The News of the World phone-hacking scandal has some banks doubting the methods they use to verify that callers are who they claim to be. Many banks vet callers by looking at the number that shows up ...
Learn why phone numbers are critical to online security, how they’re exposed, and practical steps to reduce misuse, scams, and account takeover risks.
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
RESTON, Va.--(BUSINESS WIRE)--The majority of call centers are seeing year-over-year increases in fraud activity, according to the 2022 Omnichannel Authentication Survey from Neustar, a TransUnion ...
Whenever you get a new phone or authenticator, you risk locking yourself out of your multi-factor authentication (MFA) ...
Authentication determines who gets in and who stays out. Getting this right means fewer breaches, less downtime, and stronger ...
Multifactor authentication (MFA) often features in experts’ lists of low-hanging fruit cybersecurity improvements that agencies could adopt to make themselves harder targets. MFA recognizes that ...
Google now has a new way of enabling two-factor authentication: using your phone as the near-equivalent of a physical security key. You should already be familiar with two-factor authentication: ...