Passwords are a common security measure to protect personal information, but they don’t always prevent hackers from finding a way into devices.
Researchers from the University of Alabama at Birmingham are working to perfect an easy-to-use, secure login protection that eliminates the need to use a password — known as zero-interaction authentication.
Zero-interaction authentication enables a user to access a terminal, such as a laptop or a car, without interacting with the device. Access is granted when the verifying system can detect the user’s security token — such as a mobile phone or a car key — using an authentication protocol over a short-range, wireless communication channel, such as Bluetooth. It eliminates the need for a password and diminishes the security risks that accompany them.
Read more . . .
The Latest on: Zero-interaction authentication
via Google News
The Latest on: Zero-interaction authentication
- Never Trust Anything Again - The Zero Trust Worldon May 19, 2022 at 7:09 am
Organisations must abandon the ‘trust zero everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard ...
- Journey Is SOC 2 Certifiedon May 18, 2022 at 6:23 pm
Journey, an award-winning provider of cloud-based identity verification, authentication and secure transaction solutions, has successfully undergone an audit process and earned its System and ...
- 3 Reasons Your Business Needs a Customer Portalon May 18, 2022 at 11:25 am
A customer portal gives your customers access to resources, support, and live chat. Learn how to set up a customer portal for your website in five steps.
- May's Patch Tuesday updates make urgent patching a muston May 14, 2022 at 2:51 am
With three zero-days and several serious vulnerabilities in key Windows server and authentication areas, it's time to patch now.
- What is a zero-click attack, and what can you do about them?on May 12, 2022 at 6:39 am
Zero-click attacks can bypass endpoint security, antivirus, or firewall systems. Mobile devices are especially susceptible to attacks Because user interaction isn’t necessary, there are fewer ...
- What is a zero-click attack, and what can you do about them?on May 12, 2022 at 5:47 am
Zero-click attacks can bypass endpoint security, antivirus, or firewall systems. Mobile devices are especially susceptible to attacks Because user interaction isn’t ... Use strong authentication, like ...
- Zero Trust, Cloud Adoption Drive Demand for Authorizationon May 11, 2022 at 8:45 pm
With zero trust and cloud infrastructures at the top of security practitioners' road maps, there has been an uptick in authorization-related initiatives. Security ...
- Zero-click attacks explained, and why they are so dangerouson May 10, 2022 at 2:00 am
Zero-click attacks, especially when combined with zero-day vulnerabilities, are difficult to detect and becoming more common.
- FIDO2: The Dream Of Password-Free Authentication On The WWWon May 6, 2022 at 5:00 pm
These days this distinction is very noticeable for example on sites like GitHub, where the interaction with ... For me the benefit of Web Authentication is essentially zero, especially as I ...
via Bing News