#ikon-base-pass

[ follow ]
Information security
fromBusiness Matters
3 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#digital-identity
EU data protection
fromwww.independent.co.uk
2 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
21 hours ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
fromnews.bitcoin.com
2 weeks ago
Cryptocurrency

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
21 hours ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
NYC startup
fromTechCrunch
2 days ago

Sam Altman's project World looks to scale its human verification empire. First stop: Tinder. | TechCrunch

World project integrates verification tech into various sectors, starting with dating apps, to distinguish human users from AI.
Wearables
fromEngadget
2 days ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
fromwww.housingwire.com
2 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
#identity-verification
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
fromNature
6 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#privacy
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
fromwww.bbc.com
4 days ago

Biometric checks to be rolled out in prisons after mistaken releases

The findings of an independent review criticized recent mistaken releases as 'simply one symptom of a broken system.' The review was commissioned after Hadush Kebatu was mistakenly freed from an Essex prison in October 2025.
UK news
Digital life
fromwww.dw.com
5 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
#zoom
Privacy technologies
fromTechCrunch
2 days ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
Privacy technologies
fromTechCrunch
2 days ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
#age-verification
EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
#ai-governance
fromComputerWeekly.com
2 weeks ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
Privacy professionals
fromZDNET
5 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#tinder
Privacy technologies
fromwww.bbc.com
2 days ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Privacy technologies
fromwww.bbc.com
2 days ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
#iam
Information security
fromComputerworld
5 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
5 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
5 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
5 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Privacy professionals
fromSecurityWeek
6 days ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
#facial-recognition
Privacy professionals
fromEngadget
6 days ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
Privacy technologies
fromMail Online
3 days ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
Privacy professionals
fromEngadget
6 days ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
Privacy technologies
fromMail Online
3 days ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
#generative-ai
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromFinbold
5 days ago

Kraken insider extortion reveals remote work security blind spot

"Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals," Percoco stated.
Information security
Privacy technologies
fromnews.bitcoin.com
3 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
#cybersecurity
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
#identity-management
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Apple
fromZDNET
1 month ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
#digital-id
UK politics
fromwww.bbc.com
1 month ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
UK politics
fromwww.bbc.com
1 month ago

Government pushes ahead with revamped Digital ID

The UK government is advancing digital ID plans to streamline public services access via smartphones, shifting focus from mandatory employment verification to consumer convenience benefits.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#phishing
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Privacy technologies
fromTechRepublic
4 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#agentic-commerce
Information security
fromZDNET
1 month ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
Privacy technologies
fromBitcoin Magazine
1 month ago

Breez SDK Launches Passkey Login For Seedless Bitcoin Wallets

Breez SDK now enables self-custodial Bitcoin wallets using passkey authentication instead of seed phrases, reducing barriers to self-custody adoption.
Privacy technologies
fromArs Technica
1 month ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Privacy technologies
fromZDNET
1 month ago

I switched password managers without losing a single login - here's how

Switching password managers involves exporting passwords to CSV and importing them into a new app, then reviewing settings before deleting the old manager.
Privacy technologies
fromTechzine Global
1 month ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
fromWIRED
2 months ago

ICE and CBP's Face-Recognition App Can't Actually Verify Who People Are

Mobile Fortify, now used by United States immigration agents in towns and cities across the US, is not designed to reliably identify people in the streets and was deployed without the scrutiny that has historically governed the rollout of technologies that impact people's privacy, according to records reviewed by WIRED. The Department of Homeland Security launched Mobile Fortify in the spring of 2025 to "determine or verify" the identities of individuals stopped or detained by DHS officers during federal operations, records show.
Privacy technologies
[ Load more ]