Phishing refers to a variety of attacks that are intended to convince you to forfeit sensitive data to an imposter. These attacks can take a number of different forms; from spear-phishing (which targets a specific individual within an organization), to whaling (which goes one step further and targets senior executives or leaders). Furthermore, phishing attacks take place over multiple channels or even across channels; from the more traditional email-based attacks to those using voice – vishing – to those coming via text message – smishing. Regardless of the type or channel, the intent of the attack is the same – to exploit human nature to gain control of sensitive information (citation 1). These attacks typically make use of several techniques including impersonated websites, attacker-in-the-middle, and relay or replay to achieve their desired outcome.


More

CNET: FIDO Alliance looks to create standards for Internet of Things devices

The FIDO Alliance is expanding to develop security standards for IoT devices before internet of things devices boom…

Read More →

VentureBeat: You can now use your Android phone as a 2FA security key for Google accounts on iOS

VentureBeat reports that the newly certified FIDO2 security keys on Android phones can now verify…

Read More →

Dark Reading: How to Get the Most Benefits from Biometrics

The best way to defragment the biometric ecosystem is to adopt FIDO open standards and…

Read More →