article thumbnail

Capital One Turns Debit and Credit Cards Into Authentication Methods With AirKey

The Fintech Times

Developed over the past seven years by Capital One, AirKey turns credit and debit cards into a tap-based authentication method. The new service allows customers to authenticate wherever their financial institution requires it. With AirKey, financial institutions can increase authentication success and mobile enrollment.

article thumbnail

Authenticity in the Era of Deepfakes: The Multi-Layered ZOLOZ eKYC Approach

Fintech News

The Evolution of Deepfakes The term “deepfake” itself reflects the technology’s foundation in deep learning and its ability to fabricate authentic-looking content by seamlessly combining and altering existing visual and audio elements.

Deepfake 112
article thumbnail

Mobile Banking’s Authentication Breakthrough

PYMNTS

Anti-fraud efforts can seem like word salad with exotic ingredients being tossed around: strong consumer authentication ( SCA ), two-factor authentication (2FA), the second Payment Services Directive (PSD2) … you get the idea. Ask consumers what they want, however, and the acronyms vanish like a metaphor for things that vanish.

article thumbnail

Demand for 5G can improve payments speed, authentication

Payments Source

The COVID-19 pandemic led many locked-down consumers to stream or download more movies and video games, and this trend is leading to a rise in demand for faster data services such as 5G — a potential driver of payments innovation.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

What is Adaptive Identity Authentication?

FICO

Adaptive identity authentication is the process of tailoring each customer authentication to the specifics of the request. It involves calibrating multiple sets of risk indicators to determine the type of authentication needed, and how strong to make it. Adaptive identity authentication is increasingly important.

article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

Attackers may use video communication platforms to distribute ransomware by exploiting vulnerabilities in the software or tricking you into downloading infected files. Additionally, consider platforms with strong access controls, such as multi-factor authentication (MFA) to prevent unauthorized access.

Risk 277