Credential systems enable users to obtain credentials from organizations and demonstrate possession of these credentials. There are three types of players in a basic credential system: users, organizations and verifiers. Such systems are made up of protocols for a user to join the system, register with an organization, obtain multi-show credentials and show such credentials. Anonymous credential systems allow users to authenticate themselves while still protecting their privacy. This article takes a look at the advantages and disadvantages of credential systems and anonymous credential [...]
This article takes a look at Operation High Roller, a financial fraud ring that has targeted high-value accounts belonging to businesses and individuals across the globe. This ring develops on Zeus and SpyEye techniques and is highly automated, bypassing physical multi-factor authentication, automates mule account databases, performs server-based fraudulent transactions and attempts transfers to mule business accounts. It is estimated that at least $78 million has been stolen by Operation High [...]
Efficient and accurate authentication of individuals is a growing challenge across a number of sectors. There are currently three main forms of authentication, based on something you know, something you have and something you are. The third form is especially interesting in light of biometric technologies as a means of verification. This article explores some recent applications of biometrics in Ontario.
OLG and OIPC Announcement
On November 12, 2010, Tom Marinelli, the Acting CEO of the Ontario Lottery & Gaming Corporation (OLG) and Dr. Ann Cavoukian, the Ontario Information & Privacy Commissioner (OIPC), announced a new development in privacy-protective facial recognition technology. [...]
According to the OPC (Office of the Privacy Commissioner), the concept of identity is defined simply as how a person is known, either by other people, or by an organization. An individual’s identity is a distinguishing set of information that may vary from context to context. For instance, family and friends may identify a person by certain traits; an employer might identify a person by role, skill or position; and a service provider might identify a person by a unique identification number. This article examines identity concepts and identity management systems that citizens come in contact with on a daily basis, as well as the possibility of a national identity [...]