Your Pass Sun, 09 Jan 2022 19:10:48 +0000 en-US hourly 1 Your Pass 32 32 Free Boogie Down Emote in 2022 Sun, 09 Jan 2022 14:00:07 +0000

Fortnite players are used to earning rewards for completing specified tasks in the game. The Boogie Down dance emote can also be unlocked in the same way by completing a simple task.

In 2018, Epic Games offered players the Boogie Down emote to activate 2FA with their Epic Games account.

Here is the new Boogie Down emote! Enable two-factor authentication and receive the emote for free #Fortnite

2FA or two-factor authentication is a security measure that helps prevent data loss and identity theft. Fortnite players have the option of securing their account with 2FA.

There is no other way to receive the Boogie Down emote in the game. The reward is only available to players who have 2FA enabled, even in 2022.

However, Boogie Down can still be unlocked in Chapter 3, and this article will provide all the information you need to unlock this epic emote for free.

How to activate 2FA in Fortnite Chapter 3?

There are three different ways that players can enable two-factor authentication on their Epic Games account. This can be done through an app, text, or email. The easiest method is to do it by SMS. However, if the players are on their PC and have no external device on them, it is better to go for the email method.

Below are the steps Fortnite players must follow to activate 2FA via email:

  1. Log into the Epic Games website on the browser
  2. Click on “Account” and go to “Password and security”
  3. Players will find two-factor authentication once they scroll down
  4. Click on “Email Authentication” and open the email registered to the Epic Games account on another tab
  5. Players will find a “Security Code” sent to them in the registered email.
  6. Copy and paste the security code to complete the process

Fortnite players can watch the official Epic Games video on the topic below to better understand the process.

After completing the simple steps above, players will need to relaunch their Fortnite app. Once they log in, the Boogie Down emote should be unlocked for them.

Source link

Tackling the increasingly lucrative dumping of the biometrics market in court Sat, 08 Jan 2022 18:15:21 +0000

iProov is the latest winner in the biometrics investment competition, but is also being sued by FaceTec for alleged violations of vividness detection patents in one of the week’s most read industry articles. A new biometric selfie partnership for Yoti and a new biometric passport provided by IN Groupe reflect the challenges of the market. National digital ID projects are also advancing in Ethiopia, Malaysia and Greece, as are authentication technologies for the automotive sector with an innovation from LG Electronics and a pair of contracts for Precise Biometrics.

Top biometric news of the week

iProov has made headlines twice this week; once for a series of FaceTec allegations regarding misuse of protected life sensing technology. In a lawsuit, FaceTec accuses its competitor of stealing intellectual property and violating the terms of its biometric spoofing bounty program. The plaintiff’s legal efforts will be directed by its new CLO, and will seek an injunction and damages.

The next day, iProov announced a $ 70 million growth investment from a Silicon Valley-based company that it plans to use to advance its biometric authentication and vitality detection technology in U.S. markets. and international. A partner from Sumeru Equity Partners will join the company’s board of directors. iProov has also publicly denied FaceTec’s claims.

Ethiopia and Malaysia each plan to make their digital identity systems widely accessible for the benefit of citizens. Ethiopia’s planned digital ID card program targets 95% coverage within four years to help people access services and trade across borders, while a Malaysian government agency has said it intends to issue digital identities and digital signature infrastructure to expand access to online services.

Greece is considering expanding its digital identity system from the current vaccine certificate verification function to a complete digital wallet solution that stores digital IDs and mobile driving licenses. The GR wallet is expected to launch in the coming months and eventually provide access to a wide range of government services and other institutions requiring identity verification.

The UK government is preparing to certify private sector digital identity verification services for use by employers and landlords reviewing applicants, opening another front for the growth of identity verification. Identity verification providers are busy pending, with a new partnership for Yoti, details of Blinking’s European expansion plans revealed and iDenfy launching an improved phone verification tool.

LG Electronics has developed a system that allows drivers to start their vehicles with facial biometrics, as well as perform driver monitoring and gesture recognition. Also in the automotive field, Precise Biometrics has entered into two licensing agreements with original design manufacturers to provide its fingerprint algorithms.

The startup Somalytics has invented a capacitive sensor that it says offers new possibilities for gesture recognition, with an ultra-thin form factor and the ability to detect a person from a distance. Meanwhile, a team of university researchers contributed to a new method of recognizing gestures in the field, with the intention of bringing the technology to mainstream devices.

IN Groupe is providing Seychelles with its first biometric passports, due to be issued this year, and has been recognized for its past work on identity documents. An industrial group rewarded the work of IN Groupe on digital ID in France but also on Residence permits in Monaco.

An IPO with reduced ambitions was just the start for SenseTime stock, which doubled in its first days of trading. The obvious investor interest contrasts with the experience of many Chinese publicly traded peers of the facial recognition and computer vision giant.

Mitek is the latest biometrics provider to be sued under the Illinois Biometric Information Privacy Act, for biometric verification of selfies used by a customer of the rideshare service. The client is alleging violations of BIPA’s informed consent requirements. Recent regulations reinforce the idea that the safest winners are lawyers.

Women in Identity Co-Founder and Executive Director Emma Lindley has been named a Member of the Order of the British Empire by the Queen of England for her contribution to inclusion and diversity in digital identity in the Kingdom United and around the world.

Please let us know of any content we should convey to people in the biometrics industry and the broader digital identity community in the comments below or via social media.

Articles topics

biometric alertness detection | biometrics | digital identification | digital identity | facial biometrics | financing | identity verification | lawsuits | Research and development

Here are the picks of technology expert Marc Saltzman of the Consumer Electronics Show Sat, 08 Jan 2022 09:00:00 +0000

Marc Saltzman has been talking about technology since before technology was so cool, and long before it was around every moment of the day.

Tech Talk is Saltzman’s CFRA radio show.

This week, the tech expert has appeared on radio, television and newspapers across North America, reviewing the latest innovations at the massive Consumer Electronics Show. CES has just ended in Las Vegas.

“Although this has still happened, many exhibitors decided not to attend in person, out of caution, as many technical journalists did,” says Saltzman.

Our “go-to-tech-guy” joined us this week at News at Noon with the innovations he wanted to share. He is also introducing technology that will change his relationship with his dentist.

Nothing says 2022 more than a virtual interview on a famous technology show that we see virtually.

“Nothing beats practice, of course, but there were still several impressive announcements and screenings, virtually, including robotics and autonomous vehicles, equipment for entertainment enthusiasts and smart home devices,” says Saltzman. .

“CES, of course, provides a glimpse into the near future of consumer electronics trends. It was the show that launched pop culture products such as Camcorder & CD Player (1981), DVDs (1996), HDTV (1998), DVR (1999), Satellite Radio (2000 ), Xbox (2001), Blu-ray Disc (2003) Smart TV (2005), Tablets (2010), Driverless Cars (2013), and 4K TVs (2014), to name just a few notable examples.

Here, Saltzman shares some of the highlights from this year’s show.

LG G2 Series 97 inch OLED TV

“If you thought your 60 inch TV was big, LG has unveiled the world’s first 97 inch OLED TV as part of its Gallery (G2) line of OLED TVs, which deliver unprecedented levels of contrast, rich colors , high brightness, wide viewing angles and slim design. Powered by webOS 22, these TVs are smart too, supporting voice typing, smart search, personalization, as well as NFC Magic Tap (to mirror a mobile device’s screen to the TV), as well as sharing room-to-room, which can mirror content from one TV to another in the house. LG also showed their “Object” TV, which can be fully or partially covered in fabric when not in use. “

Lenovo thinkbook

Lenovo ThinkBook Plus Gen 3

“This is the first 17.3-inch ultra-wide laptop with an 8-inch secondary display to the right of the keyboard. For example, you can participate in a Zoom call on the main screen but take notes with a digital pen (included) on the smaller screen. Digital artists can edit photos on the smaller screen, which will appear on the larger screen. Or turn the side screen into a giant calculator. It can also mirror your smartphone, if you want. In other words, this laptop will be perfect for multitasking. Like many Lenovo ThinkPad laptops, the ThinkBook Plus Gen 3 also includes Privacy Guard (reduces visibility at side angles) and Privacy Alert (which alerts you with an onscreen shield icon if the webcam detects someone throwing one eye over your shoulder).


Moen smart faucet with motion control

“Like its 2021 predecessor, this kitchen faucet lets you run your hand over the sensor to start and stop the water flow, but you can now also control the temperature using gestures in the air. Swipe left for hot, right for cold, and down for hot. An application also allows you to customize the parameters (temperature and movement). You can also talk to him, through a smart speaker, to even ask for a certain amount of water, for example by saying “Ask Moen to give me a cup of hot water.” Clever! Some of the models that will debut later in 2022 don’t have a handle at all.


Philips Sonicare Power Flosser

“Confession time: I hate flossing. Like, I won’t. No more lying to the dentist or dental hygienist (and they know I’m lying). Fortunately, something to truly replace manual flossing is coming this January. This handheld device features exclusive QuadStream technology, which sprays water in an “X” shape to cover more areas of the tooth. Philips says it can do more in less time (compared to manual flossing); up to 9x more coverage, which can remove 99.9% of plaque in 60 seconds. There is a wired and wireless model.


Chevrolet Silverado EV 2024

“Officially unveiled Wednesday by GM CEO Mary Barra, this all-electric pickup has a range of up to 640 km on a single charge! This is powered by GM’s Ultium platform, which also supports DC fast charging, up to 350 kilowatts, which in plain English means you can get up to 160 km of EV change in just 10 minutes. It also supports SuperCruise, the industry’s first true hands-free driver assistance technology, which operates on more than 320,000 km of Canadian and US highways. Reservations begin now, but the vehicle will not be available until fall 2023.

Source link

How to ensure the robustness of neural networks using FoolBox? Sat, 08 Jan 2022 07:32:20 +0000

Most of the advanced machine learning models based on CNN can now be easily fooled by very small changes to the samples we are going to make a prediction on, and the confidence in such a prediction is much higher than with normal samples. . So, in order to improve our performance on such samples, we need to test the model before mass production. In terms of the robustness of the model, in this article we will talk about adversarial attacks and a Python-based toolkit that can help us test some predefined attacks using a unified and simple API. Here are the main points covered in this article.


  1. What are enemy attacks in Machine Learning?
  2. Possible attack strategies
  3. How can Foolbox be used for the robustness of the model?
  4. Structure of FoolBox
  5. FoolBox implementation

Let’s start the discussion by understanding the contradictory attacks.

What are enemy attacks in Machine Learning?

Adversarial machine learning is a type of machine learning that tries to exploit patterns by creating hostile assaults based on publicly available pattern data. Failure of a machine learning model is the most common explanation.

The vast majority of machine learning algorithms were created to work on certain sets of problems with data coming from the same statistical distribution for training and testing. Opponents can provide data that violates this statistical assumption when these models are applied to real-world data. This material could be organized in a way that takes advantage of vulnerabilities in the system and taints conclusions.

A adversarial attack is a method that causes the machine learning model to misclassify objects by making small changes to them. Such attacks are known to be vulnerable to neural networks (NNs). Historically, research into conflicting methods began in the field of image recognition. It has been shown that minor changes in images, such as adding insignificant noise, can lead to significant changes in classifier predictions and even completely confuse ML models.

Consider the following demonstration of conflicting examples: starting with an image of a stop sign, the attacker now usually adds a small disturbance in an attempt to force the model to make a false prediction as a sign of yield, what the model does as calculated. The two images look identical to us, but since the model is based on numbers, adding such a disturbance has a significant impact on the pixel values, leading to a false prediction.


We will now discuss commonly known or identified attack strategies.

Attack strategies


The most common type of attack is a breakout attack. Spammers and hackers, for example, frequently try to avoid detection by masking the content of spam emails and malware. Samples are tampered with in order to avoid detection and to be classified as legitimate. It does not imply that you have control over the training data. Image-based spam, in which spam content is embedded in an attached image to avoid textual analysis by spam filters, is a good example of evasion. Another example of evasion is spoofing attacks on biometric verification systems.


Poisoning is the process of contaminating training data in contradictory ways. Data collected during operations can be used to retrain machine learning systems. Intrusion detection systems (IDS), for example, are frequently recycled using this data. An attacker could contaminate this data by injecting malicious samples into the system during operation, causing recycling to fail.

Model flight

Model theft (also known as model extraction) is the act of an adversary probing a black box machine learning system in order to reconstruct or extract the data used to train the model. This can be difficult if the training data or the model itself is sensitive and proprietary. Pattern theft, for example, could be used to extract a proprietary pattern of stock trading, which the opponent could then use for financial gain.

Attack by inference

Inference attacks take advantage of overgeneralization of training data, which is a common flaw in supervised machine learning models, to identify the data used in training the model. Attackers can do this even if they do not know or do not have access to the parameters of a target model, posing security risks for models trained on sensitive data.

How can Foolbox guarantee the robustness of the model?

Foolbox is a new Python module for creating contradictory perturbations as well as quantifying and comparing the robustness of machine learning models. Foolbox communicates with the most important deep learning frameworks including PyTorch, Keras, TensorFlow, Theano, and MXNet, and supports a variety of conflicting criteria, including targeted misclassification and top-k misclassification, as well as various measures of distance. Let us now briefly see the structure of FoolBox.

Structure of FoolBox

Five elements are needed to create conflicting examples, and those elements result in the five pillars of FoolBox: First, a model that takes an input such as an image and makes a prediction, say class probabilities. Second, a criterion for determining what constitutes an opposition, for example a misclassification.

Finally, a distance measure is used to determine the size of a disturbance, for example the L1 norm. Finally, an attack algorithm generates an accusatory disturbance using the input and its label, as well as the model, the accusatory criterion and the distance measure.

FoolBox implementation

In this section, we’ll look at a few use cases for this toolkit. As we discussed earlier, this framework supports most of the widely used deep learning frameworks, to work with the desired framework make sure you have it installed, then just using pip install the FoolBox .

In this example we will be using TensorFlow. First, we’ll need to create our transfer learning model (tf.keras.applications, in this case I’m using the ResNet50), which we’ll then pass to Foolbox’s TensorFlowModel class. A similar class is available for other frameworks. We also need to specify the preprocessing expected by the respective model, such as inverting an axis, converting from RGB to BGR, subtracting the mean and dividing by std, as well as the space limits of input, which must only contain the values ​​expected by the model.

import foolbox as fb
import tensorflow as tf
import numpy as np
import matplotlib.pyplot as plt

# Tensorflow based
model = tf.keras.applications.ResNet50V2(weights="imagenet")
preprocessing = dict()
bounds = (-1, 1)
fmodel = fb.TensorFlowModel(model, bounds=bounds, preprocessing=preprocessing)

Now that we have also launched the ResNet and FoolBox model, before we proceed with the formulation of the attack, we need to have a sample of image data that can be obtained directly using Foolbox, which comes with functions support under the utils package which provides a small set of sample images. from different sets of computer vision data.

Images, labels = fb.utils.samples(fmodel, dataset="imagenet", batchsize=16)

To launch an attack, you must first create an instance of the corresponding class. Foolbox uses a wide variety of adversarial attacks. Each attack begins with a model for locating opponents and a criterion for defining what an opponent is. Misclassification is the default criteria.

It can then be applied to a reference entry and to the corresponding label which the adversary must approach. The internal hyperparameter tuning is used by attacks to find the least disturbance.

For example, when implementing the famous Fast Gradient Sign Method (FGSM), it looks for the smallest step size that converts the input to opponent. As a result, manual tuning of hyperparameters for attacks such as FGSM is no longer necessary.

As shown below, we can choose the type of attack and under which we can feed the Tensorflow model. In addition, epsilons are defined which are nothing other than the level of disturbance that we want to test.

# Intialize the attack class
epsilons = np.linspace(0.0, 0.005, num=20)
attack = fb.attacks.LinfDeepFoolAttack()
raw, clipped, is_adv = attack(fmodel, images, labels, epsilons=epsilons)

Now we can just check the robust accuracy by averaging is_adv and doing that in epsilons as well.

# accuracy when model is attacked
robust_accuracy = 1 - np.float32(is_adv).mean(axis=-1)
# visualizing the result
plt.plot(epsilons, robust_accuracy)
plt.title('Perturbation Vs Accuracy of the Model')


As we can see from the graph above, when there is 0 perturbation, the model accuracy is at its highest when the toolbox starts testing epsilon values, and the accuracy tends to decrease so quickly even for a very small change in disturbance. From this, we can say that models based on neural networks are very prone to such attacks.

Through this article, we have discussed the contradictory attacks in neural networks and the possible attack strategies that can be considered. On the other hand, to ensure the robustness of the model, we have discussed a framework called FoolBox which aims to test our model by predefined attacks, and finally we can check the quality of our model.

The references


Source link

FIFA 22 account hack crisis: EA just scored an own goal Fri, 07 Jan 2022 20:50:09 +0000

Make no mistake: With a deluge of hacking attacks on FIFA 22 player accounts and people losing millions of Ultimate Team Coins, it’s becoming a crisis for EA SPORTS.

Since mid-December, a handful of big names in the content creation community have been hit with account hacks, from RunTheFUTMarket to Bateson87. However, it would be misleading to suggest that correct large accounts have been targeted. It’s just one of those things where the best streamers have stolen the headlines, but the issue is big enough that everyone is worried.

Hundreds of requests to cover this story were sent to Dexerto’s press office, many of whom were regular gamers with no outlet. They’ve exhausted all of their options with EA’s live chat, pinged EA’s help on Twitter, and tried everything else available to them.

Among those affected by account hacks was FUT Donkey, who told us they lost 50 million coins, worth over $ 3,000 on the black market. It would cost immeasurably more to acquire this type of in-game currency by simply packing players with FIFA Points, making traders the perfect prey.

EA statement on FIFA 22 account hacks

After asking the developers for an official statement, they released one on Friday morning, January 7.

After two to three weeks of outcry in the community, it was starting to sound like an echo chamber. They had demanded responses from developers as more accounts were hacked, meaning the wait for a statement regarding the takeovers was at its height. The players were probably thinking “this could be my chance to get some clarification on how my case is being handled”. Well, frankly it wasn’t.

He said: “We have been made aware of recent account takeover attempts and are currently investigating.

“More information on how to secure your account, including enabling two-factor authentication, is available here,” along with a link to their 2FA tutorial page.


Here are some safety guidelines recommended by EA on their website.

Not only was this a bummer for all hacked users with 2FA already enabled, it didn’t provide any assurance that cases were being looked at individually. Of the users Dexerto spoke to, many also engaged with EA employees and indicated that 2FA did not protect them before this statement was released.

This left fans wondering if the cases were being looked at individually and hinted that the root cause of the problem – allowing hackers to infiltrate accounts, steal coins, and potentially take personal data – is still unknown to the creators. Game.

Second statement: Top Bins Live

FIFA Community Manager Shelden Rogers echoed those sentiments during an appearance on EA’s Top Bins Live.

He said: “Our teams are currently investigating and trying to understand what exactly happened in each of these cases,” before pushing players towards two-factor authentication, doubling the initial response.

In the meantime, there doesn’t appear to be an obvious process for affected users – a different process from other general customer feedback channels, not 2FA – to make sure the team knows your account has been hacked. It could be improved, sure. It appears to be ‘sit down and wait for the investigation to be over’, but there is no guarantee as to the outcome. This is causing anxiety among the player base.

For a microtransaction-based game mode, amid accusations that it promotes play with its FUT pack system, there is no indication yet that people’s hard-earned coins will be restored. If audiences lose faith in the developers’ ability to keep their money safe, what does that say about the future of the series?

With an increasing number of FUT clubs being attacked by cheaters, the response and action taken to resolve the issue and protect users should be a top priority. People should feel like they have someone in their corner, working hard against a solid plan.

However, they don’t feel that way.

FIFA 22 hacked the ultimate team trader

The total number of FIFA 22 players affected by account hacks is unknown at the time of writing.

FIFA 22 players react

Since the statement was released, many affected players have expressed their views on social media, with trader FUT Donkey saying they are now seeking legal advice to continue the hacking situation.

They also said: “EA’s statement is an absolute disgrace. All of us hacked T100 content marketers / creators had 2FA enabled, stop trying to enlighten us. Obviously, they think they are above the law or just don’t care.

Another, from ADWfifa, said: “The statement EA just made regarding the hacking scandal shows just how incompetent they really are … How can they tell people to make sure 2FA is on when the problem is do people get around that? “

In an article for The Mirror, Nathan Bliss wrote, “With each day that goes by without a resolution to this issue, more and more players are at risk of having their information exposed by hackers, so forget about TOTY, EA needs to fix this issue. . a top priority, to protect the data and personal information of their players.

What is very clear is that people wanted to see concrete steps that need to be taken by EA to tackle the issue, return stolen coins to accounts and restore some of the trust that was also lost in this process. .

Right now EA SPORTS must stand up for its players, protect their money, secure their private information, and fight this with a firm response. The final lines of statement communications fail to answer these key points, leaving more questions than answers – and you have to say that is a personal goal in the fight against hackers.

Source link

Officers apprehend wanted man on indecent assault warrant Fri, 07 Jan 2022 17:41:14 +0000
CBP officers escort wanted person to US port of entry. USCBP Image
– Advertising –

Texas border affairs

LAREDO, Texas—United States Customs and Border Protection (CBP) officers at the Laredo Port of Entry arrested a man at the gateway to the International Bridge of the Americas who had a pending warrant in Noblesville, N.Y. Indiana, for pedophilia.

“Our officers remain vigilant to ensure the security of our borders and apprehending wanted persons with pending warrants is an important part of carrying out our border security mission,” said Albert Flores, Director of the Laredo Port of Entry. .

The arrest took place on Wednesday January 5 at the Gateway to the Americas international bridge. A CBP officer in charge of vehicle trafficking from Mexico referred Roberto Casso, a 79-year-old US citizen, for a secondary inspection. After escorting the passenger to high school, a subsequent biometric check through law enforcement databases confirmed the subject had an arrest warrant for pending child molestation being pursued by the sheriff’s department from Hamilton County to Noblesville, Indiana.

CBP officers confirmed the warrant was active. CBP turned Casso over to the custody of the Webb County Sheriff’s Office.

The National Crime Information Center (NCIC) is a centralized automated database designed to share information between law enforcement agencies, including pending warrants for a wide range of offenses. Based on NCIC information, CBP agents have already arrested wanted individuals for homicide, escape, money laundering, robbery, drug distribution, child sexual abuse, fraud, theft and military desertion. . Criminal charges are just allegations. Defendants are presumed innocent unless and until their guilt has been proven by a court.

– Advertising –

Source link

SoYou turns to FacePhi for remote customer onboarding Thu, 06 Jan 2022 23:03:30 +0000

FacePhi signed its first new agreement of 2022. The company has agreed to provide remote integration and identity verification services to SoYou, a financial services start-up founded in 2018 specializing in consumer loans, financing and insurance policies for the automotive sector.

FacePhi and SoYou are both based in Spain, although SoYou is also part of the French group Crédit Agricole Consumer Finance (CACF). The company is trying to make financial services more accessible and user-friendly, with a platform that allows ordinary people to get their loan applications approved in real time with as little hassle as possible.

That’s where FacePhi comes in. Thanks to the new partnership, potential SoYou customers will be able to access the company’s products with just a selfie and a photo of their ID. FacePhi’s technology uses optical character recognition to read and verify document information, and facial recognition to match the selfie to the person depicted in the document image. The process can be done on a mobile phone or through a web browser on a PC.

SoYou’s services comply with the latest European PSD2 regulations. FacePhi, meanwhile, believes more financial service providers will embrace biometrics as part of a larger trend of digital transformation within the industry.

“Companies like SoYou are at the forefront of the digitalization of the banking and financial sectors, where the simplification of procedures, the protection of personal data and cybersecurity are elements of vital importance,” said FacePhi CRO Jorge Sanz. “Digital identity verification is the next step for the entire industry, both for the convenience it offers to users and for better protection against fraud. “

Spain’s Ministry of Industry, Trade and Tourism ranked FacePhi as a strategic company in November. FacePhi was also the SME of the Year of the Spanish Chamber of Commerce in 2020. The company currently provides integration services for several financial institutions and for the various passenger screening systems of AENA.

January 6, 2022 – by Eric Weiss

Paytm allows users to make payments by tapping the phone on a PoS machine Thu, 06 Jan 2022 07:48:28 +0000

In an effort to further facilitate payment services, Paytm today announced the launch of ‘Tap to Pay’ which allows users to make instant payments through their registered Paytm card by simply tapping their phone on a PoS machine. .

The service can be used even if the phone is locked or if there is no mobile data or Internet connection. Paytm’s Tap to Pay service is available to paid Android and iOS users through Paytm all-in-one PoS devices and also PoS machines from other banks.

To use the Tap to Pay option on the Paytm app, follow the quick steps:

1. Choose an eligible registered card from the list of cards or click “Add a new card” on the Tap to Pay home screen

2. Provide the required card details on the next screen.

3. Accept the conditions of use of the issuers for Tap to Pay

4. Provide the OTP received on your mobile phone number (or email id) registered with the card.

5. You will now be able to see the activated card at the top of the Tap to Pay home screen.

Additionally, Paytm uses its robust technology to convert the 16-digit Master Account Number (PAN) of the selected card into a secure transaction code or “digital ID”. is not shared with any third-party payment processor. When a user visits a point of sale, they can simply touch and pay on the PoS device, without having to share their card details during the transaction.

It allows payments to be made at all points of sale that have card distributors that support NFC (near-field communication). Cards can be managed through a dedicated dashboard on the Paytm app which offers a section on card transaction history and can also change the primary tokenized card at any time in a few simple steps. The dashboard also allows the user to modify or de-tokenize the card whenever necessary.

The Paytm spokesperson said: “The true digitization of financial services can only happen when it is not hampered by data limitations. With the introduction of Tap to Pay, we now allow our users to perform all digital transactions with or without mobile data. This service is supported by Paytm All-in-One PoS, as well as most major banks and card networks to provide our users with the widest range of choices. “

To subscribe to Mint newsletters

* Enter a valid email address

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our app now !!

Source link

not “sophisticated at all” scheme. Thu, 06 Jan 2022 02:42:18 +0000

HARRISBURG, Pa. (WHTM) – The Pennsylvania Department of Labor and Industry (L&I) on Wednesday admitted for the first time that hackers were diverting Pennsylvanians’ unemployment compensation checks into fraudulent accounts and that the new The state unemployment benefit system did not use common security. measure, which cybersecurity experts have called a “minimum standard,” to prevent attacks.

The admission follows a week of reporting by abc27 News on the attacks.

L&I “has detected an escalation in attempts by fraudsters to steal unemployment benefits through increasingly aggressive and sophisticated programs,” a department spokesperson told abc27 News and later in a report. press release sent to all media.

How sophisticated?

“The system doesn’t look sophisticated at all,” said Jonathan S. Weissman, senior lecturer in the computer security department at the Rochester Institute of Technology (NY), corroborating a view expressed at abc27 earlier in the report. week by another cybersecurity expert. “Cybercriminals find usernames and passwords – and try them. If they work, they work.

The problem, according to both? The system lacks multi-factor authentication, which would require someone to change their banking information to physically own – for example, although it could be something else – the legitimate requester’s cell phone.

Get daily news alerts, weather and breaking news straight to your inbox! Subscribe to abc27 newsletters here

“Multi-factor authentication, a two-step process that will add an additional layer of protection, will be added for requesters,” the L&I statement said on Wednesday, confirming the current absence of such a process.

“L&I takes seriously its responsibility to protect taxpayer dollars and the personal data of individuals. We will continue these efforts in an aggressive and transparent manner, ”L&I Secretary Jennifer Berrier said in the statement.

Job seekers who called and emailed abc27 News, following the first report, told similar stories from L&I phone reps telling them the problem was widespread and started shortly after the migration summer to the new system. L&I previously disclosed fraudulent attempts to file new jobless claims – and identity verification measures to combat those attempts – but not the hacking and embezzlement of existing accounts.

Why the timing of Wednesday’s announcement?

“Definitely the story on TV,” said the woman who first reported the scheme. “It is certainly not a coincidence. They were fully aware of the issues long before I brought it to your station.

She credited the report but also other viewers who came forward, indicating the potential extent of the problem.

L&I has yet to reveal the full extent of the problem, in terms of the number of claimants whose money has been stolen or the amount of money stolen, or whether it can be recovered.

The woman who originally reported the issue and another viewer told abc27 on Wednesday that their issues were resolved after the first story. Others said they were still waiting.

“It’s horrible. You have to empathize” with the victims of theft, said Senator Kristin Phillips-Hill (R-York), who chairs the State Senate’s Communications and Technology Committee . “If we just put a few more procedures in place to make these accounts more secure, we probably wouldn’t be having this conversation today.”

She also credited the report and the viewers who shared their stories.

“I have absolutely no doubt that telling these stories spurred action,” said Phillips-Hill.

The problem? “We don’t have the assurance that the best practices are put in place, so you see what happened with this unemployment benefit system,” she said.

Part of the potential solution, according to Phillips-Hill? The legislation it is sponsoring would require the involvement of a state office of information technology (ILO) in large information technology projects like the new unemployment system.

“And they would set cybersecurity standards across state government,” she said. “I should believe that if something like this had been in place we might have avoided this.”

Phillips-Hill said last year’s attack on the colonial pipeline was – like the hack into the unemployment system – surprisingly unsophisticated. “It was a leaked password that caused this whole scenario,” she said.

Source link

Trust Stamp Inc Advances Its Innovative Intellectual Property Portfolio Wed, 05 Jan 2022 15:20:58 +0000 CEO Gareth Genner: “Trust Stamp’s strong privacy-focused patent portfolio protects the unique benefits of our product offerings and enables us to deliver unparalleled security, utility and privacy, at a fraction of the cost of traditional biometric solutions ”

Trust Stamp Inc (OTCQX: IDAI, EURONEXT: AIID) reports that it is advancing its innovative intellectual property portfolio.

In a statement, the company said the United States Patent and Trademark Office has authorized the issuance of two non-provisional U.S. patent applications as patents and issued a request for a third non-provisional U.S. patent application.

“Through our significant investment in research and development, Trust Stamp’s strong, privacy-focused patent portfolio protects the unique benefits of our product offerings and enables us to provide security, utility and privacy. unprecedented, at a fraction of the cost of traditional products. biometric solutions, ”said Gareth Genner, CEO of Trust Stamp (OTCQX: IDAI, EURONEXT: AIID), in a statement.

READ: Trust Stamp Announces Strategic Growth Plan in Africa

“Our commitment to innovate in secure, privacy-focused identity verification and trust solutions has fueled our global and cross-industry growth as we identify and respond to the compounding challenges and changing demands of consumers to provide security. digital services and strengthen our competitive advantages in corporate security and fraud prevention, data protection and privacy, and affordability solutions, ”added Genner.

The company said its application for “Systems and Processes for Lossy Biometric Representations” was granted patent approval on December 9, 2021.

The invention protects biometric data through irreversible tokenization, a key differentiator of Trust Stamp’s innovative identity approach (OTCQX: IDAI, EURONEXT: AIID). This core technology cryptographically masks biometric information to provide a secure means of authentication that protects the privacy of individuals and mitigates potential damage due to loss or compromise of data.

The process encodes the biometric information through a neural network that destroys much of the source data, inserts a key, and transforms the resulting data to create an anonymized representation known as the Irreversibly Transformed Identity Token (IT2). Trust Stamp’s IT2 technology (OTCQX: IDAI, EURONEXT: AIID) can be applied to any data from any source, for accurate, protected, and small footprint identification and deduplication.

The company said the “Systems and Methods for Verification of Passive Matter in Digital Media” application was cleared for release on December 17, 2021, complementing Trust Stamp’s comprehensive presentation attack detection capabilities. with technology that detects the vividness of an individual’s photos or videos without requiring their active physical movement for a low friction user experience.

The company’s advanced proof-of-life algorithms provide a layered approach to block presentation attacks, to ensure that only the authorized person can access their accounts and sensitive data.

The company said the third application for “Vividness Verification Biometric Encryption Systems and Methods” was released on December 2, 2021.

This innovation builds on the security and fraud resistance of Trust Stamp’s proven biometric capture, tokenization and comparison technologies by determining whether biometric information is provided by an individual live or has been tampered with through methods including the use of printed images, recorded videos and face masks that modify the characteristics.

Contact the author:

Follow him on Twitter @PatrickMGraham

Source link