81 percent of data breaks last year involved weak, default or stolen passwords, and phishing attacks have advanced 65 percent year-on-year. Protecting online privacy, status and all types of data is more significant than ever demanding more robust security applications. Lenovo and Intel today published the first PC-ready built-in authentication steps to support users’ online browsing, working and buying. Using Intel Online Connect on 7th and 8th Gen Intel Core processors, Lenovo’s latest PCs including the Yoga 920, ThinkPad X1 Tablet 2nd generation, ThinkPad X1 Carbon 5th generation and IdeaPad 720S integrate FIDO-certified authenticators undeviatingly into the core of the PCs, leading simpler and safer online authentication when logging into popular websites like PayPal, Google, Dropbox, and Facebook.Instead of depending on phrases as the sole credential for logging into websites, users now become a safer way to log in with the touch of a finger on the standard fingerprint reader through Universal Authentication Framework (UAF), or the click of a real-time, on-screen switch through Universal 2nd Factor (U2F). With these integrated FIDO authenticators, websites use security keys that are preserved and rooted deeply in the PC’s hardware, eventually increasing user protection and reducing fraud.UAF fingerprint authentication: With the touch of a finger on the encrypted fingerprint editor embedded on the PC, users can easily validate to their PayPal account.U2F with built-in 2nd-factor authentication: An additional security factor is included into the authentication process after users log in to a website using their regular user ID and password access. Instead of using a separate security key or SMS code, 2nd-factor authentication is formulated into the PC to identify the user and directly urges the user to click a button to log into websites like Google, Facebook, Dropbox and much more here.
Intel and Lenovo are trying to build UAF and U2F authentication into their devices
October 25, 2017
2 Min Read
You may also like
Mazen Elzanaty
Topics
- Articles416
- Cryptography and Encryption32
- Exploitation Tools292
- Forensics Tools23
- Information Gathering254
- Man-In-The-Middle19
- Mobile Security19
- Network Tools73
- Password Attacks48
- Pentest Linux Distributions24
- Post Exploitation32
- Reporting Tools11
- Reverse Engineering44
- Security Tools99
- Shop5
- Stress Testing1
- System Administration92
- Video Tutorials74
- Vulnerability Analysis157
- Web Application Security56
- Wireless Attacks29
Add Comment