Researchers Warn About Phone-Wiping Banking Trojan
Researchers are warning that a well-known banking trojan is evolving into something even more insidious. The Brazilian Remote Access Tool, Android (BRATA) has been around […]
Researchers are warning that a well-known banking trojan is evolving into something even more insidious. The Brazilian Remote Access Tool, Android (BRATA) has been around […]
Trust Stamp is trying to replace One-Time Passcodes (OTP) with more secure biometric authentication options. To that end, the company has released a new Biometric […]
Pindrop is adding more robust risk screening capabilities to its VeriCall Technology solution. VeriCall is a product from the PinDrop subsidiary Next Caller, and is […]
ForgeRock, an enterprise-focused identity and access management specialist, has upgraded its flagship mobile app. The revamped Authenticator App brings a number of improvements, including streamlined […]
A digital onboarding specialist is partnering with IPification to strengthen security on its platform. Blinking is specifically looking to eliminate some of the vulnerabilities associated […]
Apple is trying to make SMS One-Time Passcodes (OTP) a little more secure. To that end, the tech giant has followed through on an earlier […]
Entrust is teaming up with Netcetera in an effort to minimize the amount of fraud that occurs during card-not-present (CNP) transactions. The companies’ joint solution […]
IPification is bringing its mobile phone verification solution to the United Kingdom. The Hong Kong-based company has announced that the one-click solution will debut in […]
HID Global has increased the number of features that are available to customers through the Temenos Infinity platform. Temenos originally integrated the company’s HID ActivID and […]
Trusona has added a Time-based One-time Password (TOTP) feature to its passwordless security portfolio. The enterprise solution will enable two-step verification to provide a higher […]
A proposal from Apple engineers aimed at making SMS security more effective is making its way through the web development community. The idea, which was […]
Buguroo has provided consumers with a handy primer that details the relative strengths and weaknesses of some of the most common forms of two-step authentication. […]
Follow Us