article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

Commonly, this involves using scare tactics in an attempt to bypass the user's rational mind and emotionally manipulate them into action without them second-guessing the authenticity of the request. Multi-factor authentication (MFA): If an employee receives a suspicious request, MFA can save the day if used correctly.

article thumbnail

DID Messaging: A Batphone for Everyone

Phil Windley

Summary: DID Messaging can provide a secure, authenticated, and verified channel for every relationship you have. In my last post, I wrote about a demo given by BCGov, Spark NZ, and Streetcred ID at the last Internet Identity Workshop. That demo caused a lot of people to download and try out Streetcred ID's digital wallet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. My workspace is part office, workshop, laboratory, and mechanical room. (Photo courtesy of Dick Hardt).

Internet 106
article thumbnail

The Laws of Identity

Phil Windley

It's no coincidence that Internet Identity Workshop got started in 2005. The parties in a relationship can use the private DIDs and their associated public keys to mutually authenticate. In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF).

Banking 88