Category Archives: Authentication

3.4 billion fake emails are sent around the world every day

At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because they’re not implementing industry-standard authentication protocols, according to a Valimail report. The research report also found that the vast majority of suspicious emails emanate from U.S.-based sources. It’s not all bad news, however. Ongoing research also indicates that many industries are making progress in the fight against impersonation, some … More

The post 3.4 billion fake emails are sent around the world every day appeared first on Help Net Security.

Will biometrics replace passwords for online payment authentication?

Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, according to new research conducted by Paysafe, a leading global payments provider. The research, found that over three quarters (79 percent) of consumers still favour passwords for making payments online due to concerns about the security of new biometric options. The annual study tracks changing views on … More

The post Will biometrics replace passwords for online payment authentication? appeared first on Help Net Security.

Apple debuts privacy-minded “Sign in with Apple” SSO

Among the many news shared during Apple’s annual developer conference there’s one that stands out: the introduction of “Sign in with Apple”. About the “Sign in with Apple” feature Apple’s new single sign-on (SSO) authentication mechanism is similar to the one provided by Facebook, Google, LinkedIn, Twitter, and others, in that it will allow users to sign in to apps and websites without creating a new account. But there are important differences, mainly focused on … More

The post Apple debuts privacy-minded “Sign in with Apple” SSO appeared first on Help Net Security.

Researchers spot manipulated photos and video using AI-driven imaging system

To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate images throughout the entire pipeline, from acquisition to delivery, using artificial intelligence (AI). In tests, this prototype imaging pipeline increased the chances of detecting manipulation from approximately 45 percent to over 90 percent without sacrificing image quality. Determining whether a photo or video is authentic is becoming increasingly problematic. Sophisticated techniques … More

The post Researchers spot manipulated photos and video using AI-driven imaging system appeared first on Help Net Security.

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and PAM-related security tasks may be deprioritized or neglected, potentially exposing organizations to data breaches and other cyber risks. Conducted at RSA Conference in early March 2019, One Identity’s study polled 200 conference attendees on their biggest security challenges and concerns, as well as their workplace behaviors related to network and system access. … More

The post Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies appeared first on Help Net Security.