Remove Authentication Remove Credential Remove Download
article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

For instance, an attacker might send an email that appears to be from a trusted video communication platform, prompting you to click on a link to verify your account or update credentials. Additionally, consider platforms with strong access controls, such as multi-factor authentication (MFA) to prevent unauthorized access.

Risk 275
article thumbnail

New Report: SMS-Based Outreach Helps Merchants Authenticate Consumers, Boost Online Sales

PYMNTS

This is leading many to utilize two-factor authentication (2FA) methods to safeguard customers’ personal information. The company recently announced that it would allow its customers to sign in to their accounts using SMS-based 2FA, with customers supplying their credentials as well as codes sent to them via third-party app or text message.

article thumbnail

Major Retail Banks in Singapore to Adopt Singpass Face Verification Soon

Fintech News

SFV will be used in high-risk scenarios to complement existing authentication methods during DT setup. It will verify a customer’s identity against national records using a face scan before activating their DT, making it significantly harder for scammers to hijack accounts using stolen credentials.

article thumbnail

Data Blizzard Hits LA Schools: Students data stolen in Snowflake Hack

VISTA InfoSec

A joint investigation by Mandiant, Snowflake, and CrowdStrike revealed that Sp1d3r tracked as UNC5537, used stolen customer credentials to target at least 165 organizations that had not enabled multi-factor authentication (MFA) on their accounts.

FBI 130
article thumbnail

Biometrics: The Key To Overcoming Contactless Payment Limits?

PYMNTS

Digital identity solutions are becoming more and more commonplace, especially as consumers grow increasingly aware of the weaknesses of authentication methods like passwords. For more on these and other digital identity news items, download this month’s Tracker.

article thumbnail

Deep Dive: Confronting APIs’ Authentication, DDoS Security Threats

PYMNTS

A computer science student reported using an API from peer-to-peer (P2P) mobile payments service Venmo to download — without users’ permission — the details of approximately 7 million transactions over six months in 2018, for example. Oversight And Authentication.

API 52
article thumbnail

NEW REPORT: Why Wells Fargo Is Going Mobile For Authentication

PYMNTS

Changing consumer spending and ever-evolving technological capabilities means that authenticating customers is an always shifting process. Despite demand from both consumers and corporations for a shift, passwords remain the most commonly used authentication credential — but their reign may be about to end.