Many of the implemented authentication methods are not phishing-resistant, as the current case shows. One solution here is a FIDO-based authentication solution, which can best be implemented with a hardware-based security key that enables secure MFA by means of hardware tokens and whose MITM protection mechanisms from FIDO also take effect in the event of AiTM attacks.


More

Mashable: This smart ring gives you instant mobile payments with beefed up security

The Token smart ring allows wearers to make mobile payments, unlock doors, and, through the…

Read More →

The New York Times: The Tech That Our Security Experts Use to Be Digitally Secure

Security experts from the New York Times explain why they use FIDO security keys for…

Read More →

CSO: Two years after the OPM data breach: What government agencies must do now

In this look back at the OPM data breach, Jeremy Grant of Venable and FIDO’s…

Read More →