Remove tag
article thumbnail

MIT's minuscule terahertz RFID tag foils counterfeiters with metallic glue

TechSpot

In 2020, MIT improved radiofrequency identification technology by designing a cryptographic tag several times smaller and cheaper to make than traditional RFID tags. It improved the security of standard RFID authentication by using terahertz radio waves. Read Entire Article

article thumbnail

Adding Security Keys to Your Authentication Toolbox

SecureWorld News

A quick intro to security keys: A security key can work in place of other forms of two-factor authentication such as receiving a code through SMS or pressing a button in an authentication app. When it came to authenticating, both keys worked just fine. For me personally, I'll suffer the higher price tag for the YubiKey 5.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cisco tags critical security holes in SD-WAN software

Network World

Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device. Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio.

WAN 216
article thumbnail

eBay purchases sneaker authentication service Sneaker Con

The Verge

eBay has bought out sneaker authentication service Sneaker Con, a company that gives sneaker-lovers the peace of mind that the kicks they’re purchasing are real. There, the sneakers are thoroughly vetted by experts who ensure that the sneakers are authentic and match the description of the original listing. Image: eBay.

article thumbnail

Privacy, Authenticity, and Confidentiality

Phil Windley

Summary: Authenticity and privacy are usually traded off against each other. At a recent Utah SSI Meetup , Sam Smith discussed the tradeoff between privacy, authenticity and confidentiality. Authenticity allows parties to a conversation to know to whom they are talking. The following diagram illustrates these tradeoffs.

article thumbnail

Provisional Authenticity and Functional Privacy

Phil Windley

Summary: Provisional authenticity and confidentiality can help us manage the trade offs between privacy and authenticity to support online accountability along with functional privacy. Authenticity is often driven by a need for accountability 1. Technically, this is a bias toward authenticity at the cost of privacy.

article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.