Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Nok Nok

Below you will find reports with the source of “Nok Nok”

image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users. Protecting Android, iOS, and Windows mobile device users from fraud will require a concerted effort by all stakeholders to eliminate vulnerabilities, encourage security‐minded behaviors, and to leverage all the security benefits that mobile devices have to offer.

(more available)
Added: November 27, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). This paper will touch on legislation and best practice recommendations in these jurisdictions without going into the details of specific laws.

(more available)
Added: November 27, 2018
image from Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy, commissioned by Nok Nok Labs and produced by Aite Group, explores current attitudes and trends in developing an organization-wide consumer authentication strategy.

(more available)
Added: November 27, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)