#digital-identity-infrastructure

[ follow ]
EU data protection
fromwww.independent.co.uk
1 day ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
Information security
fromBusiness Matters
2 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#digital-identity
Privacy technologies
fromComputerworld
1 day ago

World ID expands its 'proof of human' vision for the AI era

World ID aims to enhance digital identity security through innovative technology and tools, but concerns about safety persist.
UK politics
fromTheregister
4 weeks ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
London startup
fromComputerWeekly.com
1 month ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
Privacy technologies
fromComputerworld
1 day ago

World ID expands its 'proof of human' vision for the AI era

World ID aims to enhance digital identity security through innovative technology and tools, but concerns about safety persist.
UK politics
fromTheregister
4 weeks ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
London startup
fromComputerWeekly.com
1 month ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
fromwww.housingwire.com
1 day ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
fromNature
5 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Wearables
fromEngadget
1 day ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
Privacy professionals
fromGSMArena.com
17 hours ago

India drops proposal to make smartphone brands pre-install unique ID app Aadhaar on their devices

The Indian government has rejected a proposal to mandate pre-installation of the Aadhaar app on smartphones due to security and cost concerns.
NYC startup
fromTechCrunch
1 day ago

Sam Altman's project World looks to scale its human verification empire. First stop: Tinder. | TechCrunch

World project integrates verification tech into various sectors, starting with dating apps, to distinguish human users from AI.
Artificial intelligence
fromTechRepublic
1 day ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Tempo Launches Private Stablecoin Zones for Enterprise Payroll and Treasury Settlements

Tempo launched Zones, a private execution environment for stablecoin transactions, ensuring transaction-level privacy for enterprises.
Digital life
fromwww.dw.com
4 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Education
fromWIRED
3 days ago

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

AI-generated deepfake nude images are impacting nearly 90 schools and over 600 students globally, causing severe emotional distress among victims.
Europe politics
fromTheregister
5 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
European startups
fromTearsheet
4 days ago

How Wise is betting on infrastructure and brand - Tearsheet

Cross-border payments face inefficiencies; Wise aims to streamline this with direct connections to local payment systems.
#age-verification
Privacy technologies
fromThe Verge
2 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
2 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
fromAbove the Law
1 day ago
Privacy technologies

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
fromTNW | Government-Policy
3 days ago
Privacy technologies

The EU says its age verification app is ready

The European Commission's age verification app uses zero-knowledge proof technology to confirm user age without exposing personal data.
Privacy technologies
fromThe Verge
2 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
2 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromAbove the Law
1 day ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
#agentic-ai
Information security
fromHarvard Gazette
1 day ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Information security
fromHarvard Gazette
1 day ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Cryptocurrency
fromBitcoin Magazine
1 day ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
#data-breach
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Digital life
fromwww.dw.com
6 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
#cybersecurity
Information security
fromNextgov.com
3 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Circle Faces Lawsuit After Drift Exploit Over Claims It Took No Action to Freeze the Funds

Circle faces legal scrutiny for failing to freeze stolen USDC after the Drift Protocol hack, raising questions about accountability in crypto infrastructure.
EU data protection
fromSecurityWeek
1 day ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
#identity-verification
Privacy professionals
fromEngadget
2 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy professionals
fromEngadget
2 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
#privacy
Privacy technologies
fromComputerWeekly.com
1 day ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Information security
fromComputerWeekly.com
2 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
#data-privacy
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#ai-governance
Cryptocurrency
from24/7 Wall St.
3 days ago

XRP News: XRP Ledger Adds Zero-Knowledge Proofs to Let Banks Transact Privately for the First Time

XRP Ledger integrates zero-knowledge proofs, allowing banks to verify transactions without revealing sensitive details.
#iam
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
fromTheregister
3 days ago

Autovista blames ransomware for service disruption

"We know that getting this resolved quickly is important to you. Our top priority is to securely restore impacted applications, although we do not have a firm timeline on this yet."
EU data protection
Privacy technologies
fromnews.bitcoin.com
2 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
Privacy professionals
fromRoute Fifty
5 days ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
#zoom
Privacy technologies
fromTechCrunch
1 day ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
Privacy technologies
fromTechCrunch
1 day ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
Privacy professionals
fromSecurityWeek
5 days ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
EU data protection
fromEngadget
2 weeks ago

Ireland is testing out a digital wallet that conducts age verification for social media users

Ireland is trialing a Government Digital Wallet to verify user age for social media access, aiming for user-friendly design before its 2026 EU deadline.
#tinder
Privacy technologies
fromwww.bbc.com
1 day ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Privacy technologies
fromwww.bbc.com
1 day ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Information security
fromArs Technica
4 days ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
#ai
fromTechzine Global
5 days ago
Information security

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromTechzine Global
5 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#digital-id
UK politics
fromwww.bbc.com
1 month ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
UK politics
fromwww.bbc.com
1 month ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
#facial-recognition
Privacy technologies
fromMail Online
2 days ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
Privacy technologies
fromGadgets 360
2 days ago

Over 75 Privacy Orgs Urge Meta to Not Develop Facial Recognition Feature

Meta's development of AI-powered facial recognition for smart glasses has sparked privacy concerns, prompting 77 organizations to urge its halt.
Privacy technologies
fromMail Online
2 days ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
Privacy technologies
fromGadgets 360
2 days ago

Over 75 Privacy Orgs Urge Meta to Not Develop Facial Recognition Feature

Meta's development of AI-powered facial recognition for smart glasses has sparked privacy concerns, prompting 77 organizations to urge its halt.
#identity-management
fromThe Hacker News
1 week ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy professionals
fromSilicon Canals
2 weeks ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy technologies
fromTechRepublic
3 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy professionals
fromMedCity News
1 month ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy technologies
fromNextgov.com
4 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
[ Load more ]