authentication
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094518/email-400x200.jpg)
3.4 billion fake emails are sent around the world every day
At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because …
![payments](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100545/payments-400x200.jpeg)
Will biometrics replace passwords for online payment authentication?
Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, …
![Sign in with Apple](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094207/sign-in-with-apple-400x200.jpg)
Apple debuts privacy-minded “Sign in with Apple” SSO
Among the many news shared during Apple’s annual developer conference there’s one that stands out: the introduction of “Sign in with Apple”. About the …
![see](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100214/see-400x200.jpg)
Researchers spot manipulated photos and video using AI-driven imaging system
To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies
Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …
![Google Titan](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094306/google-titan-key-400x200.jpg)
Google offers free replacement for buggy Titan Security Keys
Misconfigured Bluetooth pairing protocols in Google’s Titan Security Keys may allow attackers to communicate with users’ security key or with the device their key …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
PSD2 and strong customer authentication: Are all elements equal?
The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094752/laptop-400x200.jpg)
Cybercriminals thriving on companies overlooking fundamental security requirements
IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Consumers increasingly deploying biometrics as PINs and passwords continue to fail
The UK is ready to fight fraud with biometrics, according to new research revealed by Nuance on World Password Day. The new research carried out by OnePoll asked 1,000 adults …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
How password-less security benefits helpdesks
IT departments and helpdesk teams are desperately overworked and understaffed, and unfortunately, they continue to get inundated with even more tasks. Helpdesk teams are there …
![iovation MFA](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094648/iovation-400x200.jpg)
Securing your app and driving down call center fraud
In this Help Net Security podcast, Angie White, Product Marketing Manager at iovation, talks about how optimizing the customer journey through your mobile app can help you …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
85% of organizations fail to meet even basic PAM security hygiene
While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access …