Secure Mobile Device For Enterprise

With the introduction of cool mobile devices available for corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile…

Fraud Using Facebook

Ever found your bank statements on Facebook? How about your health records and business plans? That’s what happened to a friend-of-friend of mine. My friend found her friend’s family pictures,…

Risk Based Authentication

The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or…

Biometrics Authentication

Passwords and personal identification numbers (PIN) are information that we need to remember since the day we started interacting with digital systems. Do we know the count of passwords we…