The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?
Why Is Two-Factor Authentication Necessary? Increasingly more companies are using two-factor authentication in their online operations. Sometimes, it surprises or even annoys their users. They may think: why waste my precious time on entering additional characters? Isn’t a password sufficient? With the widely spread advanced computer technologies, we have possibilities that our parents could only read about in science fiction novels....
Selfie Based Authentication in Banking System: “Latest Fad” or Increased Protection Reliability?
It is no secret that for a long time now MasterCard has been working on solving the problem of authentication in the banking system and testing an application that would use traditional two-factor authentication to authenticate customers and authorize online purchases based on the face recognition technology and not numerical codes. In other words, to be able to pay with a credit card online, the card holder would have to take a...
What Hides Beneath SMS Authentication?
We have to pay for everything in life. Whatever you may call it — the law of conservation of energy, karma, or Divine Providence — that is how it is and how it will always be. In the 19th century, a postal courier loyal to his sovereign would risk his life delivering a letter to the addressee, which took up to a month, protecting it from any possible foes. In the 21st century, data exchange is carried out instantly, but it is a lot...
Tokens with the CWYS Function
To test the CWYS function and learn more about 2-factor authentication visit our demo page: Demo Protectimus offers the following OTP tokens with the CWYS (Confirm What You See) function support: Protectimus Ultra Protectimus Smart Protectimus SMS Protectimus Mail Let’s look at them in more detail. Protectimus Ultra It is a physical (hardware) token that has a number of advantages as compared to other hardware tokens,...
Detailed Information on Data Signing
In response to new challenges, Protectimus has developed a powerful means of protection against auto-filling, injecting, and other types of malicious software that manipulates and modifies data during transactions. There are different ways in which such software can work; for example, the recipient is changed during a transfer as an unsuspecting user enters a one-time password sent via an SMS message. The problem is that this user...