identification
Surveillance through Push Notifications
The Washington Post is reporting on the FBI’s increasing use of push notification data—”push tokens”—to identify people. The police can request this data from companies like Apple and Google without a warrant ...

Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Security Boulevard

Zero-Trust in the Cloud is Hard. Here’s How to Do it Right
A zero-trust security framework is quickly becoming a necessity. Here are a few tips to implement it successfully ...
Security Boulevard

Okta Adds Security Center to Provide Real-Time Threat Visibility
Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, ...
Security Boulevard

Protecting the Future of Digital Identities
Joseph Carson | | Cybersecurity, digital identities, digital wallet, identification, Identity & Access Management, verification
In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...
Security Boulevard

PayPal Credential Stuffing Attacks Renew Calls for MFA
Teri Robinson | | Authentication, credential stuffing, identification, MFA, passwordless, Paypal, Third Party Access
An internal review confirmed that on December 20, 2022, unauthorized parties could use account holders’ login credentials to access their PayPal accounts. In response to what is being called a credential stuffing ...
Security Boulevard

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Tom Eston | | Authentication, blackhat, BSides, Cybersecurity, Data Privacy, DEF CON, Digital Privacy, Episodes, Hacker Summer Camp, identification, Information Security, Infosec, Phone number, Podcast, Privacy, Repair Mode, Samsung, security, technology, Weekly Edition
Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...

Authentication, Identity Verification, and Identification: What’s the Difference
People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...
Tracking People via Bluetooth on Their Phones
Bruce Schneier | | academic papers, bluetooth, identification, Privacy, Stalking, tracking, Uncategorized
We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...

Age of No-Code Technologies: Identification and Authentication
No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take ...