Hardware Authentication. A Year in Retrospective

Key achievements in challenges in authentication hardware in 2016 and challenges of the coming 2017

Government-sponsored hacking reached absolutely new heights this year, overshadowing even major corporate hacks. Therefore, the public and experts started looking for solutions. This led to increased media attention to emerging forms of reliable end user authentication, including hardware-based wearable solutions. Then investors and corporate roadmaps also reacted, directing their attention to the hardware authentication market.

What is Wrong With the Browser Passwords?

What is Wrong With the Browser Passwords?

Internet browser is the most used computer software. Besides browsing, we are increasingly using it for video chatting, creating spreadsheets and even brewing tea or watering gardensSince late 1990-ies browsers are kindly asking if we would like them to save our passwords. However, is this option safe? Winston Churchill once compared trusting passwords to your browser to having unprotected sex with a stranger. It is fun, yet you never know what you might end up with…