It’s Insanely Easy to Bypass Samsung Galaxy S8 Iris Scanner with a Photo

Samsung recently launched its new flagship smartphones, the Galaxy S8 and Galaxy S8 Plus, with both Facial and IRIS Recognition features, making it easier for users to unlock their smartphone and signing into websites.

We already knew that the Galaxy … Continue reading It’s Insanely Easy to Bypass Samsung Galaxy S8 Iris Scanner with a Photo

MasterCard launches Credit Card with Built-In Fingerprint Scanner

MasterCard has unveiled its brand new payment card that has a built-in biometric fingerprint scanner, allowing customers to authorize payments with their fingerprint, without requiring a PIN code or a signature.

The company is already testing the new … Continue reading MasterCard launches Credit Card with Built-In Fingerprint Scanner

Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo

Samsung launched its new flagship smartphones, the Galaxy S8 and Galaxy S8 Plus, at its Unpacked 2017 event on Wednesday in New York, with both IRIS and Facial Recognition features, making it easier for users to unlock their smartphone and signing into… Continue reading Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo

Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication

Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication

Two-Factor Authentication: A Little Goes a Long Way

Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.

The post Two-Factor Authentication: A Little Goes a Long Way appeared first on Security Intelligence.

Continue reading Two-Factor Authentication: A Little Goes a Long Way

Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother’s fingerprint to satisfy the authentication requirements on her phone.

The post Hacked by a Kid?! A Story to Illustrate the State of Authentication Today appeared first on Security Intelligence.

Continue reading Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

Too Many Passwords: Is the End in Sight?

Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.

The post Too Many Passwords: Is the End in Sight? appeared first on Security Intelligence.

Continue reading Too Many Passwords: Is the End in Sight?

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do