![](https://www.mitacs.ca/wp-content/uploads/2023/12/generic-logo-background.png)
Existing authentication techniques are vulnerable to many attacks and abuses, such as password-capturing spyware, network sniffing, social engineering and unauthorized sharing. In this context, a new identity verification technology termed continuous authentication uses behavioural biometrics to ensure that the user is not using an identity that has been highjacked or stolen.This is performed by monitoring […]
Read More