article thumbnail

News Alert: W3C advances technology to streamline payment authentication

The Last Watchdog

The World Wide Web Consortium today announced a standardization milestone for a new browser capability that helps to streamline user authentication and enhance payment security during Web checkout. Customer authentication For the past 15 years, e-commerce has increased as a percentage of all retail sales.

article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. The next big thing is passwordless authentication. First and foremost, most solutions rely on connected devices like mobile phones to authenticate users. Some solutions do this today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The case for shifting to ‘personal authentication’ as the future of identity

The Last Watchdog

I currently have over 450 accounts that use passwords combined with a variety of two-factor authentication methods. Related: How the Fido Alliance enables password-less authentication. Only a dozen or so of my accounts get authenticated via self-hosted services. Scale to come. Sharing protocols.

article thumbnail

Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors

Security Affairs

In this advisory, I aim to explore how implementing a specific security technological combination (TLS and DDNS) negatively influences the overall security, inadvertently creating opportunities for attackers to exploit weaknesses on a massive scale. 509 certificate for the DDNS domain, it inherently creates an information disclosure risk.

DNS 119
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities (..)

article thumbnail

Personal Information of Millions of US Voters Available on Dark Web

Adam Levin

Databases containing the personal information of millions of U.S. Cybersecurity researchers have determined the records are authentic and current as of March 2020. The post Personal Information of Millions of US Voters Available on Dark Web appeared first on Adam Levin. voters have appeared on Russian hacking forums.

Hacking 281
article thumbnail

T-Mobile spills billing information to other customers

Malwarebytes

Some T-Mobile customers logged into their accounts on Wednesday to find another customer’s billing and account information showing on their online dashboards. It said a "temporary system glitch" had misplaced some subscriber account information, causing it to appear on other subscribers’ profile pages. So, stay tuned!

Mobile 110