According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

The Verge: When can we finally get rid of passwords?

The Verge reports that passwords, and all the risks that come with them, could be…

Read More →

ZDNet: Google transforms Android phones into security keys

At the Google Cloud Next conference, Google showcased the next step it’s taking to get…

Read More →

Venture Beat: You can now use your Android phone as a 2FA security key for Google accounts

Venture Beat reports on Google’s announcement that phones running Android 7.0 Nougat and higher can…

Read More →