#badge-consolidation

[ follow ]
fromNature
1 day ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Privacy professionals
fromZDNET
1 hour ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#ai-governance
fromComputerWeekly.com
1 week ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

New SEC Guidance Targets DeFi Interfaces, Self-Custodial Wallets, and Execution Routing Disclosures

Crypto trading interface operators can avoid broker-dealer registration if they meet 12 specific conditions outlined by the SEC.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Toronto startup
fromnews.bitcoin.com
6 days ago

TRON Network Integrated into Hyperlane, Expanding Interoperability to Over 150 Chains

TRON Network integrates with Hyperlane, enhancing cross-chain interoperability for developers to build applications across multiple blockchains.
#cybersecurity
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromNextgov.com
5 days ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Deliverability
fromnews.bitcoin.com
1 week ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
fromnews.bitcoin.com
4 days ago

Securitize Integrates With TRON to Bring Tokenized Real-World Assets to One of the World's Largest Blockchains

Tokenization is about bringing real-world financial assets onto infrastructure that can support global scale and continuous market access, said Carlos Domingo, Co-Founder and CEO of Securitize.
Cryptocurrency
#discord
fromKotaku
2 months ago
Privacy technologies

Discord To Require Age Verification By Face Scan Or ID Starting In March

fromKotaku
2 months ago
Privacy technologies

Discord To Require Age Verification By Face Scan Or ID Starting In March

Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
#generative-ai
fromBig Think
2 weeks ago
Digital life

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#bitcoin
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
6 days ago

Nunchuk Releases Open-Source Tools For Bitcoin Agents With Bounded Authority

Nunchuk introduces open-source tools for AI agents managing Bitcoin wallets with limited control and human oversight.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
6 days ago

Nunchuk Releases Open-Source Tools For Bitcoin Agents With Bounded Authority

Nunchuk introduces open-source tools for AI agents managing Bitcoin wallets with limited control and human oversight.
Privacy professionals
fromSilicon Canals
1 week ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
#reddit
fromThe Verge
2 weeks ago
Privacy technologies

Reddit accounts with 'fishy' bot-like behavior will soon need to prove they're human

Privacy technologies
fromMashable
2 weeks ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Privacy technologies
fromThe Verge
2 weeks ago

Reddit accounts with 'fishy' bot-like behavior will soon need to prove they're human

Reddit is implementing a bot identification system requiring some users to verify their humanity through methods like fingerprint scanning or ID submission.
#identity-management
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
#web3
Information security
fromnews.bitcoin.com
6 days ago

Web3 Security Provider Certik Opens AI Auditing Tool Access to Global Developers

Certik launched its AI Auditor, achieving an 88.6% hit rate against security incidents, enhancing proactive defense in Web3.
#digital-identity
London startup
fromComputerWeekly.com
4 weeks ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
London startup
fromComputerWeekly.com
4 weeks ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Circle Launches CPN Managed Payments for Banks and PSPs to Settle in USDC Without Holding Crypto

Circle launched CPN Managed Payments, enabling banks and fintechs to process USDC transactions without managing digital assets.
Artificial intelligence
fromTheregister
4 weeks ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Currenc Group Tokenizes Ordinary Shares on Ethereum and Solana via Securitize

Securitize has tokenized Currenc Group shares on Ethereum and Solana, marking a significant advancement in public equity tokenization.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Information security
fromnews.bitcoin.com
2 weeks ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Privacy professionals
fromZDNET
3 weeks ago

Incogni review: The easiest way to remove myself from the internet took just seconds

Incogni is a data removal service that helps reduce personal information exposure by targeting data brokers, with plans starting at $8/month and offering identity protection features.
Privacy professionals
fromTheregister
4 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy technologies
fromArs Technica
4 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Trust Wallet Launches Agent Kit That Lets AI Execute Crypto Transactions

Trust Wallet launched the Agent Kit, enabling AI agents to execute crypto transactions while keeping users in control.
Privacy technologies
fromArs Technica
3 weeks ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Privacy technologies
fromBitcoin Magazine
3 weeks ago

Breez SDK Launches Passkey Login For Seedless Bitcoin Wallets

Breez SDK now enables self-custodial Bitcoin wallets using passkey authentication instead of seed phrases, reducing barriers to self-custody adoption.
Privacy professionals
fromFast Company
1 month ago

Crypto is in its "cloned cell phone" era

1990s cellular fraud cost the industry $650 million annually until carriers implemented authentication systems and law enforcement coordination that dramatically reduced cloning crimes.
Information security
fromZDNET
4 weeks ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
#agentic-commerce
fromblog.logrocket.com
2 months ago

What are the key challenges in scaling MFA for large organizations? - LogRocket Blog

Most design specs break down in development because they're built for designers, not developers. This article shows how to write specs that reflect real-world logic, states, constraints, and platform behavior not just pixels. Rafael Basso Jan 20, 2026 11 min read A practical guide to AI in UX design, covering predictive UX, generative assistance, personalization, automation, and the risks of overusing AI. Shalitha Suranga Jan 14, 2026 11 min read
UX design
Marketing tech
fromThe Drum
2 months ago

Web3 isn't dead! Here are 3 brands building on the blockchain in 2023

Brand enthusiasm for NFTs and web3 surged in 2021–2022 but collapsed after crypto scandals and the rise of AI shifted marketing attention.
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Information security
fromSecurityWeek
1 month ago

The Human IOC: Why Security Professionals Struggle with Social Vetting

Security teams must apply the same rigorous vetting standards to people and organizations as they do to security information to avoid reputational damage and poor decision-making.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromTelegraph
2 months ago

How to Join the Agent Internet in 2026: A Practical Guide

What Is the Agent Internet? In early 2026, a new layer of the internet has emerged -- one built by and for AI agents. Over 95 platforms now exist where autonomous AI agents communicate, trade, create, play, govern, and conduct research. This is not a speculative whitepaper. It is happening right now. The Agent Internet is a decentralized network of platforms where AI agents -- not humans -- are the primary users.
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Identity spoofing against older adults alone grew by 8x between 2020 and 2024, driven in part by convincing AI impersonations of friends and loved ones. It's a problem costing people in the U.S. nearly half a billion dollars a year with no end in sight.
Privacy technologies
Artificial intelligence
fromPsychology Today
2 months ago

What If API Tokens Became a Universal Monetary Standard?

A universal token standard for AI computational work would create a common unit of account, making the economy of intelligence legible and enabling integrated multi-model systems.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
Information security
fromKotaku
1 month ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
#age-verification
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
[ Load more ]