authentication
Adobe unveils cloud-based digital signature built on an open standard
With more than seven billion mobile devices in the world and cyber-threats at an all-time high, demand has surged for simple and secure ways to sign and manage documents on …
How a dynamic range of authentication can open doors for trusted customers
In this podcast recorded at RSA Conference 2017, Michael Thelander, Director of Product Marketing at iovation, talks about lessons learned from bringing authentication …
The time to fortify your organization against CNP fraud is now
When it comes to EMV (Europay, MasterCard and Visa) security chip adoption, the United States is the clear laggard. According to EMVCo, only 7.2% of “card present” …
UnifyID’s ingenious user authentication platform wins Innovation Sandbox Contest
A panel of venture capitalists, entrepreneurs and large security companies selected UnifyID from a group of 10 finalists as the winner of the Innovation Sandbox Contest at RSA …
LaunchKey: Passwordless consumer authentication at scale
iovation announced its LaunchKey mobile multifactor authentication solution. It empowers global consumer brands to improve security and consumer experience by delivering a …
How to minimize the risk and impact of identity fraud
The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They …
Facebook and GitHub test new account recovery option
Facebook and GitHub have partnered to provide GitHub users who employ two-factor authentication an easier way to recover access to their account in case they get locked out of …
Facebook gets physical for safer logins
Facebook has been offering the two factor authentication login option for a while now, and is now trying to make its use easier than ever before. “Most people get their …
Your smartphone’s unlock pattern or PIN can be easily cracked
Locking your smartphone or tablet when not in use is a great idea, but you should be aware that shoulder-surfing individuals can easily discover the PIN or pattern you use to …
Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …
The rising use of personal identities in the workplace
90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with 68% saying they would …
OAuth2.0 implementation flaw allows attackers to pop Android users’ accounts
Incorrect OAuth2.0 implementation by third party mobile app developers has opened users of those apps to account compromise, three researchers from the Chinese University of …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments