The use of multi-factor authentication

factor authentication Only in the latter case, it is necessary to analyze not the movement of the pen on the paper, but the movement of the mouse on the pad. Scientists from IBM, having studi this issue, came to the conclusion that mouse control by a specific person is as individual as handwriting, and modern machine learning methods can easily distinguish one user from another by their “mouse handwriting”.

The “mouse signature recognition factor authentication

Function, develop at the IBM christmas island email list 150000 contact leads Cybersecurity Research Center at Ben-Gurion University (Israel), is now includ in the IBM Trusteer Pinpoint Detect platform, expanding the capabilities of biometric user identification. According to experts, this method will be in demand by financial institutions when conducting online transactions of clients. The bank can remotely identify suspicious “signatures” and make appropriate decisions, for example, by blocking a transaction or conducting additional identity verification.

The company’s experts believe that no authentication

Method can guarantee 100% reliability, and to increase confidence in the authenticity of the client, they recommend using a whole set of identification tools available in the Trusteer Pinpoint Detect system. is especially important when conducting remote transactions, when a bank employee cannot explicitly verify the client’s identity.

The platform’s functionality enables the protection of web resources

Ffrom account takeovers and fraudulent transactions by analyzing traditional device IDs, geolocation data, and transaction modeling, as well as key fraud indicators. All of this information is analyz using big data technologies that enable patterns to be identifi and events to be correlat with time, users, and transactions.

Respond to government requests

Google has releas adb directory information about a critical vulnerability in Windows 10
IncreaseVulnerability in win32k.sys file discover by Google allows attackers to escalate local privileges in the Windows kernel
Vulnerability in win32k.sys upsell to an upgraded version of the same product file discover by Google allows attackers to escalate local privileges in the Windows kernel
The Google Threat Analysis Group blog has publish information about a Windows 10 zero-day vulnerability before the release of a corrective security update.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top