article thumbnail

On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. Paper’s website. Paper’s website. I’ve blogged about risk-based authentication before.

article thumbnail

Release of Quantum Information Science and Technology White Paper

National Archives Records Express

We are pleased to announce the release of a white paper on the records management implications of Quantum Information Science and Technology (QIST). This is the third in a series of white papers—the first one being Blockchain (2019) and the second Cognitive Technologies (2020).

Paper 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. “Instead of an implementation bug, CAMF and MAL leverage logical defects in the authentication framework,” the researchers wrote. And the attack is cheap to carry out.

article thumbnail

Blockchain White Paper

National Archives Records Express

We are pleased to announce the release of our Blockchain White Paper. The white paper began as an internal effort to assist NARA staff in learning more about the technology and how agencies are using it.

article thumbnail

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems

Schneier on Security

” Abstract: A master face is a face image that passes face-based identity-authentication for a large portion of the population. Fascinating research: “ Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.”

article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Passwordless authentication as a default parameter can’t arrive too soon. That’s the upshot of a new report, The State of Passwordless Security 2021 , put out by HYPR , a New York City-based supplier of advanced authentication systems. Related: Top execs call for facial recognition to be regulated. 1 use case is remote access.”.

article thumbnail

FAQ: Can I destroy a paper original after scanning?

The Texas Record

Both local governments and state agencies want to know if they ‘go paperless’ — if they digitize their essential records — can they get rid of the original paper or film copies? In general, we give a soft recommendation of at least 6 months before shredding the paper copies. Adequate technical documentation is kept ( Sec.

Paper 98