To view or print these papers you will need the Adobe Acrobat Reader. You can download the latest version here
A Phishing Story
With realistic risk assessment, it is possible to build a
cost-effective, scalable solution to counteract Phishing.
The user must be considered and the need for changes must be
Science Behind Passfaces Significant research
has been conducted regarding the brain's ability to
recognize faces. The brain treats face recognition
differently than it does shapes and objects which
serves as the core technology of Passfaces.
Passfaces and FFIEC Guidance An effective authentication
method should have customer acceptance, reliable
performance, scalability to accommodate growth, and
interoperability with existing systems and future plans.
Countermeasures for Phishing and Malware Reports of phishing attacks
have inundated the press. The cleverness of
social engineering has again damaged the prospects for
online commerce, and online banking services in particular.
(NIST) Electronic Authentication Guideline Technical guidance to
Federal agencies implementing electronic
Passfaces is included in this guideline in Section A.2 of
the Appendix, pg. 52, as an allowable alternative or adjunct
to text passwords.
Technologies to Defeat Online Identity Theft
Report From Anti-Phishing Working Group Surveys and
Analyzes Technologies to Combat ''Phishing''; U.S.
Department of Homeland Security-Commissioned Report
Recommends Technologies to Defeat Online Identity Theft;
author Aaron Emigh of Radix Labs.