Get a Pentest and security assessment of your IT network.

News

Fourth Factor (De-)Authentication

We all know that there are three basic ways to authenticate somebody: something you know, something you have, and something you are. Ive wondered recently though where habits and behavior fit in. This profiling/look for weird stuff philosophy has been used in Intrusion Detection Systems (IDS) forever but is now moving to watching employees on their desktops in hopes of preempting insider attacks. Its even being used as a method for authentication as one company has a tool to observe the cadence with which a password is typed.”]

Source: https://www.csoonline.com/article/2136264/fourth-factor–de–authentication.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months