authentication
Sometimes people share passwords. This practice might stem from the lack of support for unique user account in some...Read more
In addition to the fingerprint scanner, there is another new hardware component in iPhone 5S that security-minded folks...Read more
LinkedIn prompts users to take additional steps when it determines that the logon attempt is unusual. What activities does...Read more
Apple’s introduction of two-step verification for Apple IDs is consistent with the trend in the industry to strengthen...Read more
User authentication is usually discussed in the context of the person's initial interactions with the system—a safeguard...Read more
If you think your mobile phone is already deeply embedded in your life, consider the critical role it will have in just...Read more
Protecting login credentials, which often take the form of username and password pairs, isn’t glamorous. The designers...Read more
I don’t understand why Facebook decided to add one-time password (OTP) support for logging into its website....Read more
Facebook rolled out the “social CAPTCHA” mechanism authentication mechanism, based on the approach described in...Read more