article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

For instance, an attacker might send an email that appears to be from a trusted video communication platform, prompting you to click on a link to verify your account or update credentials. On top of that, strengthen user authentication with multi-factor authentication (MFA) to reduce the risk of unauthorized access.

Risk 277
article thumbnail

Report: Digital ID’s Role In Boosting Trust In The Sharing Economy

PYMNTS

Governments and organizations around the world are also seeking biometrics identity verification technology to authenticate credentials online. Consumers have come to rely on sharing economy services to make their lives more convenient, but above all, they want to feel safe. About The Tracker.

Economy 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Single Sign-On For Mobile Apps Coming Via US Wireless Carriers

PYMNTS

carriers creating a single sign-on service that would serve as the login credentials for all the apps on a mobile device. The technology can authenticate logins by using two-factor authentication to confirm a user’s identity. They simply log in with their mobile device,” the companies say on the website.

article thumbnail

Cybersecurity Predictions 2018: Cyber Scores and Stolen Eyes

FICO

Although the word “ubiquity” may have gone out of fashion (along with a lot of other buzzwords from the dot-com era), it’s an accurate description of how two-factor authentication will really take off in 2018. The reality is, two-factor authentication is extremely effective. And users don’t yet seem too annoyed by the extra step.

article thumbnail

1Kosmos Unveils its BlockID 1Key Solution for Mobile-Free Passwordless Authentication

Finovate

Once secured, the biometric provides identity verification that is tamper-evident, and credentials that are phishing-resistant. BlockID 1Key’s register-once-use anywhere model lets users authenticate and work on any managed device. The technology is also suitable for workstation-independent contexts.

article thumbnail

Fighting Real-Time Payment Fraud In Layers, With Moats

PYMNTS

Against that backdrop, bad actors are changing their strategies to gain access to users’ online bank credentials. Fraudsters, after all, are able to gather user data, such as mothers’ maiden names and Social Security numbers (and, with access to online banking, even details on recent transactions).

article thumbnail

The Future Is Secure For Smart Devices

PYMNTS

The biggest concern among IoT adopters is creating strong user authentications (43 percent). One common IoT security mistake is providing devices with default login credentials, which becomes a problem because fraudsters can compromise all of them by stealing just one device’s login. This enthusiasm isn’t unbridled, however.