Existing authentication techniques are vulnerable to many attacks and abuses, such as password-capturing spyware, network sniffing, social engineering and unauthorized sharing. In this context, a new identity verification technology termed continuous authentication uses behavioural biometrics to ensure that the user is not using an identity that has been highjacked or stolen.This is performed by monitoring […]
Read More