Language selection

Search

Blog

Privacy Tech-Know Blog - Your Identity: Ways services can robustly authenticate you

Traditionally, we have logged into online systems using a username and password. These credentials are often being compromised, however, when databases containing them are breached or we are tricked into providing the information to fraudulent individuals or websites (often through phishing or other social engineering attacks). Once these credentials are compromised, attackers can use them to log into the associated online services. Even worse, because people often reuse their usernames and passwords, the attackers can access multiple services.

Read more

Showing items 1 through 1 of 1.

Date modified: