Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.

We also use third-party cookies that help us analyze how you use this website, store your preferences, and provide the content and advertisements that are relevant to you. These cookies will only be stored in your browser with your prior consent.

You can choose to enable or disable some or all of these cookies but disabling some of them may affect your browsing experience.

Currently Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

All Posts

Tell-Tale Signs You’ve Been Hacked

Tell-Tale Signs You’ve Been Hacked

There are a number of ways cyber criminals can burglarise your computer and there are tell tale signs that will pop up to warn you that you are not alone. Fake antivirus messages, sudden appearance of unsolicited toolbars and redirected internet searches are just a few ways fraudsters have broken into your system to make mischief. Bogus antivirus messages These…

Read more

How to Avoid a QR Code Scam

How to Avoid a QR Code Scam

Online opportunists have wasted no time in sussing how to use QR codes to commit cybercrime. As quick as counting to three, this way they can access your personal details and use them in a number of ways that can wreak havoc. Fake QR codes are increasingly creating chaos with regular reports of unsuspecting users finding a zero balance on…

Read more

The Economic Value of Digital Identification

The Economic Value of Digital Identification

The value of digital ID verification is well known and proven by and for governments, border agencies and large financial institutions. In terms of national and financial security, robust ID checks keep whole populations and economies safe, in a very real way. What is perhaps not so well appreciated is the actual economic value that digital identification brings with it.…

Read more

Keep your identity to yourself

Keep your identity to yourself

Gone are the days when forging someone else’s signature was the most common form of identity theft, but these days this art of impersonation has found far easier routes and these don’t always involve illegal online operations. Closer than you think Hacking or exploiting a computer system is probably the hardest for the crooks to crack. These crimes are often…

Read more

Selfies Struggling to Gain Security Status

Selfies Struggling to Gain Security Status

In the age of the selfie, it makes sense for many members of the online ID verification community that they be part of the onboarding process. With timestamps and high quality digital images, there is a strong argument that a selfie can be a legitimate element of the verification process. This is especially true if applicants have limited access to…

Read more

Be Gone Phishing

Be Gone Phishing

You might have heard of this new phrase on the cyber block but have never really understood what it meant. Phishing is as flaky as it sounds – it is a fraudulent attempt to obtain sensitive data such as usernames, passwords and credit card details under the guise of a trusted entity via electronic communication. Electronic communication is by and…

Read more

Short Memories and Online Fraud

Short Memories and Online Fraud

In the digital age, verification of identity is an ongoing battle. Unlike previous eras, the issue of trust – be that of people or documents – is something that has to be checked with every single new contribution or application. Sophisticated hackers and algorithms are a constant threat, meaning that veracity of source material must be proved every time. The…

Read more

The Rise of Deepfake

The Rise of Deepfake

Artificial intelligence is widely accepted as being the development which will take online IT systems to the next level, with its massive potential to predict trends and reproduce user activity. Usually mentioned in the same breath or sentence is the term machine learning, or deep learning. These terms refer to the depth of information available in big data, and automated,…

Read more