According to a recent survey, 93 percent of organizations use multifactor authentication to protect user accounts and corporate networks from cybercrooks.
Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.
IT professionals and mobile app developers must figure out a way to implement strong authentication capabilities without complicating the user experience.
IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
The effectiveness of security questions has been called out in a new Google study. Are user answers really as unique as they ought to be?
The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.
Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).