Login Security – Getting Close to Perfection
by Jack Bicer, CTO Inventor of Uninstall, Automatic Software Updates, and Mobile Push Login Having spent years in securing logins and...

Is 2-Factor Authentication (2FA) Broken?
Recently, ThreatPost reported on how an open source tool can be used to hack 2-Factor Authentication and gain access to secure sites....

The Productivity Cost of Passwords
The average employee has 191 passwords. We crunched the numbers and see just exactly how much eliminating passwords can increase productivit

Top 5 attacked User IDs
Protect yourself from automated attacks by not using five user IDs. These five user IDs comprised 99.73% of the automated login attacks.

How were John Podesta's and General Colin Powell's emails hacked and what can you do to prot
We did some more research into the email breaches of John Podesta/DNC and General Colin Powell, discovering how the breaches happened...

Highly Effective Gmail Phishing Technique
The Phishing Attack: What you need to know A new highly effective phishing technique targeting Gmail and other services has been gaining...

Why Can't Online Payments Be as Simple as Apple Pay?
Apple Pay™ has reduced point-of-sale purchases to a single click. You simply hold your iPhone with your finger on Touch ID, swipe it past th

SEKUR.me Allows Shoppers to Pay Online with Their Fingerprint
Privately-held SEKUR Me, Inc. eliminates the online payment friction for eCommerce and mCommerce sites. Its patented technology combines sin

Why is shopping on your phone so difficult?
But there is a very serious problem with online smartphone purchases. Tiny keyboards make it very difficult to enter Credit Card, Billing an

Apple Pay Legitimizes Mobile Web Payments
Thank you Apple for having the foresight to acknowledge and legitimize mobile payments for the web. It was attractively demoed while shoppin
