Please turn on your JavaScript for this page to function normally.
programming
Low code applications are essential for cybersecurity development in applications

One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …

biometrics
MFA still offers the best chance of keeping data secure

Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …

identity
Digital IDs under attack: How to tackle the threat?

Digital identification is the focus of two reports by the European Union Agency for Cybersecurity (ENISA): an analysis of self-sovereign identity (SSI) and a study of major …

ecommerce
Spike in brand abuse attacks, 3-D Secure transaction volume rising

Outseer has published its latest quarterly Fraud & Payments report, confirming a troubling and massive spike in worldwide brand abuse attacks. The Q4 installment of the …

online shopping
How Buy Now, Pay Later is being targeted by fraudsters

Consumers are increasingly utilising Buy Now Pay Later (BNPL) payment options to make online purchases. Indeed, several e-commerce companies reported huge uptakes in sales, …

biometrics
Governments struggle to deliver secure online citizen services

Auth0 released the findings of its Public Sector Identity Index, a global research report that provides government technology leaders with insight into the identity maturity …

passwordless
Could passwordless be the solution to poor shopping sign-up processes?

Retailers could be shutting down huge revenue streams due to poor shopping sign-up processes, a study from Beyond Identity has revealed. A survey of more than 1,000 people in …

Tom Wesselman
Combating identity fraud: The key is to avoid stagnation

In this interview with Help Net Security, Tom Wesselman, CTO of TeleSign, explains how to successfully combat identity fraud to not only protect an organization but its …

passwordless
Passwordless verification API transforms every mobile phone into a security token for zero trust access

What is small, tamper-proof, cryptographically secure, and already used by 6.37 billion people? The SIM card. We carry this compact piece of secure tech everywhere without …

SIM
How to thwart SIM swapping attacks?

SIM swapping attacks have been reported in the media since 2017. Such attacks usually target banking transactions but not only. These attacks are also perpetrated against the …

shop online
Ecommerce retailers facing a 350% increase in fraudulent online orders

As the holiday shopping season hits full stride, ecommerce retailers across Europe face a new era of malicious attacks spurred by a COVID-inspired transformation in ecommerce …

biometrics
Behavioral biometrics: A promising tool for enhancing public safety

While globalization has enabled easy cross-border movement and transactions, fraudulent activities have, unfortunately, followed suit. The growing demand for a multi-layered …

Don't miss

Cybersecurity news