BioCatch public
[search 0]
More
Download the App!
show episodes
 
BioCatch presents a podcast on cybercrime and financial fraud, and how Behavioral Biometrics identifies the tells that tip the hands of cybercriminals – and flip the tables on fraudsters. We explore the origins of behavioral biometrics, and applying innovative tech to account take overs, new-account fraud, and scams and mule activity.
  continue reading
 
The weekly podcast covers relevant issues and breaking news from AVISIAN. AVISIAN Publishing produces a suite of online and print publications focused on identity, credentialing and security markets. The company’s thirteen online titles cover distinct technology and application verticals and the print magazine, Regarding ID (Re:ID), is a global leader in this rapidly growing technology sector. Collectively, more than 30,000 subscribers and one million annual web visitors get their ID technol ...
  continue reading
 
Loading …
show series
 
In Episode 8 of Digital Tells we speak with Suzanne Sando, Senior Fraud and Cybersecurity Analyst at Javelin Strategy and Research. BioCatch recently published a report written on our behalf by analysts at Javelin Strategy and Research titled New Account Fraud A Threat Down Every Avenue. In this discussion, Suzanne discusses many aspects of new acc…
  continue reading
 
The sixth episode of Digital Tells: A BioCatch Podcast examines the market for behavioral biometrics. What are the top challenges in preventing fraud in digital channels, and what technologies are on the radars of fraud practitioners? How do organizations like BioCatch partner and innovate with financial institutions to identify and isolate the Dig…
  continue reading
 
The Fourth episode of Digital Tells: A BioCatch Podcast dives into the phenomenon of online money mules. What is a mule? How does one become a mule? Why do or why should financial institutions care about mule activity? And what can be done to detect mules? We open with commentary from Julie Conroy, Head of Risk Insights and Advisory at Aite-Novaric…
  continue reading
 
The fourth episode of Digital Tells: A BioCatch Podcast focuses on scams and social engineering. Why is there so much scam activity these days? Why are these scams so successful? And what, if anything, can financial institutions do to help protect themselves and their customer? We open with a first-hand story of a brilliant social engineering, told…
  continue reading
 
The third episode of Digital Tells: A BioCatch Podcast tackles the global epidemic of identity theft, and the resulting fraudulent accounts that ruin personal credit ratings, perpetuate mule activity and money laundering, and drain institutions of $Billions annually. Tom O’Malley joins us again to discuss why most account opening fraud occurs onlin…
  continue reading
 
The second episode of Digital Tells: A BioCatch Podcast looks at how sophisticated cybercrime networks perpetrate mass account take over fraud. Former U.S. federal prosecutor and consumer identity expert Tom O’Malley shares an overview of the GozNym cybercrime network, from which three members were prosecuted in 2019. We also talk with Jonathan Bar…
  continue reading
 
The inaugural episode of Digital Tells: A BioCatch Podcast explores the origins of behavioral biometrics with BioCatch founder Uri Rivner and Chairman and CEO Howard Edelstein. The episode begins with host Peter Beardmore’s visits with his elderly mother and aunt, both having recently been targeted by scammers. Their stories illustrate the prevalen…
  continue reading
 
In the third episode of a four-part podcast series, SecureIDNews explores the current landscape of state pilots around mobile driver’s licenses. The mobile IDs are rolling out in a series of innovative trials and many additional state legislatures are instructing their DMVs to prepare. Hear about the ‘state of the states’ in this episode of our pod…
  continue reading
 
In the second episode of a four-part podcast series, SecureIDNews investigates both the privacy concerns and the opportunities for privacy enhancement that arise when traditional ID cards and credentials migrate to mobile devices. Mobile ID is poised to play a role in credentials including driver’s licenses, sporting licenses, professional licenses…
  continue reading
 
The name Stephanie Schuckers is almost synonymous with liveness detection in biometrics. But it doesn’t end there. Dr. Schuckers is also a professor at Clarkson University, director of the Center for ID Technology Research, founder of a biometric startup and mentor to an ongoing crop of new biometric scientists. Last year, the startup she founded w…
  continue reading
 
Biometrics was neither a household term nor a ‘handset technology’ when Frances Zelazny began working with facial recognition two decades ago. During her career she has helped shape the use of biometrics for security, identity and now for payment applications. Throughout, she has advocated for responsible use guidelines and practices, something tha…
  continue reading
 
Liane Moriyama retired last summer as Administrator of the Hawaii Criminal Justice Data Center and she is honored for her innovative career as a 2017 winner of the Women in Biometrics awards. She was instrumental in bringing the first AFIS to Hawaii and helping other states to follow suit. But it is her crossover between the use of biometrics for l…
  continue reading
 
Creator of the FBI's Biometric Center for Excellence and Deputy Assistant Director of the Information Services Branch of CJIS, Kimberly Del Greco is a go to biometrics lead for the Federal government. She was instrumental in the Next Generation Identification Program that redefined algorithms and modalities to increase the agency's biometric match …
  continue reading
 
In this first episode of a four-part podcast series, SecureIDNews explores the use of IDs and credentials on mobile devices. Agencies and issuers are rapidly working to augment their physical ID cards and documents with mobile versions, expanding both security and functionality. Learn how and why from key industry leaders during this kick-off to ou…
  continue reading
 
“I came into this field not as an expert in biometrics. My background is in marketing and events,” says Isabelle Moeller, chief executive of the Biometrics Institute and a 2017 Women In Biometrics winner. Moeller joined the fledgling Biometrics Institute in 2002 to help grow the organization’s membership. The institute shares information and provid…
  continue reading
 
In this podcast, SIA’s CEO Don Erickson and SecureIDNews Publisher Chris Corum talk about the 2017 Women in Biometrics awards, highlighting the program’s growth over the years and what it has come to mean to the international biometrics and security community. Nominations are open until Sept. 29 so don’t delay.…
  continue reading
 
In this podcast episode, SecureIDNews' Gina Jordan talks with Colin Wallis about Kantara's three pilots recently funded by the Department of Homeland Security. Each pilot focuses on a unique aspect of digital identity – such as addressing first responder authentication and the use of derived credentials from PIV cards. The pilot recipients include …
  continue reading
 
The eventual demise of the plastic card seems inevitable to many working with government issued credentials, thanks to the security and convenience of mobile as an ID. But will mobile be a replacement or a complement? In this podcast, we explore this question and preview a webinar that delves deep into the topic of co-existence.…
  continue reading
 
“We don’t want to confuse existing customers or future customers that Cogent’s been lost or disappeared,” says Gemalto’s Neville Pattinson, in this episode of the re:ID Podcast series. “It’s now an additional part of the Gemalto portfolio. So we’ll continue to brand it in terms of Cogent from a biometrics side.” In the podcast, you’ll learn just wh…
  continue reading
 
In this podcast, Andre Boysen of SecureKey talks about his company's work with the Digital ID and Authentication Council of Canada (DIACC) and IBM to develop a digital identity network using blockchain technology. He believes the world must transition from user name and password based authentication to secure methods that put the user in control of…
  continue reading
 
The industry organization that for more than two decades promoted the use of smart cards is expanding its mission to include other secure technologies. The Smart Card Alliance recently became the Secure Technology Alliance to reflect this new focus. The group's longtime executive director, Randy Vanderhoof, talks about the organization's plans and …
  continue reading
 
The biometric authentication system of the future may include passwords sent through the human body. Researchers at the University of Washington have come up with a uniquely secure way to transmit data. They say it can be done using low-frequency transmissions generated by fingerprint sensors and touchpads found on devices we use everyday. Vikram I…
  continue reading
 
The September 11, 2001 terrorist attacks sent Dr. Nicole Spaun on a new career path. “The hijackers went through airports. They had surveillance and they couldn’t match up the faces because the automated systems didn’t exist at the time, and they didn’t have enough trained people to look at all the imagery,” Spaun says. At that time Spaun had a bac…
  continue reading
 
Automobiles are vulnerable to being hacked these days much like computers. It’s becoming more common for modern cars to come equipped with on board computers and other electronic systems that connect to the Internet. But often forgotten in this equation is securing these systems with necessary authentication and security systems. Security researche…
  continue reading
 
In the future, your access to secure areas may depend not on a password or fingerprint – but your brain. Researchers at Binghamton University in New York have developed a way to verify a person by measuring the brain’s response to certain stimuli. The team is reporting up to 100% accuracy with the technology, known as Brainprint. A problem for most…
  continue reading
 
EveryKey, a device that can enable access to mobile devices, laptops and even a car or home, zoomed to 676% of its crowd funding target on IndieGogo earlier this month. The product also has a recognized name backing it, John McAfee, the guy who founded a wildly successful anti-virus company and is now running for U.S. president as a Libertarian Par…
  continue reading
 
Many bold claims were made about facial recognition technology in the wake of the September 11, 2001 terrorist attacks in the U.S. Vendors said facial recognition could spot wanted criminals in a crowd and perhaps stop terrorists from entering the country. The reality was quite different as it turns out that the technology works best with cooperati…
  continue reading
 
Innovations in biometric authentication are slowly moving consumers away from passwords for online checkouts. These advancements include the MasterCard Identity Check suite of solutions that prove a consumer’s identity while simplifying online transactions. A MasterCard global survey of about 10,000 consumers found that 53% of frustrated shoppers f…
  continue reading
 
NIST, the National Cybersecurity Center of Excellence and the NSTIC National Program Office are working together on a new project focused on protecting privacy and security when reusing credentials online. The trio is accepting comments on the project, which will examine how commercially available privacy-enhancing technologies may be integrated in…
  continue reading
 
Galois, a Portland-based company that focuses on cyber security primarily for the U.S. government, is the final winner of the fourth round of NSTIC pilots. Galois and its partners will build a tool that relies on biometric authentication to enable the storing and sharing of private information online. They also intend to develop transit ticketing o…
  continue reading
 
The latest round of NSTIC pilot awards announced by the National Institute of Standards and Technology (NIST) includes a two-time winner. MorphoTrust USA received a grant last year to pilot the creation of an electronic ID in North Carolina for accessing online services with the same security and identity authentication as in-person transactions. W…
  continue reading
 
The National Institute of Standards and Technology has announced a fourth round of grant awards in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC). One of the winners is HealthIDx, which is developing a privacy-enhancing technology that protects patients’ identity and information. This project will pilot a “triple blin…
  continue reading
 
World leaders in the identity management industry will be in Washington D.C. September 28 and 29 for the 7th edition of the eID Conference. Some 300 delegates are expected for panel discussions and keynotes speeches about the global eID infrastructure, driver license technology and the digitalization of citizen ID documents. “It’s an opportunity fo…
  continue reading
 
World experts in terrorism and border security will be in Washington D.C. in September to discuss threats and solutions around the global movement of terrorists. The gathering is hosted by BORDERPOL, a nonprofit organization that supports border agencies worldwide. The group will examine one of the biggest culprits in successful terrorist travel: l…
  continue reading
 
It’s been nearly three years since the first grant award winners were chosen for the National Strategy for Trusted Identifies in Cyberspace (NSTIC) pilot projects. Three rounds of pilot winners have been selected each year since 2012, and a fourth round will be announced in the coming weeks. We check in with all of the previous winners for the fall…
  continue reading
 
Evgeny Chereshnev, the global head of social media for IT security company Kaspersky Lab, was trying to figure out how individual’s can have better control over their personal information and decided on an experiment. It started with him implanting an NFC chip in his hand and trading in his work badge and he’s hoping it will to continue with more a…
  continue reading
 
GlobalPlatform develops specifications for the interoperable deployment and management of multiple applications on secure chip technology. Those specifications include a focus on the Trusted Execution Environment (TEE). The association has announced the launch of a TEE Security Evaluation Secretariat. The move is designed to accelerate the deployme…
  continue reading
 
Computers can’t replace humans when it comes to tattoo recognition. That’s a key finding from the Tattoo Recognition Technology Challenge Workshop hosted by the National Institute of Standards and Technology. But computer algorithms are getting better, and new standards are being considered for the collection of tattoos. While tattoos are a seconda…
  continue reading
 
The dark world of the web is exposed in a case study by CSID called Hacking the Hackers. The ID theft protection firm conducted an experiment this spring that shows why it's bad practice to reuse passwords. CSID created a fake company, complete with employees who had social media accounts and credit cards, and exposed some of the company's sensitiv…
  continue reading
 
Some private school students and staff in St. Louis are making use of biometrics in their day-to-day comings and goings. A facial recognition system has been installed at St. Mary's High School. The cameras green light the faces recognized by the software system - or reject them if they've been labeled a threat. School president Mike England spoke …
  continue reading
 
Many people don’t have easy access to the Internet, yet state governments and others are increasingly moving services online. How do the states ensure that these people have access to these services and are able to enroll an identity? Regarding ID's Gina Jordan posed these questions and more to ABI Research's Phil Sealy.…
  continue reading
 
The UN Refugee Agency has begun deploying a Biometrics Identity Management System (BIMS) after a successful pilot. The goal is to enable displaced travelers to move between camps without having to be enrolled at each new stop. The system is global and will eventually allow biometric information to be communicated between camps. The agency’s Sam Jef…
  continue reading
 
A bill passed by the Virginia General Assembly and is awaiting the governor’s signature will go a long way toward enabling Virginians to dump most of their passwords in favor of a single digital identity credential. The proposal would establish uniform standards for strengthening and authenticating digital identities. Supporters say developing thes…
  continue reading
 
Insurance and banking provider USAA is rolling out biometric authentication on its mobile app. The company says face and voice recognition capability should be available nationwide to all of its 10.6 million customers in the coming weeks. USAA caters to members of the military and their families. The biometric login can only be used statewide on sm…
  continue reading
 
Iowa is America’s first state to take steps toward implementing a digital driver’s license. The Iowa Department of Transportation has been talking about the possibility with identity provider MorphoTrust USA for about a year. The concept is being readied for a pilot phase, and planners are looking at the potential of a public launch in 2016. Questi…
  continue reading
 
Body recognition biometrics may be the most accurate form of authentication, based on theoretical research conducted at the University of Adelaide. PhD student Teghan Lucas – working with supervisors Maciej Henneberg and Jaliya Kumaratilake – used an old online database of body measurements from 4,000 U.S. military personnel to come up with this sy…
  continue reading
 
The Minutiae Interoperability Exchange Test (MINEX) is nearly a decade old, born out of Homeland Security Presidential Directive-12, which calls for interoperable credentials for federal employees. The National Institute of Standards and Technology operates the test, which measures the performance of fingerprint matching software based on the stand…
  continue reading
 
Loading …

Quick Reference Guide