Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: relying Clear Filter

How passkeys work: Going passwordless with public key cryptography

Vitalii Gulenok/Getty Images For the last five years, the FIDO Alliance -- led by Apple, Microsoft, and Google (with other companies in tow) -- has been blazing a trail toward a future where passwords are no longer necessary in order to login to our favorite websites and apps. This so-called passwordless future is based on a new form of login credential known as the passkey, which itself is largely based on another technology -- public key cryptography -- that's been around for decades. Why t

How passkeys work: Let's start the passkey registration process

Photoraidz/Getty Images Previously on our passkey journey, I talked about the challenge of figuring out if a relying party -- typically, the operator of a website or app -- even offers the ability to sign in with a passkey instead of the more traditional and less secure username and password-based approach. Some of the biggest relying parties in the world -- including Apple, Google, and Microsoft -- support passkeys as a means of passwordless authentication. Together, these tech giants can int

How passkeys work: Your passwordless journey begins here

CollinsChin/Getty Images Over the last few decades, compromised usernames and passwords have typically been at the root of some of the most sensational, damaging, and costly data breaches. An incessant drumbeat of advice about how to choose and use strong passwords and how not to fall prey to social engineering attacks has done little to keep threat actors at bay. Additional factors of authentication, such as the transmission of one-time passwords or passcodes (OTPs) over SMS or email, are wid

How passkeys work: Do your favorite sites even support passkeys?

Adam Smigielski/Getty Images Over the last few decades, compromised usernames and passwords have typically been at the root of some of the most sensational, damaging, and costly data breaches. An incessant drumbeat of advice about how to choose and use strong passwords and how not to fall prey to social engineering attacks has done little to keep threat actors at bay. Additional factors of authentication, such as the transmission of one-time passwords or passcodes (OTPs) over SMS or email, are

How passkeys work: The complete guide to your inevitable passwordless future

Owaki - Kulla/Getty Images I've been writing a lot about passkeys recently -- and with good reason. This year, some of the world's largest technology companies are doubling down on efforts to convince their billions of global users to start using passkeys instead of passwords when signing into websites, apps, and other services. Passwords versus passkeys How passkeys work Do your favorite sites even support passkeys? Join us on a typical passkey journey from discovery to registration to authe