Fight Back Against COVID-19 Cyberfraud

More than ever before, our ability to remain productive hinges on remote communication and collaboration. But you can’t necessarily trust that the voice on the other end of the line is actually your coworker. Voice phishing, or “vishing,” attacks have… Continue reading Fight Back Against COVID-19 Cyberfraud

Most are concerned about data privacy, but few are willing to change habits

Today’s consumers are willing to trade their personal data for personalization, but also have fast-growing concerns about data privacy, according to a survey by Entrust. In fact, 64% of consumers are at least somewhat willing to share personal informat… Continue reading Most are concerned about data privacy, but few are willing to change habits

3 Cybersecurity Resolutions to Survive 2021

Predicting a global pandemic that reshaped how we interact with each other and our devices at a fundamental level […]
The post 3 Cybersecurity Resolutions to Survive 2021 appeared first on NuData Security.
The post 3 Cybersecurity Resolutions to Surviv… Continue reading 3 Cybersecurity Resolutions to Survive 2021

Biometrics: Choosing the Right Option for Your Security

Do you know who your customers are? Not their demographics, but each customer as they enter your online portal and provide their name, address and credit card number. Or, what about the customer who requests the right to be forgotten and have personal information deleted from your system? Identity verification is required in many, if […]

The post Biometrics: Choosing the Right Option for Your Security appeared first on Security Intelligence.

Continue reading Biometrics: Choosing the Right Option for Your Security

Can a fingerprint be reconstructed from a device that uses it for authentication?

I’ve noticed a lot of phones (not to mention, other devices) have built in fingerprint sensors these days.
Do these devices store information in such a way that your fingerprint could be reconstructed by someone with access to it?

Continue reading Can a fingerprint be reconstructed from a device that uses it for authentication?

Can a fingerprint be reconstructed from a device that uses it for authentication?

I’ve noticed a lot of phones (not to mention, other devices) have built in fingerprint sensors these days.
Do these devices store information in such a way that your fingerprint could be reconstructed by someone with access to it?

Continue reading Can a fingerprint be reconstructed from a device that uses it for authentication?

Biometrics Don’t Replace Mobile Password Security

Biometrics are a complement to good password security practices, not a replacement for them People used to be suspicious of the notion of having their facial recognition, fingerprints or other biometric data “on file” somewhere. Not anymore. Pretty mu… Continue reading Biometrics Don’t Replace Mobile Password Security