Passwords are a common security measure to protect personal information, but they don’t always prevent hackers from finding a way into devices.
Researchers from the University of Alabama at Birmingham are working to perfect an easy-to-use, secure login protection that eliminates the need to use a password — known as zero-interaction authentication.
Zero-interaction authentication enables a user to access a terminal, such as a laptop or a car, without interacting with the device. Access is granted when the verifying system can detect the user’s security token — such as a mobile phone or a car key — using an authentication protocol over a short-range, wireless communication channel, such as Bluetooth. It eliminates the need for a password and diminishes the security risks that accompany them.
Read more . . .
The Latest on: Zero-interaction authentication
[google_news title=”” keyword=”Zero-interaction authentication” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Zero-interaction authentication
- Critical vulnerabilities in Exim threaten over 250k email servers worldwideon September 29, 2023 at 3:59 pm
Another patched vulnerability, tracked as CVE-2023-42116, is a stack-based overflow in the Exim challenge component. Its severity rating is 8.1 and also allows for RCE.
- Make a hacker cry: Use one of our favorite password managers of 2023on September 29, 2023 at 2:15 pm
Passwords are some of the most important things you'll ever use on the internet. You need a password for your favorite streaming platforms, smart home devices, health apps, and video games. But, one ...
- iPhone Spyware Attacks—What You Need To Knowon September 29, 2023 at 7:57 am
Spyware attacks are increasingly hitting iPhones, with adversaries taking advantage of unpatched security flaws. Here's what you need to know.
- Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploitson September 28, 2023 at 4:25 am
Russian zero-day acquisition firm Operation Zero is now offering $20 million for full Android and iOS exploit chains.
- Researchers Release Details of New RCE Exploit Chain for SharePointon September 27, 2023 at 2:25 pm
One of the already-patched flaws enables elevation of privilege, while the other enables remote code execution.
- Zero Trust Security Market worth $67.9 billion by 2028 - Exclusive Report by MarketsandMarkets™on September 27, 2023 at 7:30 am
The ability of the Zero Trust Security Market to change with emerging threats and technology will define it in the future. It will still be a crucial strategy for businesses trying ...
- What is WorldCoin’s proof-of-personhood system?on September 26, 2023 at 2:00 am
What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management?
- ServiceNow embeds AI-powered customer-assist features throughout productson September 21, 2023 at 5:20 am
ServiceNow's new chatbot works across applications and can summarize customer service interactions and perform case, incident, and agent chat summarizations; act as a virtual agent; and perform search ...
- Drugs Interaction Checkeron September 16, 2023 at 1:29 pm
When that happens, it's called a drug interaction. It could make your medication stop working, become less effective, or too strong. It could also trigger side effects. The more you learn about ...
- How to set up two-factor authentication on your Facebook accounton September 3, 2023 at 2:55 pm
That's where setting up Facebook two-factor authentication comes in. Also known as 2FA, it adds an extra layer of security to your account, requiring a verification code from your device each time ...
via Bing News