humanID Blog

Cybersecurity & Privacy in 2022

Cybersecurity & Privacy in 2022

Strong data privacy includes understanding data technologies and databases, identifying sensitive data, establishing data usage policies, and controlling access to sensitive data.

read more
How Do I Prevent Cyberbullying on My Platform?

How Do I Prevent Cyberbullying on My Platform?

In modern times, cyberbullying is no longer an uncommon phenomenon. It is bullying that takes place through the use of modern technologies, and is intended to constantly frighten, anger, or humiliate those victims who are being targeted.

read more
Can CAPTCHA Prevent CSRF? Not by Itself.

Can CAPTCHA Prevent CSRF? Not by Itself.

CSRF, also called XSRF and pronounced “Sea-surf”, is when a malicious entity takes advantage of an authorized web session and submits requests to the server while posing as the authorized user. CAPTCHA is a type of User Interaction (UI)-based CSRF Defense. CAPTCHA cannot prevent CSRF attacks by itself, and its implementation as UI-based CSRF Defense can leave users open to attack.

read more
How to Improve Data Visibility

How to Improve Data Visibility

The methods with which we manipulate and analyze data are being held to higher standards. If used correctly, organizations that improve their data visibility can enhance their security and improve efficiency.

read more
8 Best Whistleblowing Sites

8 Best Whistleblowing Sites

Whistleblowers are individuals known to expose information deemed illegal or immoral. Join us in a tour of the best whistleblowing sites of past and recent times.

read more
Family-Friendly Single Sign-On

Family-Friendly Single Sign-On

The internet can be a dangerous place. A single sign-on can ensure a family-friendly web experience and put a lot of parents at ease when their children log in.

read more
How to (Not) Get Hundreds of Burner Numbers

How to (Not) Get Hundreds of Burner Numbers

Registration allowing burner numbers can seemingly spell trouble if attackers were to carry out a distributed denial-of-service (DDoS) attack or similar on a digital platform. In practice however, obtaining a mass amount of burner numbers is a more difficult task than it appears to be.

read more
How SSO Makes Being HIPAA Compliant Easier

How SSO Makes Being HIPAA Compliant Easier

Even with data that is not as important, a breach can enable many bad things to happen: the HIPAA act was enacted to combat this by improving security when handling PHI and ensuring that affected individuals are aware of a data breach.

read more
What is Cyber Spying?

What is Cyber Spying?

When presented with the term “spying”, what comes to mind? You may picture someone lurking in a dark alley, or blending into a crowd, watching a target from afar to document their every move. Within the past few decades however, this stereotype is not as applicable. Nowadays spying is primarily carried out online through a practice known as cyber spying.

read more
5 Privacy Steps for Better Cyber Security

5 Privacy Steps for Better Cyber Security

Cybercrime increased by an alarming 400% in 2019 and 2020 combined. What can one do to understand cybersecurity risks and better protect their privacy in a constantly changing digital world full of data leaks, ransomware, and social engineering?

read more
The Do’s and Don’t’s of Cyber Security: Passwords

The Do’s and Don’t’s of Cyber Security: Passwords

So, you might wonder, how could I protect myself from the consequences of data breaches and keep myself secure in the ever-growing digital world? For this, here is a consolidation of four cyber security password tips for you to analyze if your information is genuinely safe.

read more
What is Cyber Insurance and Who is Getting It?

What is Cyber Insurance and Who is Getting It?

Within the last year, multiple breaches have occurred leaving the data of ordinary people vulnerable to theft. Almost 10 billion online records from various sources were breached in 2019 alone. This has led insurance companies to offer cyber insurance.

read more
Can CAPTCHA Be Hacked?

Can CAPTCHA Be Hacked?

If you frequent the internet, you are likely familiar with the requests to select all the squares containing stop lights or to re-type a distorted word. These requests are examples of CAPTCHA, a system used to verify a user’s humanity before accessing a digital account. Since its release in 2007, CAPTCHA tasks have become more complicated to compensate for advances in artificial intelligence (AI) technology and its ability to learn how to crack these tests.

read more
How to Prevent Spam Without Traditional CAPTCHA

How to Prevent Spam Without Traditional CAPTCHA

CAPTCHA is not the most effective way to prevent spam. On top of being difficult for humans to decipher, most spam bots can decode these cryptic messages with ease. The Completely Automated Public Turing Test to Tell Humans and Computers Apart (CAPTCHA) is outdated. If traditional CAPTCHA was true to the original Turing test, the onus of proof should lie with the machine, not the human.

read more
Data Breaches of 2021

Data Breaches of 2021

Data breaches are nothing new in the online world. Feeling unsafe online is, unfortunately, the norm for most. While a company’s reputation may be ruined for the time being, the most important thing is that people’s personal information is put at risk because of the trust they place in companies. In just the second quarter of 2021, data breaches have increased by 38 percent compared to the first quarter.

read more
3 Reasons to Consider Passwordless Single Sign-On

3 Reasons to Consider Passwordless Single Sign-On

How often do you use the same password for your online accounts? For memorization’s sake, it is definitely tempting to reuse a password for more than one digital account. This is especially true if you are convinced that it is a strong enough password to not be cracked easily. However, just one data breach incident could allow access to the entirety of your internet activity.

read more
How to Detect Data Leakage

How to Detect Data Leakage

With an increase in remote work and internet activity, data leakages have never been more common than in this past year. Online data is frequently at risk of being used to cause personal, financial, and reputational damage to individuals and businesses. Thus, it is important to understand how data leakage works in order to implement the right prevention methods.

read more
How to Recover From Cyber Attacks

How to Recover From Cyber Attacks

Cybercrime occurs much more often than you think. A 2018 Gallup poll revealed that a quarter of American adults have experienced cybercrime. Perpetrators of so-called cyber attacks exploit businesses with weak security and less tech-savvy individuals. These numbers rise in parallel with the world’s increasing online presence, especially due to the recent pandemic.

read more
Captcha Alternatives for Mobile Apps

Captcha Alternatives for Mobile Apps

Are you a bot or a human user? It is essential that applications know the answer to this question to keep out ill-intentioned users, scammers, and bots. Failing to do so could result in fraudulent activity, scans of software vulnerabilities and malicious attacks.

read more
Are Popular Apps for Children COPPA Compliant?

Are Popular Apps for Children COPPA Compliant?

Apps are a part of our daily lives. However, convenience may come at the cost of online safety. While this is unfortunate, it is not uncommon. This in turn impacts vulnerable groups, one of the most vulnerable being children.

read more
What Does It Mean to be HIPAA Compliant?

What Does It Mean to be HIPAA Compliant?

The Health Insurance Portability and Accountability Act (HIPAA) is a set of regulations that dictate how to lawfully use and disclose individuals’ protected health information (PHI). The Department of Human Health and Services mandates that all covered entities and business associates operate in compliance with HIPAA.

read more
Open Source SSO Solutions

Open Source SSO Solutions

User authentication is one of the services that every website or online business should offer. Regardless of the implementation, the authentication must be safe and secure. Users could be authenticated by using credentials such as email, password or phone number. Yet, this diversity of credentials could result in inconvenience and is susceptible to malicious entities.

read more
How Valuable Is Your Data?

How Valuable Is Your Data?

As our lives increasingly integrate with the internet, the risks of exposing our personal data also rises. Most of your online interactions such as clicks, purchases, and social media likes are valued in the market and often used to exploit your online habits.

read more
Defining Hashing and Encryption

Defining Hashing and Encryption

Hashing and encryption are two common methods that are imposed to enhance digital privacy. It is necessary that enterprise users understand the purposes, functions, capabilities and limitations of each method.

read more
What are Identity Providers?

What are Identity Providers?

For every service that people use in their daily lives, being identified as a legitimate user is a must to have access to the service. To identify a user, businesses use a set of credentials such as username/password, email, phone number, PIN code, and others.

read more
A Guide to Privacy Policies for Minors

A Guide to Privacy Policies for Minors

Technological advances have brought about detailed privacy policies. Over the years, privacy policies have been used to ensure company transparency about their data collection. Data collection and data mining are prevalent issues, especially in the US.

read more
How to Stop Spam Comments

How to Stop Spam Comments

How to Stop Spam CommentsBy Quan Nguyen September 3, 2021 If you have spent some time on the internet, you most likely have come across spam comments. It is almost impossible to visit sites including comment and interactivity features without encountering spam. In...

read more
Why Your Business Should Implement Single Sign-On

Why Your Business Should Implement Single Sign-On

Single Sign-On solutions (SSOs) offer an opportunity to ease the navigation of the internet for users. They can resolve various complications often encountered by corporations, such as frequent password resets and CAPTCHA’s nuisance. As businesses and consumers become increasingly dependent on technology, most users have encountered these difficulties in some capacity.

read more
Priest Resigns After Lack of Privacy on Grindr

Priest Resigns After Lack of Privacy on Grindr

This month, humanID has been cooking up a lot of new projects and the tech world has made a lot of questionable decisions regarding privacy and anonymity. Keep reading to see what new things we have released in the last month. Don’t forget to reply back to this email and let us know what you think of all the new releases!

read more
How To Protect Yourself From Being Tracked Online

How To Protect Yourself From Being Tracked Online

There are a few things that simultaneously happen each time you log into your browser. Your data is accumulated, aggregated, and put to use in ways that are unbeknown to you. Even something as trivial as the meme you shared with your friend can be accessed and used to extract a piece of the puzzle that is your online identity.

read more
How to Protect Your Online Information

How to Protect Your Online Information

The pandemic has created a lot of issues, both in the real and virtual world. As a result of increased remote work and online activity, cybercrime has risen an alarming 400% in 2019 and 2020 combined. Ransomware also rose 69% in 2020.

read more
How to Stop Spam Email Submissions

How to Stop Spam Email Submissions

If you have an email address, surely you have dealt with spam email submissions. Spam messages come from illegitimate email addresses and usually contain malicious intentions. In fact, 320 billion spam emails are sent daily; 94% of malware is delivered via email spam messages.

read more
Should you use email or phone number authentication?

Should you use email or phone number authentication?

Email authentication and phone number authentication are two widely used authentication methods that are said to protect people from hackers and other cybercriminals; but, they potentially make it easier for cybercriminals to invade user privacy and protection.

read more
Top Five Single Sign-Ons

Top Five Single Sign-Ons

In this day and age, people have become increasingly wary of online privacy. Something seen in the U.S. where at least 75% of Americans say they want increased government regulation regarding data use by companies. This may not come as a surprise for most people given alleged reports on data mining from large multinational corporations (MNCs), like Target, Amazon, Facebook, and Google.

read more
Pros and Cons of Single Sign-Ons

Pros and Cons of Single Sign-Ons

The internet has expanded to the point where we have accounts for everything. Whether you are shopping online, checking mail, or even watching videos, you are likely signed into some account. The process of signing into several accounts daily may prove bothersome and inefficient. Single Sign-On (SSO) services aim to reduce the number of logins you have to perform, but are they secure?

read more
How to Stop DDoS Attacks

How to Stop DDoS Attacks

Hackers are always a step ahead of security measures. As data security quality increases, malicious entities create new methods to outperform those security measures. One of the most common attacks on the internet is Distributed Denial of Service (DDoS).

read more
Is Data Privacy a Sacred Duty for Muslims? 🙏

Is Data Privacy a Sacred Duty for Muslims? 🙏

What do the health sector, faith, and Congress have in common? Digital privacy! Or, well, problems when that privacy is violated. Read on for the latest on digital privacy breaches, some great tips on bot detection, and whether you should implement SMS authentication, from your friends here at humanID.

read more
Malicious Life and humanID: A Better Internet

Malicious Life and humanID: A Better Internet

The internet is plagued by data collection, data leaks, bots, hacking, and disinformation. Large corporations, such as Google, Facebook, Apple, Amazon, and Microsoft, collect and monetize the data they gather from users. This is because data is highly versatile and profitable, making it the most valuable asset in the world.

read more
How to Detect Bots

How to Detect Bots

Many online activities, such as playing video games and reading tweets, include the use of programmed bots. A bot is an automated software program that is used to make HTTP requests and to perform repetitive tasks efficiently and consistently. Tasks that programmed bots facilitate include filling out forms, clicking on links, listening to music on Discord, posting on websites, and many more.

read more
How does Big Tech use data mining?

How does Big Tech use data mining?

All of Big Tech collects a lot of data and utilizes data mining; consequently, these businesses become valuable assets in the global economy because collecting user data generates large earnings. After Facebook’s employees had developed apps for its business in 2008, they became very financially successful.

read more
EA Games Source Code Taken By Hackers 🎮

EA Games Source Code Taken By Hackers 🎮

The last month has been buzzing with news on privacy and misinformation while your friends at humanID have been busy putting out a lot of new content. Let’s look at what’s fresh at humanID and with the rest of the industry.

read more
How Safe are the Top SSO Solutions?

How Safe are the Top SSO Solutions?

Single Sign-On solutions (SSOs) have become increasingly popular as concerns over cybersecurity and online privacy continue to grow. SSOs simplify the login process by eliminating the need for passwords. They generally increase security and protect user privacy as cybercriminals typically target usernames and passwords. Consequently, every time someone logs into a new account, a new opportunity for an attack is possible.

read more
Best Ways to Prevent Data Loss

Best Ways to Prevent Data Loss

Personal data is constantly becoming more easily accessible and thus more susceptible to cybercrimes like data breaches. Personal data can include social security numbers, credit card information, as well as past and current addresses. Not only can data losses cause extreme privacy issues for individuals, but also mass financial and reputational complications for businesses.

read more
TikTok’s New Third-Party Integrations Create Privacy Risks

TikTok’s New Third-Party Integrations Create Privacy Risks

Assisted by the pandemic and the increasing interest in technology, internet reliance is more prevalent now than ever. Accordingly, TikTok, a video-sharing platform, has seen a surge in popularity these past few years. TikTok’s algorithm and ability to bring new and smaller content creators to the surface makes the app unique and popular. And while the platform’s influence has empowered many younger generations and grown as a whole, TikTok’s recent expansion of integration with third-party apps may have overstepped the boundaries of its power.

read more
5 Alternative Authentication Types

5 Alternative Authentication Types

Password-based authentication methods can easily be done through phishing attacks. This leads to many users not protecting their passwords. Indeed, just 54% of users use five or fewer passwords for their accounts because they do not think that people are going to gain entry into their accounts. Authentication is useful because it prevents infiltrators from accessing databases, networks, and other resources.

read more
How Companies Can Improve User Safety

How Companies Can Improve User Safety

During a time in which there is a rising prevalence of user safety attacks, only 20% of Americans totally trust the organizations they interact with to maintain the privacy of their data. More importantly, out of the 80% of Americans that do not totally trust these organizations are a lot more concerned that hackers will access their data than companies using it without their permission.

read more
Courts Force Disney to Stop Collecting Children’s Data 🧙

Courts Force Disney to Stop Collecting Children’s Data 🧙

This past month saw promising headway made in the privacy space. There were critical steps taken in AI governance, a settlement by a big-name company regarding the handling of children’s data, and attempts by an internet giant to revise its website tracking technology.

read more
What are COPPA App Guidelines and Why Do They Matter?

What are COPPA App Guidelines and Why Do They Matter?

While we stand at the peak of technology, applications on computers and smart devices threaten children’s privacy and security. With the mass production and distribution of digital devices to most of the world’s population, the internet is becoming increasingly accessible.

read more
Can CAPTCHA Prevent DDoS Attacks?

Can CAPTCHA Prevent DDoS Attacks?

With the increasing reliance on the internet and technology comes the risk of malicious attacks and data breaches. While some attacks target everyday citizens and consumers, other attacks focus on information technology companies, e-commerce businesses, government agencies, and more.

read more
How does Single Sign-On Work?

How does Single Sign-On Work?

With the rapid growth of the internet and technology comes the risks of privacy protection and cybersafety. Passwords are one of the simplest security devices the internet utilizes for use protection. However, many believe that the password has become outdated and less effective.

read more
What is Data Scraping and is it Illegal?

What is Data Scraping and is it Illegal?

Generally, data scraping refers to the extraction of data from a computer program with another program. Data scraping is commonly manifested in web scraping, the process of using an application to extract valuable information from a website.

read more
How can SMEs bolster their cybersecurity?

How can SMEs bolster their cybersecurity?

Cybersecurity isn’t something only large, high-profile corporations that handle large amounts of sensitive data should worry about. From conception, any modern enterprise will need to plan on investing in a multitude of security measures to mitigate a growing array of cybersecurity risks.

read more
Defining IAM and IGA

Defining IAM and IGA

IAM and IGA are two of the most common methods for identity management, and it is important for enterprise users to understand the purposes and functions of each system, as well as the benefits and limitations.

read more