article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. “Instead of an implementation bug, CAMF and MAL leverage logical defects in the authentication framework,” the researchers wrote. And the attack is cheap to carry out.

article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Passwordless authentication as a default parameter can’t arrive too soon. That’s the upshot of a new report, The State of Passwordless Security 2021 , put out by HYPR , a New York City-based supplier of advanced authentication systems. Related: Top execs call for facial recognition to be regulated. 1 use case is remote access.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Phone May Soon Replace Many of Your Passwords

Krebs on Security

Apple , Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. “I worry about forgotten password recovery for cloud accounts.”

Passwords 240
article thumbnail

Decoupling for Security

Schneier on Security

This is an excerpt from a longer paper. We can and should get the benefits of the cloud while taking security back into our own hands. The decoupling principle applies that idea to cloud services by making sure systems know as little as possible while doing their jobs. Here we outline a strategy for doing that.

Security 102
article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

And PKI , of course, is the behind-the-scenes authentication and encryption framework on which the Internet is built. PKI is the framework by which digital certificates get issued to authenticate the identity of users; and it is also the plumbing for encrypting data moving across the Internet. Achieving high assurance.

article thumbnail

QR Code Scams: What You Need to Know About This Phishing Tactic

Thales Cloud Protection & Licensing

A QR code has the capability of behaving like a link or a barcode, and devices can scan one from a piece of paper, a screen, a sticker, or even a billboard. Cloud transformation has encouraged innovation in increasing user convenience by enabling users to store their data in somebody else’s data center.

article thumbnail

MFA Advantages and Weaknesses

eSecurity Planet

Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Passwords are the most common method of authentication. Passwordless Authentication 101. The Problem with Passwords. MFA Basics.