HackDig : Dig high-quality web security articles for hacker

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:3035 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Shakespeare, the Wizard of Oz and Multifactor Authentication

In 1601, William Shakespeare wrote a comedy called “Twelfth Night.” The story is about a pair of twins with identity issues. To illustrate that the characters share similar thoughts, Shakespeare wrote, “My purpose is, indeed, a horse of that color.” For many decades, a horse of the same color was analogous to similar thoughts or plans
Publish At:2017-03-30 14:55 | Read:2334 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Two-Factor Authentication: A Little Goes a Long Way

Despite the security industry’s best efforts to educate users about the weaknesses of password authentication, awareness remains frustratingly low. Keeper Security recently analyzed 10 million compromised accounts and found that just 25 passwords made up more than half of the list. Nearly 17 percent of users were guarding their accounts with the passwo
Publish At:2017-01-30 19:15 | Read:2661 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

You may have seen the recent headlines covering the story of a snoozing mother who, while taking a nap on the couch, was innocently hacked by her 6-year-old. The child purchased $250 worth of toys on Amazon using her mother’s fingerprint for authentication. What an ingenious young one indeed! Humorous as this story may be, it points out one of the many
Publish At:2017-01-24 15:55 | Read:3453 | Comments:0 | Tags:Data Protection Identity & Access Authentication Biometric S

Too Many Passwords: Is the End in Sight?

Since passwords are a shared secret between a user and a system, a threat vector exists at both the client and the service provider. Experts have declared for years that the password alone was never considered a long-term solution for securely identifying a user, according to CNET. End users are finding it increasingly difficult to protect their passwords fr
Publish At:2017-01-16 23:40 | Read:4094 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Security Starts With People: Know Who They Are, Know What They Do

Each day, in every corporation, school, government organization and nonprofit, people are generating great value for the economy by creating, manipulating and interacting with precious information. In fact, much of the value in today’s economy is created and stored digitally, from intellectual property, trade secrets and customer lists to the actual do
Publish At:2016-11-29 22:30 | Read:3377 | Comments:0 | Tags:CISO Identity & Access Biometric Security Biometrics Identit

Getting Rid of the Password: Smartphones to the Rescue

The war on password use has been waging on for some time now. Passwords are a relic of the days when computers were stand-alone boxes and hardly ever networked; the damage of a bad login was limited to one account at one location. But a networked computer can do far more damage. FIDO Takes a Stab The FIDO Alliance was one of the first organizations to experi
Publish At:2016-01-06 21:00 | Read:1937 | Comments:0 | Tags:Identity & Access Biometric Security Cybersecurity Mobile Pa

Your Evolving Digital Life: The Need for More Secure Authentication

This week marks the fourth of National Cyber Security Awareness Month (NCSAM), which is held every October in an effort to engage and educate the public about issues surrounding cybersecurity. The theme of week four is “Your evolving digital life.” One of the main security controls that is poised to ease security concerns in the future is the use
Publish At:2015-10-20 15:15 | Read:2881 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Authentication: The Enterprise’s Weakest Link

Authentication is a weak link in any enterprise security solution, primarily because it relies heavily on how people use it. It’s also one of the most important factors, and any flaws can lead to significant issues and costly cyberattacks. As just one example, earlier this year the IBM-discovered Dyre Wolf campaign stole over $1 million from targeted e
Publish At:2015-09-24 22:25 | Read:3392 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Biometric

Can Selfies Be the Next Multifactor Authentication Method?

Earlier this summer, MasterCard announced a new multifactor authentication option for its cardholders: the selfie. Customers will soon be able to incorporate a selfie and facial recognition software into their accounts. The pilot program starts in the fall and will incorporate fingerprint scanning as well as facial recognition. Users will need to download an
Publish At:2015-08-28 01:55 | Read:2510 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Momentum Picks Up for Biometric Security in the Financial Sector

The overall market for biometric security is expected to reach $13.8 billion in 2015, according to ABI Research. While the government still accounts for most of the spending, it will be surpassed by company and consumer spending in 2018. Among the reasons for this growth are increased accuracy and growing consumer acceptance of the use of biometrics. Biometr
Publish At:2015-04-07 17:20 | Read:2428 | Comments:0 | Tags:Banking & Financial Services Banking Banking Industry Biomet

Hacker Finds a Simple Way to Fool IRIS Biometric Security Systems

Biometric security systems that involve person's unique identification (ID), such as Retinal, IRIS, Fingerprint or DNA, are still evolving to change our lives for the better even though the biometric scanning technology still has many concerns such as information privacy, and physical privacy.In past years, Fingerprint security system, which is widely used
Publish At:2015-03-06 17:50 | Read:3080 | Comments:0 | Tags:biometric security Biometric security systems Biometric sens

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud