The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or not is called risk based authentication. Traditional username and password along with information such as who the user is, from where the user is logging… Continue reading Risk Based Authentication
Passwords and personal identification numbers (PIN) are information that we need to remember since the day we started interacting with digital systems. Do we know the count of passwords we need to remember? Do we know if we forgot a password already? Some of these passwords also known as passphrase are long to remember that… Continue reading Biometrics Authentication
Toronto is on a strike. Dumpster diver may have access to public garbage dump sites.
Shaheen’s thoughts on using Facebook
Do we trust our medical history with our physicians and hospitals? Such information need to be encrypted or obfuscated.
Shaheen shares a personal experience on identity theft