Behavioral biometrics or behaviometrics is a form of biometric authentication that has shown promise to address the continuous frictionless authentication problem by allowing the device to identify the user without the user doing any explicit authentication actions while providing a … Continue Reading

ADAPTIVE BEHAVIORAL BIOMETRICS A CRITICAL SECURITY LAYER
We are on the cusp of a global shift to change how we identify the individual. Smart devices including mobile phones, wearables and global access to cellular services have pushed biometrics as the new paradigm in user authentication and security … Continue Reading

CAN ADAPTIVE BIOMETRICS THWART DATA BREACHES?
In a recent study, CNN Money reported that 317 million types of malware were released into cyberspace last year. This translates to nearly a million new (or variants) malware every day. The article also reported that whenever a new attack was released, … Continue Reading

WHY ADOPT BEHAVIORAL BIOMETRICS AS PART OF YOUR MULTI-MODAL STRATEGY
The next wave in biometric security is predicted to be the use of multiple biometric authentication systems for human identification. Multi-modal biometric authentication systems take input from a single or multiple biometric sensors for measurement of two or more different biometric characteristics to … Continue Reading

HACKERS GET ACCESS TO SAMSUNG PHONES VIA MOBILE SECURITY FLAW
Mobile security researchers have discovered a security flaw in Samsung’s default keyboard on its smartphones which can be exploited by hackers to snoop around your phone. Hackers could potentially access the phone’s camera, read text messages, install apps and use the microphone to … Continue Reading

TIPS FOR MERCHANTS TO ADDRESS MOBILE COMMERCE FRAUD
In 2014, merchants experienced nearly twice the fraud rate in m-commerce versus e-commerce. A recent study from LexisNexis indicates that the most common types of fraud through mobile are identity theft, request for return or refund and international cross-border. The burden … Continue Reading

ADOPTING MOBILE PAYMENTS FOR RETAILERS
A recent study from LexisNexis indicates that half of all merchants surveyed believe that adopting mobile payments is necessary to stay competitive and 15% of those currently support mobile commerce transactions. Considering that over 75% of smartphone and tablet owners use their devices for shopping activities … Continue Reading

INTERNET OF THINGS – IOT SECURITY CONCERNS AND THOUGHTS
It is called the Internet of Everything – the burgeoning phenomenon of day-to-day consumer products and services that connect to the Internet. The IoE/IoT acronym could range from simple concepts like a home automation system that turns your lights on … Continue Reading
BEHAVIORAL BIOMETRICS IN MOBILE PAYMENTS SECURITY
The market for U.S. mobile payments is expected to expand to $142 billion by 2019, according to recent reports by Forrester Research. Meanwhile, U.S. consumers have already undergone a transformation when it comes to using mobile phones and associated technologies. … Continue Reading

ANDROID FINGER PRINT SECURITY FLAW
Mobile security researchers have discovered a security flaw in Android that could enable attackers to intercept finger print data, which could be exploited to bypass the phone’s lock code or to authorize payments. Though the affected phone makers have tried to … Continue Reading