Indian woman dies of starvation because of failures in system for biometric authentication for rations; her status is wrongly changed, unknown to victim who then receives reduced rations.
Oracle recently patched a Micros point-of-sale vulnerability which could have allowed an attacker to read any file and receive information about various services without authentication from a vulnerable MICROS workstation.
Adopt dynamic authentication of customers for each interaction they perform, and do it as seamless and frictionless as possible: use the mobile devices we all carry. Too much is at stake to rely on shared secrets' as safeguards.
Relying on usernames and passwords to authenticate user identity is irresponsible. If one of your tweaked passwords is lost or stolen, you should throw all versions of it away as hackers know that people tweak passwords.
The FIDO Europe Working Group launched today with the aim of accelerating the use of FIDO authentication standards in Europe. SC Media UK spoke to Alain Martin, co-chair of the new FIDO Europe Working Group.
Smart devices demand smart authentication, with frictionless security in the background, not impacting usability - and behavioural biometrics is one option that may be able to deliver suggests David Vergara.
73 per cent of fraud professionals think mobile devices will be the primary identity verification technology in the coming years. Yet 60 per cent also said that this will be biggest single point of compromise as well.
Clearer definitions between privacy, security, and trust - a mix of these areas can be a great place for innovations. Identification and authentication are two particular areas that lots of innovation can happen says Dr Fatemi Ardakani
As fraud rises, a new report has revealed that biometric-based authentication is set to become more prevalent in the UK.
Following the theft and attempted sale of login details believed to belong to MPs, peers and parliamentary staff, Parliament has confirmed it has seen "unauthorised attempts" to access "less than one percent" of those accounts.
Old Wimax routers have been found to contain backdoors and could enable hackers to bypass authentication researchers have now disclosed, aiding use for DDoS attacks.
Raz Rafaeli looks at top trends that can be expected in authentication this year and what it means practically for organisations and individual users.
As Microsoft files a patent for secure user authentication using a stylus, SC Media UK asks if the world needs yet more biometric security?
Biometrics should be used with another authentication factor and needs to depend on passwords as a recovery mechanism says Hitoshi Kokumai, thus other alternatives to text passwords are needed - such as images.
Six key vulnerabilities have been identified within industrial control systems that adversaries can use to undermine critical infrastructure operations.
Four out of five ITDMs predict that their organisations will be passwordless in five years.
Biometric identification might be the latest weapon in the cyber-security battle, but it is not without risk. Lee Painter argues that those risks mean the traditional password won't be disappearing any time soon.
Highlighting the pertinence of strong password practices, the update comes as E-Sports Entertainment Association announces leak affecting 1.5 million people.
Pizza purveyor Domino's Pizza has advised its customers by email to change their account password to one which is strong and unique to avoid fraudulent account activity, owing to recent large-scale data breaches and password reuse across multiple websites.
François Amigorena argues that multi-factor authentication impedes end users and slows them down in their jobs, and goes into detail about how context-aware security works in the background to secure users
Mastercard plans to authenticate transactions using selfies and thumb-prints, in a bid to move away from traditional username and password authentication, and make the payment process as frictionless as possible.
David Alexander discusses three ways in which the new EU e-Signature Regulation will affect wealth management companies.
André Malinowski discusses his view on how Britain is too trusting of biometric security
Biometrics can actually weaken authentication security if not implemented correctly says Hitoshi Kokumai, who asks, what exactly does the NIST Authentication Guideline have to say on this issue?
In a bid to protect its users from phishing and malware, Google has adopted the DMARC protocol and will warn users if it can't authenticate the source of emails.
To enhance the use of its web portal, gov.uk, the UK government is testing the use of its subscribers' social media logins as an authentication method.
Compared to passwords, authentication through biometric data is simpler to use and can be much more secure.
Over 10 percent of the UK population has pretended to be someone else online by snooping or sending messages through someone else's social media or email accounts without their permission.
The impending demise of Mozilla's identity management system, Persona, doesn't thange the fact that a sound blend of password management and unified authentication is the future of identity management says V Balasubramanian.