Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

In the last hour, I’ve used my phone to take pictures of my teenagers, spy on my dogs while I was out of the house, pay my electric bill and watch a funny video. Then, while buying some new dish towels (yet another use), I used my phone as an identity document without even realizing […]

The post Are Your Employees’ Old Phone Numbers Creating Vulnerabilities? appeared first on Security Intelligence.

Continue reading Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.

The post How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? appeared first on Security Intelligence.

Continue reading How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

2FA is outdated, US carriers want next-gen mobile authentication

Traditional two-factor authentication via SMS on a smartphone has been used for a long time as an extra layer of security. But time proved this feature is not flawless, as Facebook users recently witnessed after receiving spam messages to two-factor au… Continue reading 2FA is outdated, US carriers want next-gen mobile authentication