identification

Okta Adds Security Center to Provide Real-Time Threat Visibility
Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, ...

Protecting the Future of Digital Identities
In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...

PayPal Credential Stuffing Attacks Renew Calls for MFA
An internal review confirmed that on December 20, 2022, unauthorized parties could use account holders’ login credentials to access their PayPal accounts. In response to what is being called a credential stuffing ...

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...

Authentication, Identity Verification, and Identification: What’s the Difference
People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...
Tracking People via Bluetooth on Their Phones
We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...

Age of No-Code Technologies: Identification and Authentication
No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take ...
I Am Not Satoshi Nakamoto
This isn’t the first time I’ve received an e-mail like this: Hey! I’ve done my research and looked at a lot of facts and old forgotten archives. I know that you are ...
Identifying the Person Behind Bitcoin Fog
The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so that it was hard ...

Behavioral Biometrics: People-Friendly Zero Trust
Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...