The buzz: Are you really “you”?
Authentication techniques designed to confirm you are who you say you are, typically entail one or more of three techniques: "Something I have", "Something I know," "Something I am". Thus, accessing the things and information we value can range from easy – like physical keys to our home and our car – to complex passwords intended to protect the privacy of our medical records and national secrets. But we're in a hurry. And as we clamor for faster, easier processes, persistent thieves are toiling overtime to continue stealing our identities and our money. Aye, t
|