#fido-alliance

[ follow ]
#cybersecurity
fromSecurityWeek
2 days ago
Information security

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Information security
fromInfoWorld
3 days ago

UK's NCSC calls passkeys the default, says passwords are no longer fit for the purpose

Passkeys are recommended as the primary authentication method due to their security and user-friendliness compared to traditional passwords.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Information security
fromSecurityWeek
2 days ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Information security
fromInfoWorld
3 days ago

UK's NCSC calls passkeys the default, says passwords are no longer fit for the purpose

Passkeys are recommended as the primary authentication method due to their security and user-friendliness compared to traditional passwords.
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
#digital-identity
UK politics
fromTheregister
2 days ago

UK govt shells out 550 for Digital ID panel, bans press

The UK government is forming a People's Panel to discuss a national digital identity system, compensating participants £550 for their involvement.
London startup
fromComputerWeekly.com
1 month ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
UK politics
fromTheregister
1 month ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
UK politics
fromTheregister
2 days ago

UK govt shells out 550 for Digital ID panel, bans press

The UK government is forming a People's Panel to discuss a national digital identity system, compensating participants £550 for their involvement.
London startup
fromComputerWeekly.com
1 month ago

Digital IDs edge closer to practical reality for UK businesses | Computer Weekly

The CFIT's Digital Company ID Coalition has delivered priority use cases, governance frameworks, commercial models, and a working prototype, advancing digital identity infrastructure for UK businesses from concept to practical implementation.
UK politics
fromTheregister
1 month ago

What was missing from the UK digital ID consultation?

The UK government's digital identity consultation lacks key details on pricing and audit trail duration, raising concerns about privacy and enforcement.
#remote-work
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
3 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Deliverability
fromWordtothewise
3 days ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
#privacy
Privacy technologies
fromTechRepublic
6 days ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy professionals
fromSecuritymagazine
4 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Privacy technologies
fromTechRepublic
6 days ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Mental health
fromSmashing Magazine
6 days ago

Session Timeouts: The Overlooked Accessibility Barrier In Authentication Design - Smashing Magazine

Poor session timeouts create significant accessibility barriers for users with disabilities, impacting their online experiences and tasks.
Mobile UX
fromEngadget
5 days ago

Google brings Gemini in Chrome to users in Australia, Japan, Singapore and South Korea

Gemini in Chrome is expanding to East Asia and the Pacific, allowing users to access the built-in chatbot across multiple devices.
#data-privacy
EU data protection
fromThedrum
6 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
6 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
6 days ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
6 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
Information security
fromFast Company
3 days ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
DevOps
fromInfoQ
2 days ago

HashiCorp Vault 2.0 Marks Shift to IBM Lifecycle with New Identity Federation

HashiCorp Vault 2.0 introduces significant updates, including a refined security model and Workload Identity Federation for improved secret management across cloud environments.
Deliverability
fromSecurityWeek
3 days ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
#ai-governance
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#microsoft
Information security
fromNextgov.com
4 days ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Information security
fromNextgov.com
4 days ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
#meta
Information security
fromInfoWorld
3 days ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
#generative-ai
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
3 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#age-verification
Privacy technologies
fromTheregister
3 days ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromTheregister
3 days ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Information security
fromFortune
3 days ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
#ai
Information security
fromFast Company
4 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromFast Company
4 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromTheregister
5 days ago

Panasonic creates device-locked QR codes for biometrics

Panasonic's new QR code system allows workers to present codes for entry instead of undergoing facial recognition scans, which had become a bottleneck in access control.
Privacy technologies
#data-breach
Privacy professionals
fromSilicon Canals
3 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromSilicon Canals
3 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Information security
fromZDNET
4 days ago

Google brings Auto Browse and Skills to Chrome Enterprise - and a new 'Gemini Summary'

Chrome Enterprise introduces AI features to automate tasks and enhance IT control over workplace AI tools.
fromZDNET
6 days ago

How to easily encrypt files on an Android phone - and the free app I use to do it

If you take mobile security seriously (and you should), then you might want to consider file encryption. This is all about encrypting files that you can either leave on your device and view when needed or share with others, knowing they can be viewed only by the recipient.
Privacy technologies
Information security
fromComputerWeekly.com
5 days ago

Anthropic's Mythos raises the stakes for security validation | Computer Weekly

The rise of autonomous AI in security introduces unpredictability, complicating the validation of defenses against evolving threats.
Apple
fromZDNET
1 month ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Privacy technologies
fromMail Online
1 week ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
Information security
fromBusiness Matters
1 week ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Privacy professionals
fromSecurityWeek
1 month ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Privacy technologies
fromnews.bitcoin.com
1 week ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
Gadgets
fromThe Verge
1 month ago

The smart lock standard that could replace your keys is finally here

Aliro, an open smart lock standard, enables any smartphone to unlock any compatible smart lock via digital keys stored in phone wallets, eliminating manufacturer fragmentation.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
#ai-agent-security
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromZDNET
1 month ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Privacy technologies
fromSecurityWeek
1 month ago

Google, Meta, Microsoft Among Signatories of Pact to Combat Scams

Major technology and retail companies signed an accord committing to combat online scams and fraud through prevention, cooperation, resilience, and public awareness initiatives.
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromComputerworld
2 months ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
Information security
fromZDNET
2 months ago

Can you trust LastPass in 2026? Inside the multimillion-dollar quest to rebuild its security culture

LastPass used the 2022 data breach as a catalyst to substantially strengthen security controls and prioritize consumer security beyond typical program standards.
[ Load more ]