A published study on picture-gesture authentication demonstrates weak points hackers could expose in guessing picture-based passwords. Typing on a smartphone or tablet keyboard lends itself to a lot ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
Of all the things which are annoying about the modern World Wide Web, the need to create and remember countless passwords is on the top of most people’s lists. From dozens of passwords for everything ...
Leading ISP AOL today unveiled a new log-in scheme that will offer its subscribers additional security and protection against password theft and phishing scams. The optional service uses a ...
What kind of value will a financial institution get for its investment in strong authentication? For FIs, it’s become a burning question, thanks to federal guidance that recommends they boost the ...
In the current state there are many authentication schemes and most of these suffer from many weaknesses. Some of them are based on the physical and behavioral properties of the user, and some others ...