News & events

Fraud prevention with trusted identities

April 04, 2017

Using trusted identities to fight fraud and reduce customer friction The past years was marred by data breaches, hacks and data theft. With every successful cyber attack, the black market for personally identifiable information grew, widening the pool for hackers to buy stolen identities and engage in fraud. These crimes …
Read more

Weak passwords means weak security

March 21, 2017

Passwords are the most common form of authentication used to control access to information because they are simple, inexpensive, and convenient mechanisms to use and implement. At the same time, passwords are also recognised as being an extremely poor form of protection. There are over 10 million username/password pair attacks …
Read more

SHA-1 function successful attacked

March 08, 2017

On February 23rd, a joint team from the Dutch CWI University and Google announced that they had generated the first ever collision in the SHA-1 cryptographic hashing algorithm. This industry standard is used in digital signatures and for file integrity verification, which secure credit card transactions, electronic documents. Another application …
Read more

The need for strong authentication

March 07, 2017

When users access online services, they want to be confident that nobody else can log in pretending to be them, access their sensitive personal data or use their identity to make fraudulent claims. Users want to be confident that their data and services are secured and their privacy is protected. Governments, …
Read more