https://nudatasecurity.com/wp-content/uploads/2013/11/credit-cards.jpg 1500 2100 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-11-12 09:45:082018-06-11 15:40:44How criminals can instantly buy your identity
In the middle of teaching his Journalism class at NYU, Adam Penenberg’s laptop stops but it’s not frozen. A grey screen appears and directs him to dial a number to unlock his computer. Bemused, as the lecture grinds to a halt, he reaches for his phone. It won’t accept his PIN code. He’s been hacked. You might not be aware that hijacking somebody’s life – full-scale identity theft – doesn’t require any hacking expertise. Just criminal intent and some spare …
https://nudatasecurity.com/wp-content/uploads/2013/10/OTP-token.jpg 191 611 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-09 15:11:412019-06-11 10:01:15What is Risk Based Authentication?
Risk-based authentication process applies varying levels of strictness to the authentication process based on the probability that a given application can be compromised. The authentication process becomes restrictive and casts a wider net based on the increase in risk. Understanding the Types of Authentication Authentication methods are usually grouped into a few different factors. 1. Ownership Factors Bank cards, security tokens, mobile phone. Physical objects which a user is required to be in possession of. The risks to these types …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.