Home Tags Identity

Tag: Identity

Review: The 6 best password managers

Thanks to the continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager.
Itrsquo;s one of the easiest too.A password manager is an excellent first step in securing your online identity, helping you increase the strength of the passwords that protect your online accounts because it will remember those passwords for you.

A password manager will generate a unique strong password for every account and application, without requiring you to memorize or write down these random strings of characters.

These strong passwords help shield against traditional password attacks such as dictionary, rainbow tables, or brute-force attacks.To read this article in full or to leave a comment, please click here

Breaking the iris scanner locking Samsung’s Galaxy S8 is laughably easy

The “future standard for phone authenticationrdquo; is not ready for mainstream use.

Australia Post to create federal government identity concept

Australia Post has announced a partnership with the Digital Transformation Agency to create a proof-of-concept identity platform.

ASPIDER-NGI and SURFnet eSIM solutions for enterprise security and identity

The Netherlands, May 10, 2017: ASPIDER-NGI, provider of MVNE, IoT, eSIM and content solutions, and SURFnet, the Dutch National Research and Education Network, are partnering on eSIM.

This new agreement gives SURFnet early access to the ASPIDER-NGI eSIM technology to develop and build specific applications for education and research, with an initial focus on identity management and authentication.ASPIDER-NGI is using these initiatives to launch “eSIM eConnect” later this year.

This product provides a modular approach... Source: RealWire

Crooks can nick Brits’ identities just by picking up the phone...

No 133t hax0ring needed to hijack accounts, warns fraud watchdog's report Identity crimes remain among the greatest threats to UK businesses online.…

These people want you to know climate change isn’t just for...

These conservative and religious voices work to get their communities on board.

Intercede announces Secure Login for WordPress

RapID Secure Login enables WordPress users to easily access their accounts without insecure and cumbersome passwords Lutterworth, England/Reston, VA, 8th May 2017 – Today, digital identity and credentials expert, Intercede announced the launch of RapID Secure Login (RapID-SL), a Plugin for WordPress that enables administrators and subscribers to log into websites and blogs with fingerprints instead of usernames and passwords.

By eliminating the use of insecure passwords, users are provided with superior usability and more... Source: RealWire

Data Science Could Boost Global Prepaid Market by USD $70 Billion

Report Reveals Mobile Financial Services, Rooted in Data Science, Drive Digital Transformation by Increasing ARPU, Reducing Churn and Doubling Lifetime ValueSAN FRANCISCO, May 3, 2017 – A new report by Juvo, the pioneer in mobile Identity Scoring, reveals that data-science driven mobile financial services will significantly impact the global pre-paid market, increasing operator revenues by as much as USD $70 billion.

The report, Data Science: Driving Mobile Operator Digital Transformation, demonstrates how establishing financial identities... Source: RealWire

Mysterious cat-and-mouse-themed Trojan RAT is potentially dangerous, but its creators and...

The highly skilled nature of the threat actors behind Felismus, and their ability to cover their tracks, means that no-one knows their identity or their target.

Picture this: Senate staffers’ ID cards have photo of smart chip,...

Senate employees just use passwords, and their badges sport a picture of an alternative.

Call Center Fraud Spiked 113% in 2016

Criminals are increasingly spoofing caller ID using VoIP apps including Skype or Google Voice to hide their identity and location, according to a report released today by Pindrop Labs.

Google zero-trust security framework goes beyond passwords

With a sprawling workforce, a wide range of devices running on multiple platforms, and a growing reliance on cloud infrastructure and applications, the idea of the corporate network as the castle and security defenses as walls and moats protecting the perimeter doesn’t really work anymore. Which is why, over the past year, Google has been talking about BeyondCorp, the zero-trust perimeter-less security framework it uses to secure access for its 61,000 employees and their devices. The core premise of BeyondCorp is that traffic originating from within the enterprise’s network is not automatically more trustworthy than traffic that originated externally. Instead of traditional methods such as VPNs and login credentials to establish trust and verify identity, Google relies on a “tiered access” model, which looks at the user’s individual and group permissions, the user’s privileges as defined by the job role, and the state of the device being used to make the request.To read this article in full or to leave a comment, please click here