Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    InfoSec News Nuggets 04/23/2026

    April 23, 2026

    Debian DSA-6227-1 strongswan Critical Infinite Loop Crash Issues

    April 23, 2026

    SSA-339694 V1.0: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2

    April 23, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Passkeys are more secure than traditional ways to log in
    News

    Passkeys are more secure than traditional ways to log in

    adminBy adminApril 22, 2026No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Some concerns are frequently raised about passkeys. In practice, many are either manageable or apply equally to traditional approaches. Here are our answers to some of the most common questions:

    “What about synchronisation?”

    Passkeys can synchronise across devices using platform services. This is sometimes presented as a novel risk, but most people already rely on similar cloud‑based synchronisation for password managers, email and some authenticator apps. The key control is the strength of the authentication protecting the sync account – a requirement that already exists in many MFA deployments.

    “Are passkeys really multi‑factor?”

    Yes. Where user verification is performed (typically by however the user normally logs into their device), FIDO2 credentials combine something the user has (the cryptographic key) with something they are or know. Multiple factors do not need to be on multiple, separate devices, and many traditional MFA implementations already deliver all factors through a single phone.

    “Isn’t traditional MFA good enough if done properly?”

    Traditional MFA can be effective, but it remains fundamentally vulnerable to phishing because secrets or approvals can be observed and relayed during a live session. Passkeys remove this class of attack entirely by cryptographically binding authentication to the legitimate service. 



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleApple security advisory (AV26-381) – Canadian Centre for Cyber Security
    Next Article CVE-2026-4918 | THREATINT
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/23/2026

    April 23, 2026
    News

    Protected: Review of Operational Collaboration between the Communications Security Establishment (CSE) and the Canadian Security Intelligence Service (CSIS): Report – HTML

    April 23, 2026
    News

    Executive Summary: Defending against China-nexus covert networks of compromised devices

    April 23, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202636 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202636 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    InfoSec News Nuggets 04/23/2026

    April 23, 2026

    Debian DSA-6227-1 strongswan Critical Infinite Loop Crash Issues

    April 23, 2026

    SSA-339694 V1.0: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2

    April 23, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.