From Multi-Factor Authentication

SS7 SMS-Based Exploit: A Wake-Up Call to Shift to Stronger Two-Factor Authentication

Share Button

Signal System 7 (SS7) is the standard signaling language used to send text messages (SMS) around the world. The technology has been employed in various communication channels for almost 40 years Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more

biometrics

Biometrics a Convenient Addition, But No Silver Bullet

Share Button

We often say no product or solution is a “silver bullet” for fraud. In order to fend against the rich mosaic of cyberattacks threatening organizations, multi-factor Read more

biometric authentication

Fingerprints Stolen During OPM Breach: The Pros and Cons of Biometric Authentication

Share Button

Just when we thought the OPM breach couldn’t get any worse, OPM disclosed that approximately 5.6 million fingerprints were stolen as part of the hack. While it remains unclear if these fingerprints can Read more

LastPass Hack

Silver Linings to LastPass Hack

Share Button

Last night, password management company LastPass notified users in a blog post that it had been the target of a hack that accessed users’ email addresses, encrypted master passwords, and reminder words and phrases the service asks users to create for those master passwords.

In general, we are not a fan of password management tools. While they provide convenience, a central repository of any sensitive data is always going to garner greater attention from hackers.

Read more

Preventing Fraud

Preventing Fraud is a Business Decision

Share Button

In my experience as a fraud prevention consultant, I constantly have discussions with financial institutions and with different profiles of fraud prevention managers. Each with its own way of visualizing fraud and thus its own strategy to reduce it. The fact is that regardless of the institution and the fraud managers’ profile, there are three key considerations to be given before deciding how to deal with fraud, keeping in mind that it is virtually impossible to eliminate. Read more

Push Authentication Gets More Secure and Convenient

Share Button

The latest release of Easy Solutions’ DetectID authentication platform has enhanced its push authentication technology to include more options and features, making it the most convenient, intelligent and trusted mobile two-factor solution on the market. The new features in this latest version include: Read more

New Version of DetectID Includes QR Code Registration, Enhanced PKI Encryption

Share Button

DID 9.11.14We’ve rolled out some new updates to our DetectID product line, including updates to our push authentication to provide you with a more secure and streamlined two-factor experience. Read more about a few of the updates below:

QR Code Registration Option

DetectID now offers device registration using QR codes for soft token and push authentication. QR Code generation and delivery is supported on the iOS and Android platforms through an SDK or the DetectID app. The QR Code is scanned automatically, using the camera on the device, and the token is immediatelyimported and ready to use for receiving instant push authentication messages.

Read more

Strong Authentication for Mobile Banking

Share Button

EasySol-3phoneMobile Banking offers considerable promise for true interaction with customers as well as key differentiators to attract gen Y consumers. Simple and stronger authentication is key to manage risk and to ensure continued success in the mobile market.

The first generation of strong authentication for mobile typically utilized the same authentication factors as the online banking channel. This approach was mostly driven by the need to go to market quickly and also cost considerations. The most common method at that time was to use traditional static challenge questions.