Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

FieldAI raises $405M to build universal robot brains

IBM and NASA Release Groundbreaking Open-Source AI Model on Hugging Face to Predict Solar Weather and Help Protect Critical Technology

Latest AI Funding And Acquisition Deals Spotlight Innovation, Growth, And Faster Time-To-Market

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • OpenAI (GPT-4 / GPT-4o)
    • Anthropic (Claude 3)
    • Google DeepMind (Gemini)
    • Meta (LLaMA)
    • Cohere (Command R)
    • Amazon (Titan)
    • IBM (Watsonx)
    • Inflection AI (Pi)
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • AI Experts
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • The TechLead
    • Matt Wolfe AI
    • Andrew Ng
    • OpenAI
    • Expert Blogs
      • François Chollet
      • Gary Marcus
      • IBM
      • Jack Clark
      • Jeremy Howard
      • Melanie Mitchell
      • Andrew Ng
      • Andrej Karpathy
      • Sebastian Ruder
      • Rachel Thomas
      • IBM
  • AI Tools
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
  • AI Policy
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
  • Business AI
    • Advanced AI News Features
    • Finance AI
    • Healthcare AI
    • Education AI
    • Energy AI
    • Legal AI
LinkedIn Instagram YouTube Threads X (Twitter)
Advanced AI News
VentureBeat AI

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

By Advanced AI EditorJune 29, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more

From passwords to passkeys to a veritable alphabet soup of other options — second-factor authentication (2FA)/one-time passwords (OTP), multi-factor authentication (MFA), single sign-on (SSO), silent network authentication (SNA) — when it comes to a preeminent or even preferred type of identity authentication, there is little consensus among businesses or customers.

What there is agreement on, however, is the necessity of these tools. The FIDO Alliance found that more than half of customers (53%) saw an increase in suspicious messages and online scams in 2024. This was largely driven through SMS, email and phone calls, and was only exacerbated by advancements in AI.

Even at a time when we continue to see staggering increases in fraud and related losses — the Federal Trade Commission received more than 1.1 million reports of identity theft last year alone — businesses must do their best to walk a tightrope between robust security and effortless convenience. Over-index on either and you risk alienating customers — too few hoops and you lose their trust, too many and you lose their patience.

So, how do businesses strike this fragile balance and implement effective authentication solutions? 

The customer is always right

When it comes to authentication, what businesses decree to employees rarely translates to customers. We transitioned to WebAuthn as the only form of 2FA for employee authentication, a company-wide mandate that took a few weeks. This ‘forced adoption’ works when your employees don’t have a choice, but your customers do. 

Recently, I wanted to book a hotel for my family vacation, so I went to my favorite travel site, found the perfect room at a reasonable rate, and went to finalize the transaction. One problem: I kept running into an issue with CAPTCHA on their page — once, twice. After the third attempt I left, found the same room at the same rate on their competitor’s site, and booked. 

Businesses can dedicate massive budgets to top-of-funnel marketing that drive customers to their websites, products and services, but if friction in the user experience prevents conversion — authentication often as the initial touchpoint — it’s wasted investment. Forty percent of businesses say one of their most pressing challenges is finding a balance between security and customer experience, particularly reducing friction during account signup.

Customer behavior is hard to modify, particularly around the adoption of new technology. It doesn’t matter if biometrics or public-key cryptography are more secure, if it isn’t equally seamless to use, customer adoption will lag. Why do you think so many people still rely on easy-to-guess passwords (you know who you are!). The reality is you simply can’t force customer adoption — businesses that get authentication right recognize the needs and limitations of their customers, meet them where they’re comfortable and understand it can’t be one-size-fits-all.

A signal-driven future

In this fray over friction versus freedom, the future of authentication will be driven by continuous signals rather than arbitrary identity check points like logins or purchases. Think of authentication as a brake system, where businesses can depress or release the pedal to increase or decrease friction based on customer behaviors.

Let’s say I receive a promotion for 20% off new tires from my regular auto shop. If I click on the notification, I’d expect a seamless login experience — they sent me the message, I’m a long-time customer and I’m using their application from a known device. But let’s say I travel to Kansas City for work. If I open my laptop and I’m still logged into my favorite e-commerce platform, I’d expect them to log me out or require proof of identity to continue the session, as I’m in a completely different location based on previous purchase history. 

Think of the ecosystem of applications — shopping, email, social media, home security, streaming services — where we log in once and rarely (if ever) log out. What happens if your device is lost or stolen or your session is hijacked? Businesses must embrace a zero-trust mindset, where authentication isn’t simply to show your identification at the door then you’re free to roam the club, but a continuous risk-based process that scales friction based on your activity.

The wrinkle here, like so many sectors right now, is AI. Earlier in my career, I built bot detection models for a startup to distinguish human behaviors from machines. We’d monitor how many clicks we’d get from the IP and user agent string and if it was more than N in a second then we’d assume it was a bot and block that traffic. But now, as we pass the reins to AI assistants and autonomous agents to make dinner reservations, set appointments or purchase movie tickets, how do you distinguish between a nefarious bot or one working on your behalf? This is the future of authentication and the bleeding-edge work enterprises in the industry continue to pioneer.

Authentication: An ‘and’ not ‘or’ proposition

Despite new authentication methods in perpetual development and an ascension of regional requirements like Singapore’s Singpass or the EU’s Digital Identity Wallet, no single tool will ever own complete market share — some customers will always prefer the simplicity of options like OTP, while others will demand the stringency of passkeys or other modern tools. 

The onus will remain on businesses to provide a breadth of choices to meet customers where they are and implement strategies to keep the root of each method secure from smishing/phishing, social engineering or a plentitude of other identity-based attacks. This authentication tug-of-war between friction and freedom won’t be won by those who prioritize one or the other, but those who can walk the tightrope between both to guide their customers to seamless yet secure experiences.

Anurag Dodeja is head of product, user authentication and identity at Twilio.

Daily insights on business use cases with VB Daily

If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.

Read our Privacy Policy

Thanks for subscribing. Check out more VB newsletters here.

An error occured.



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePeer Review and the NeurIPS Experiment | Two Minute Papers #84
Next Article OpenAI Leadership Responds to Meta Offers: ‘Someone Has Broken Into Our Home’
Advanced AI Editor
  • Website

Related Posts

ByteDance releases new open source Seed-OSS-36B model

August 21, 2025

CodeSignal’s new AI tutoring app Cosmo wants to be the ‘Duolingo for job skills’

August 20, 2025

LLMs generate ‘fluent nonsense’ when reasoning outside their training zone

August 20, 2025
Leave A Reply

Latest Posts

Tanya Bonakdar Gallery to Close Los Angeles Space

Dallas Museum of Art Names Brian Ferriso as Its Next Director

Rapa Nui’s Moai Statues Threatened by Rising Sea Levels, Flooding

Mickalene Thomas Accused of Harassment by Racquel Chevremont

Latest Posts

FieldAI raises $405M to build universal robot brains

August 21, 2025

IBM and NASA Release Groundbreaking Open-Source AI Model on Hugging Face to Predict Solar Weather and Help Protect Critical Technology

August 21, 2025

Latest AI Funding And Acquisition Deals Spotlight Innovation, Growth, And Faster Time-To-Market

August 21, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • FieldAI raises $405M to build universal robot brains
  • IBM and NASA Release Groundbreaking Open-Source AI Model on Hugging Face to Predict Solar Weather and Help Protect Critical Technology
  • Latest AI Funding And Acquisition Deals Spotlight Innovation, Growth, And Faster Time-To-Market
  • Thousands of Grok chats are now searchable on Google
  • PixVerse AI Effect Brings Oil Paintings to Life: Trending AI Video Generation Tool Analysis | AI News Detail

Recent Comments

  1. Charlescak on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  2. ArturoJep on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  3. ArturoJep on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  4. Charlescak on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  5. ArturoJep on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

LinkedIn Instagram YouTube Threads X (Twitter)
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.