassing security measures; however, two-factor authentication still offers stronger security than the classic one-factor authentication. To avoid account takeovers with stolen username and passwords, two-factor authentication can be combined with other security layers such as passive biometrics and behavioral analytics, so that if one layer fails or is not reliable, another layer of security takes over, protecting the customers’ accounts even if the credentials have been stolen. While two-factor authentication can help verify that the user has the correct device, behavioural analytics, and passive biometrics allow you to learn and trust the user’s behavior both in and across the session. This way you put the trust on the human instead of the device. With passive biometrics, customers are identified by their behaviour online and not by static data such as passwords or one-time codes. This inherent behaviour cannot be duplicated by hackers, even if they use correct static data, devaluing stolen credentials and protecting the customer account.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.