Remove Credential Remove Download Remove User Authentication
article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

For instance, an attacker might send an email that appears to be from a trusted video communication platform, prompting you to click on a link to verify your account or update credentials. On top of that, strengthen user authentication with multi-factor authentication (MFA) to reduce the risk of unauthorized access.

Risk 277
article thumbnail

Startup Roundup: Finding Connections Between New And Existing Payment Systems

PYMNTS

Meanwhile, DadeSystems tackled user authentication with single sign-on (SSO) technology that allows their clients’ staff to use their existing credentials to log into the company’s mobile app. This month, startups such as Modo took on relationships between banking systems and emerging payment systems. DadeSystems.

article thumbnail

SpyCloud On Making Payments Smarter And Safer

PYMNTS

One of the main reasons cybercriminals have embraced account takeovers is the wide array of information the attacks provide, usually including all the data and credentials they would need to misrepresent a consumer. Those passwords are freely available for download and have all been unencrypted — and [they] are still relevant to this day.

article thumbnail

Can Biometric Authentication Make Employees’ Jobs Easier?

PYMNTS

The company used the results of ECG research conducted at the University of Toronto in 2011 as the source of a new authentication method developed by Nymi that is set to be released this fall. What we’re working to deliver is persistent authentication,” Martin told PYMNTS. We are actually two factors in one,” Martin explained.