Will Google’s Authentication without Passwords Be Safe?
I guess that’s not only me, who’s tired of passwords: we should remember them, they should be strong enough not to be guessed or brute forced, and even more, they should be different for each website. But it has recently turned out, that not only I think so. A few days ago I have come across the information that Google is testing a new system of authentication without passwords that will allow refusing the password entry...
Mobile Authentication Pros and Cons
The popularity of mobile devices increases every day. Smartphones, tablet computers, smart watches – today these lightweight portable ‘mini-computers’ are sold better than traditional desktops and laptops. This trend is set by the rhythm of modern life, full of flights and journeys – often on the other end of the world. Today, a lot of people don’t work in the traditional offices. They can work remotely in comfortable...
How does 2-factor authentication work?
Any more or less experienced Internet user came across 2FA at least once. But not everyone understands how it works. To use this powerful data protection tool more effectively let’s learn more about it. The first factor of 2-factor authentication – what we know Two-factor authentication starts with the usual standard password used for signing in on any website. Usually, the users themselves choose the password to create an...
Identification, authentication, and authorization – what’s the difference
Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better. To begin, let’s take an example from everyday life. It will help you to understand the difference between authentication and identification in general. A new employee comes to work for the first time. At the...
How to Make the Internet of Things Safe
In recent years, the Internet of Things has been developing rapidly. Today, not only computers and smartphones can access the network. Many kinds of home appliances, including refrigerators and washing machines, are also connected to the World Wide Web. The idea of such devices is certainly good: Internet connection allows you to manage them even at a considerable distance. It’s comfortable to use a smartphone on your way home to...