Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Intelligence agencies say that China is shifting tactics. Or, maybe just adding new ones. The NSA, CISA and FBI said, in a joint advisory, that China-backed hackers have maintained access inside U.S. critical infrastructure such as aviation, rail, mass transit, highway, maritime, pipeline, water and sewage to prepare to launch a catastrophic attack at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Assuming you are like every other company, you communicate with people. People like employees, customers, suppliers and the media. Given what we are seeing, already, with deepfakes and the the fact that this is only just starting, what is your plan to protect your reputation? Would a competitor or someone else publish a photo, video, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
DEF CON is Canceled, No Really It is a meme. Every year there are announcements that DEF CON is canceled, but this year it is real. Sort of. DEF CON is the world’s largest hacking convention and has, for years, been held at Caesars in Las Vegas. You may remember that Caesars had an unfortunate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As if yesterday’s deep fake post wasn’t enough to scare you, here is another one. Gartner says that attacks using AI-generated deepfakes to bypass facial biometrics will lead a third of organizations to doubt the adequacy of identity verification as standalone protections. Actually, this is good news because biometrics should ***ONLY*** be used to identify […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Reports say that a multinational company is out $25 million after an employee was tricked into wiring the money to fraudsters. This would, unfortunately, not be that unusual if it were not for how the hackers did it. Initially, the worker became suspicious after receiving a message supposedly from the CFO, thinking it was a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]