Fraud Using Facebook

Ever found your bank statements on Facebook? How about your health records and business plans? That’s what happened to a friend-of-friend of mine. My friend found her friend’s family pictures,…

Risk Based Authentication

The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or…

Biometrics Authentication

Passwords and personal identification numbers (PIN) are information that we need to remember since the day we started interacting with digital systems. Do we know the count of passwords we…

Authentication – Level of Assurance

Authentication is the process of confirming an entity’s identity based on reliable credentials. The process and the technology involved in authentication varies with various level of assurance required from the…

Unauthentication

by Bruce Schneier In computer security, a lot of effort is spent on the authentication problem.  Whether it’s passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are…