February 11, 2022
Even in his wildest dreams, the bank manager in Hong Kong would not have imagined that he would become an unwilling part of an elaborate heist. Here’s the story: he receives a call from the director of a firm requesting...
January 31, 2022
A simple data breach can spell doom for businesses. It is imperative that businesses guard their data and that of their customers as if it were sacred. There is a lot of data that businesses collect, and being in control...
January 10, 2022
The healthcare sector is increasingly embracing technology to solve challenges, especially after the pandemic exposed the strains on the system. Telehealth backed by extensive electronic health records (EHR) is fast becoming the norm; EHR adoption rates are skyrocketing at 89%....
December 30, 2021
The surface web is everything that people like you and me access. It is readily accessible with the help of standard web browsers such as Google Chrome, Mozilla Firefox, Microsoft’s Edge, and more. On the other hand, the deep web,...
December 22, 2021
Identity theft is one of the fastest-growing crimes as it is a low-risk but high-reward act and is a threat to businesses of all sizes. Hackers can easily gain access to a digital resource or application as usernames and passwords...
December 15, 2021
Colonial Pipeline, the largest fuel pipeline in the US, paid a ransom of $2.3 million in Bitcoins, to hackers. Guess what? It was the result of a single compromised password. Facebook, Instagram, LinkedIn, Volkswagen & Audi, Twitch, etc., are some...
November 16, 2021
What happens when an employee gets a phone call from the CEO of his company asking to wire $243K to a particular account? The person follows the instruction even though having a strange feeling about it. What happens next? The...
October 28, 2021
As internet penetration and mobile phone usage increase, there is a need for stronger authentication systems over the traditional password/OTP-based systems. While biometric authentication based on physiological traits like fingerprints, iris scans, etc., work well, they aren’t amenable to remote...
October 20, 2021
Voice Biometrics uses a person’s unique voiceprint to identify authorized legitimate users. The solution offers an efficient and effective mechanism for “contactless” ID verification. With voice biometrics, remembering numerous passwords, waiting for OTPs, and toggling between multiple devices can become...
September 8, 2021
Data is wealth, the future of business; it is the core of everything in this digital era. Hence, you see multi-pronged approaches towards security and privacy encompassing law & regulation, technological interventions, and cultural evolution. Biometrics is one of the...