According to a PayPal notice of security incident dated January 18, attackers got unauthorized access to the accounts of thousands of users between December 6 and 8, 2022. The total number of accounts that were accessed by threat actors using a credential stuffing attack is reported as being 34,942. While accepting that PayPal is seemingly doing the best it can for the customers involved in this security incident by recommending password changes, Jasson Casey, chief technology officer at Beyond Identity insists that “passwords – whether unique or complex – are fundamentally flawed.” Instead, Casey says, organizations should be moving to phishing-resistant credentials such as the FIDO Alliance standard blueprints.


More

Phone Week: Yubico YubiKey Review: Simple, Solid Protection for your Online Accounts

Additionally, YubiKey — or the underlying FIDO2/WebAuthn & U2F standards — isn’t supported everywhere. Most…

Read More →

Netzpalaver: FIDO2 Standard for Passwordless Authentication with New Features

The new features of Client-To-Authenticator-Protocol (CTAP) v2.1 and WebAuthn-Level 2 simplify the implementation of passwordless…

Read More →

Industry of Things: New FIDO Standard for Secure Onboarding of IoT Devices

The new industry standard from the FIDO Alliance promises to make the onboarding of IoT…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.