Домой Блог Страница 79710

Agents of Mayhem review: Not-so-super heroes

0

Agents of Mayhem is long, boring, and seems to lack the spark that made Saint’s Row special.
Use commas to separate multiple email addresses
Your message has been sent.
There was an error emailing this page.
By Hayden Dingman
Games Reporter,
PCWorld | Sep 2,2017 4: 00 AM
PT
Saint’s Row ’s Achilles heel was always combat. It hid this fact by peppering each game with a handful of absurd weapons, from a recliner that fired missiles to the Dubstep gun to the iconic purple dildo bat—still the weapon I most associate with the series.
But even armaments that creative couldn’ t hide the fact that combat was often a by-the-book affair. Enemies were brainless, and each encounter involved simply trying to get through it as fast as possible without dying. It’s telling that most of the memorable moments in Saint’s Row had nothing to do with combat, be it the Tron -esque “Deckers Die” mission, singing Biz Markie in a car with your friends, or an Aerosmith-backed rocket ride into space.
With that in mind…why build a Saint’s Row game around combat?
Okay, it’s not “technically” Saint’s Row. That’s the most technical technicality I’ ve seen in gaming though, given Agents of Mayhem ’s propensity for purple fleur-de-lis, as well as the crossover presence of multiple characters (including face-of-the-series Johnny Gat if you get the DLC) .
Agents of Mayhem is a spin-off, abandoning the Third Street Saints to focus on a G. I. Joe -style conflict between the good guys at M. A. Y. H. E. M. and the evildoers of L. E. G. I. O. N. Headed by Dr. Babylon, LEGION’s goal is the usual take-over-the-world nonsense of Saturday morning cartoons, and the game has you traipsing around Seoul, South Korea trying to head off various doomsday plots.
It’s a stellar concept, and props to Volition for leaning into it. Nearly every mission begins and ends with a short hand-animated cartoon, and I can’ t imagine how much work went into these. Battleborn had one short segment like this. Agents of Mayhem must have nearly an hour of cartoon in its 15 to 20 hour runtime. The quality ranges from excellent to lackluster, but in any case a lot of effort went into presentation.
If only the rest of the game were as creative.
Agents of Mayhem is boring. There’s no way around it. My first instinct was to blame the writing, because there are certainly a bunch of story beats that don’ t land. (More on that later.) After thinking on it though, it’s clear that the bigger issue is the rigid and repetitive mission structure, which completely undercuts any potential strengths in the writing.
There are 57 story missions in Agents of Mayhem. At least 45 of them are clones. You go to a marker on the map to begin the mission—a start point that is always, inexplicably, at least a minute’s drive from wherever the real action of the mission is, so every mission begins with a lengthy drive to your true objective as MAYHEM’s handlers chatter in your ear. Wasted time.
Upon arrival, there are two ways it could go:
1) You enter an area and are forced to hold off waves of the same five enemy-types for some random period of time, then go to another area and do the same, then go to a third area and kill more baddies, maybe blow up a couple of random items, and the mission ends.
2) You go underground into a LEGION lair, which is actually maybe a dozen copy-pasted rooms snapped together at random with no interesting features or regard to level design, with hallways that literally end in dead-ends if you go off the beaten path, so you follow the mission marker from room to room and kill all the enemies inside or occasionally “hack” three terminals by doing a button-timing minigame.
The other 12 or so missions aren’ t much better, but at least end with some sort of climactic boss fight or try to break out of the box. One mission, for instance, has you retracing your steps the day after a drunken bender, trying to figure out what you did the night before. Each moment still breaks down to “Kill lots of random enemies, ” but at least the setup is slightly more creative than just “You’ re in this generic lair, now shoot stuff.”
Non-story missions and side content are even less inspired, seemingly just spawning into the world at random and consisting of either car races, foot races, or “Kill all enemies in this area.” Worse: They come back. You never really make progress on this front, because LEGION is constantly retaking the outposts you’ ve conquered and repopulating the map with meaningless #content.
This is a side effect of the central hook. See, in Saint’s Row you played as a single character. In Agents of Mayhem, you’ ll notice it’s “Agents” plural. There are 12 characters on offer (13 with the Johnny Gat DLC) , and you can control three at any given time. Like Overwatch or another hero shooter, but a singleplayer open-world game.
Each character is, in Saturday morning cartoon fashion, a standard stereotype. There’s chaingun-wielding roller derby player Daisy, shotgunning ex-sailor Hardtack, ninja Scheherazade, and more. All 12 have unique weapons, as well as unique secondary and ultimate abilities—actor Hollywood, for instance, causes action-movie pyrotechnics to explode around him during his ultimate.
Characters are a mixed bag, with some (angry Russian guy) being a complete dud, but again it’s clear Volition put a ton of work into this. Every character has a unique response for every single line of dialogue, so depending on who you’ re playing as you’ ll hear entirely different conversations. Pretty cool, though in practice it means dialogue varies wildly from “Solid” to “Lowest-Hanging Fruit, ” and when you’ re playing a dud character and a line dies on the vine it’s frustrating to wonder what better responses are hidden in the dialogue banks of characters you weren’ t currently playing. It also means you’ re likely to ignore some fun- playing characters just to hear decent dialogue from the handful of better-written characters on offer.
The variety of characters on offer brings me to my point about side content though. There’s never any real progress in the city front because Volition clearly wants you to run missions repeatedly, leveling up every character over time. There has to be enough stuff on offer to get all your characters to Level 20—an undertaking that, I think, would take anywhere between 30 to 50 hours. Whether anyone will actually do that? Well, I’ m sure someone will. I won’ t though, and so it just leaves the city feeling painfully lifeless and nonreactive. Beginning to end, basically nothing about Seoul changes.
To be clear, Saint’s Row ’s side content also got repetitive, but ideas like Insurance Fraud (where you ragdolled your character into traffic to score points) had a spark to them. Agents of Mayhem ’s side missions are just bland, padding out your time in the game to no purpose.
The writing shouldn’ t get a free pass. There’s an arrow-in-the-knee quip that’s impossible to miss, which in 2017 is even lower than low-hanging fruit. Many of the jokes don’ t land, and the pacing is all over the place. It feels disjointed, jumping from villain to villain with no real build-up or climax and leaving plot threads twisting in the wind. A heavily foreshadowed revelation about the figure leading MAYHEM goes precisely nowhere at all, and that’s just one example among many.
There are problems.
But thinking back to Saint’s Row and analyzing the setup of Agents of Mayhem, I still can’ t help feeling that the repetition is the real issue. Saint’s Row had its fair share of stinker missions and uneven jokes, but you always knew genius was right around the corner. In Agents of Mayhem there’s nothing to look forward to. It feels like the writers just weren’t given enough to work with—none of those tentpole «Deckers Die» missions that completely change up the formula and stand out in your mind.
Agents of Mayhem is the same flat experience for hours on end, and then it fizzles its way into the credits. In my case, quite literally—a glitch in the last boss fight meant it kicked me into the final victory lap cutscenes before half his health bar was gone. No climactic kill, no daring comeback. Winner by accident. A fitting end, I guess.
Side note: It’s also baffling that, with missions so interchangeable and so many characters on offer, there’s no co-op mode. That would’ ve alleviated some of the repetition, in the same manner as Ghost Recon Wildlands or Borderlands. Alas.
Anyway, for a game called Agents of Mayhem this is surely the least chaotic game imaginable. Volition finally got combat up to par, but to the detriment of literally everything else. It plays like a B-tier open world game circa 2011, prone to the excesses of Assassin’s Creed III or the first Watch Dogs and equally as lifeless.
There are the seeds of something good here. Even at my most critical I can see where Volition hoped to take Agents of Mayhem. But the finished product is a muddled mess, somehow both too bloated and too empty—and worst of all, boring.
This story, «Agents of Mayhem review: Not-so-super heroes» was originally published by
PCWorld .
Hayden writes about games for PCWorld and doubles as the resident Zork enthusiast.

© Source: http://www.itnews.com/article/3221327/gaming/agents-of-mayhem-review-not-so-super-heroes.html
All rights are reserved and belongs to a source media.

The coolest, best and strangest tech of IFA 2017

0

CNET brings you the most interesting gadgets from Europe’s biggest tech trade show.
If you want all the hottest new tech gathered in one place, you want IFA.
CNET spent the week in Berlin for this year’s edition of the long-enduring tech trade show to find out what we’ll be talking about over the next 12 months.
If you’re an aspiring or full-time YouTuber or Instagrammer, the LG V30 may be the phone for you thanks to its nifty video and photo features.
For the rest of us, the feature-packed Moto X4 does a little bit of everything. It has two cameras (with flash for selfies) , water-proofing, Amazon Alexa and Bluetooth that connects to four speakers or headphones to get the party started.
The Moto X4 is more than just the first Motorola phone with Amazon’s Alexa app, it’s also the first phone to be able to wirelessly stream music to up to four devices simultaneously.
Let’s get real for a moment — but are we talking virtual reality, augmented reality or mixed reality? Various new headsets were launched at IFA to give you a range of VR, AR and MR.
This handheld scanner from Bosch has potential as a laundry assistant and even a nutrition aid.
Wires are so last century. Encouraged by Apple’s ditching of the traditional headphone jack in recent iPhones, audio manufacturers launched a range of wireless headphones and earbuds at IFA.
One piece of big news is the arrival of a wave of laptops with eighth-generation Intel Core processors. Asus, Acer and Dell are all making devices containing the fateful eight.
Special Reports: All of CNET’s most in-depth features in one easy spot.
The Smartest Stuff: Innovators are thinking up new ways to make you — and the world around you — smarter.

© Source: https://www.cnet.com/news/coolest-best-strangest-tech-ifa-2017/
All rights are reserved and belongs to a source media.

Трамп решил выделить около $8 миллиардов на ликвидацию последствий урагана "Харви"

0

Дональд Трамп оформил запрос на выделение Конгрессом США 7,85 миллиарда долларов, которые будут направлены на ликвидацию последствий урагана Харви.
Президент Соединенных Штатов Америки Дональд Трамп оформил запрос на выделение Конгрессом США 7,85 миллиарда долларов, которые будут направлены на ликвидацию последствий урагана «Харви», охватившего в основном штат Техас, сообщает Reuters, ссылаясь на официальную информацию, предоставленную Директором Бюджетного управления Белого дома Майка Малвейни.
По словам Малвейни, выделенные средства Конгресс направит на оказание первоначальной помощи жителям, пострадавшим от шторма.
Отмечается, что на данный момент пострадавшими от урагана «Харви» считаются более 6,8 миллиона жителей Техаса, которые являют собой четверть населения штата США.
Как сообщал MIGnews.com.uа ранее, «Харви» значительно усилился до четвертой категории мощности из возможных пяти по специальной шкале Саффира-Симпсона и достиг берегов штата Техас Соединенных Штатов Америки. В связи с усилением скорости урана «Харви», президент Соединенных Штатов Америки Дональд Трамп подписал документ о введении режима стихийного бедствия в Техасе.
Позже стало известно, что, по состоянию на 1 сентября, число жертв урагана «Харви» в США возросло до 47 человек.

© Source: http://mignews.com.ua/world/19269478.html
All rights are reserved and belongs to a source media.

Matt Damon: Trump required cameos for movies filmed in his buildings

0

Hollywood couldn’ t film a movie at the Plaza Hotel unless Trump had an appearance, the Oscar-winner says.
We might finally have a definitive explanation behind President Trump’s rare cameo on Home Alone 2.
In an interview with The Hollywood Reporter, Academy Award winner Matt Damon detailed the requirements for filming at Trump Organization buildings.
«The deal was that if you wanted to shoot in one of his buildings, you had to write him in a part, » Damon said. «Martin Brest had to write something in Scent of a Woman — and the whole crew was in on it. You have to waste an hour of your day with a [expletive] shot: Donald Trump walks in and Al Pacino’s like, ‘Hello, Mr. Trump!’ — you had to call him by name — and then he exits.»
«You waste a little time so that you can get the permit, and then you can cut the scene out, » Damon added. «But I guess in Home Alone 2 they left it in.»
Chris O’Donnell, who starred in Scent of a Woman, shared a similar account when he appeared on Conan earlier this year.
“We got new pages given to us one day when we were filming [at] the Plaza Hotel — which I guess Trump owned at the time — and it said we’ re doing a scene with Donald Trump, » O’Donnell told Conan O’Brien. «It explained to us in that in order for us to film at the Plaza we had a little walk-on part for Donald and [ex-wife] Marla [Maples] .”
The scene, O’Donnell recalled, wasn’t a speaking part.
“It was we pull up in a limo and [Al] Pacino and I left and another car pulled up and it was Donald Trump and Marla Maples walked out and went in, ” O’Donnell added.
Trump’s clip in the 1992 acclaimed film didn’t make the final cut.

© Source: http://rssfeeds.freep.com/~/456063843/0/freep/home~Matt-Damon-Trump-required-cameos-for-movies-filmed-in-his-buildings/
All rights are reserved and belongs to a source media.

Under-screen fingerprint scanning will be 2018's must-have phone feature

0

The hot gossip technology is ready to feature on the likes of the Samsung Galaxy S9, HTC U12 and LG G7 next year.
We’ re still waiting to find out if the iPhone 8 will boast a fingerprint scanner under its display, but even if it doesn’ t you will see several handsets employ the tech in 2018. iPhone 8
TechRadar sat down with Raj Talluri, SVP and GM of Qualcomm’s IoT business, at IFA 2017 to discuss the future of the biometric tech, and he confirmed that the technology will be ready to launch next year. IFA 2017
Qualcomm announced its own ultrasonic Snapdragon Sense ID 3D Fingerprint Technology that can work through metal and glass back in 2015, but it’s only now it’s nearing inclusion under smartphone displays. announced its own ultrasonic Snapdragon Sense ID 3D Fingerprint Technology
Earlier this year, the tech was seen by Engadget in action on a prototype Vivo device at MWC Shanghai, but we’re still waiting for the first consumer handset to go on sale. was seen by Engadget
Talluri explained that getting a viable under-screen fingerprint scanner hasn’ t been straight forward.
“It’s taken me and team a bit of time to really get it… but next year I’ m pretty optimistic we’ ll see it in more mainstream devices.”
During the development phase, as Qualcomm moved the technology from concept to production, it found parameters kept changing on the material it needed to work through.
“Just when you think you’ ve got it figured under plastic, phones became glass, just when you got it figured under glass the focus became the display, ” Talluri told us. Now Qualcomm is at a stage where it’s got it all working.
“We’ re confident we have a solution that works under metal, under glass and under display. And it’s also waterproof, it can work under water, so next year I’ m hoping we’ ll get that to production.”
That means phones such as the Samsung Galaxy S9, LG G7 and HTC U12 could all feature under screen fingerprint scanners — which would be a welcome relocation from some of the more poorly placed rear digit readers (Samsung, we’ re look at you) . Samsung Galaxy S9 LG G7 HTC U12
But will Apple get there first on September 12, when it takes the covers off its latest fleet of iPhones? We’ll have to wait and see. will Apple get there first on September 12 IFA 2017 is Europe’s biggest tech show. The TechRadar team is in Berlin to bring you all the breaking news and hands-on first impressions of new phones, watches and other tech as they’re announced. IFA 2017

© Source: http://feedproxy.google.com/~r/techradar/allnews/~3/kdgj38RG_VQ/under-screen-fingerprint-scanning-will-be-2018s-must-have-phone-feature
All rights are reserved and belongs to a source media.

Merkel: Nie możemy zrezygnować z kontroli granicznych

0

Kanclerz Niemiec Angela Merkel opowiedziała się w sobotę w wywiadzie dla dziennika «Rheinische Post» za utrzymaniem obowiązujących od dwóch lat kontroli granicznych. Komisja Europejska, której zgoda jest do tego konieczna, rozumie argumenty Berlina — dodała.
«Nie możemy w najbliższym czasie zrezygnować z kontroli granicznych» — powiedziała Merkel. «Mam wrażenie, że Komisja Europejska jest otwarta na nasze argumenty» — dodała szefowa niemieckiego rządu .
Niemiecki rząd wprowadził kontrole graniczne we wrześniu 2015 roku, w okresie największego nasilenia fali uchodźców. Niemieckie służby koncentrowały się na kontrolowaniu granicy z Austrią, przez którą przedostawało się najwięcej migrantów podążających szlakiem bałkańskim do Europy Zachodniej. Wyrywkowe kontrole odbywały się też na granicach z Polską i Czechami.
Na każdorazowe przedłużenie kontroli granicznych wewnątrz obszaru Schengen wymagana jest zgoda Brukseli. Obecne pozwolenie wygasa 11 listopada. Berlin sygnalizował chęć przedłużenia kontroli o kolejne pół roku. Zdaniem niemieckich mediów KE jest niechętna dalszemu przedłużaniu kontroli.
Od 2015 roku do Niemiec przyjechało niemal 1,5 mln obcokrajowców z zamiarem ubiegania się o azyl. (PAP)

© Source: http://www.gazetaprawna.pl/artykuly/1068255,merkel-nie-mozemy-zrezygnowac-z-kontroli-granicznych.html
All rights are reserved and belongs to a source media.

ホンダ、670億円で和解=欠陥エアバッグ集団訴訟-米

0

【ニューヨーク時事】 タカタ製の 欠陥エアバッグ搭載車の 所有者らによる米国での 集団訴訟で、 ホンダは1日、 経済的損失の 補償を求めていた原告側と計6億500万ドル(約670億円)の 支払いで和解したと発表した。 搭載車の 販売台数が最多の ホンダが和解に至ったことで、 自動車
【ニューヨーク時事】タカタ製の欠陥エアバッグ搭載車の所有者らによる米国での集団訴訟で、ホンダは1日、経済的損失の補償を求めていた原告側と計6億500万ドル(約670億円)の支払いで和解したと発表した。搭載車の販売台数が最多のホンダが和解に至ったことで、自動車メーカーによる所有者への補償問題は解決に向け大きく前進した。 和解金のうち2億ドルはリコール(回収・無償修理)促進のための基金設立に充て、8000万ドルは所有者への補償に使う。同社によると、リコール完了に向けた積極的な取り組みを理由に和解額の一部が免除され、実際の支払額は4億8400万ドルになるという。 この訴訟では、トヨタ自動車とマツダ、SUBARU(スバル)、独BMWの4社が5月に合わせて5億5300万ドルで、8月には日産自動車が9700万ドルで、それぞれ和解済み。米フォード・モーターは協議を継続している。(2017/09/02-10: 50) 関連ニュース
【社会記事一覧へ】 【アクセスランキング】

© Source: https://www.jiji.com/jc/article?k=2017090200247&g=soc
All rights are reserved and belongs to a source media.

В консульстве России и торговом представительстве, которые США закрывают, то сжигают

0

В консульстве России в Сан-Франциско, которое власти США решили закрыть, по информации СМИ, то курят в камине, однако пожарную службу сотрудники учреждения на территорию решили не пустить.
Над консульством появился черный дым. Журналист Associated Press услышал, что люди, которые вышли из здания, сообщили пожарным, что проблем нет и сотрудники консульства сжигают какие-то предметы в камине, сообщает CNBC.
Минди Таламадж, пресс-секретарь из отдела пожарной охраны Сан-Франциско, сказала, что отдел получил звонок о дыме и отправил команду для расследования, но определил, что дым идет из трубы.

© Source: http://ipress.ua/ru/news/v_konsulstve_rossyy_y_torgovom_predstavytelstve_kotorie_ssha_zakrivayut_to_szhygayut__vydeo_224125.html
All rights are reserved and belongs to a source media.

В Украине ожидается облачная и теплая погода

0

Жителям отдельных регионов не стоит забывать дома зонтики.
Сегодня, 2 сентября, в Украине ожидается облачная и теплая погода, осадки прогнозируют на Востоке и Закарпатье, сообщает Укргидрометцентр.
На Западе будет сухо, дожди только в Закарпатской области. Температура ночью будет колебаться от 9 до 12 градусов, в Ужгороде – до 14. Днем воздух прогреется до 24-28 градусов.
На Севере и в Центре также без осадков. Ночью ожидается около 13 градусов тепла, а днем – 20-24 градуса.
Теплее будет в южных областях – ночью 13-16 градусов, а днем – до 28. Дождей здесь сегодня не прогнозируют.
А в восточных областях, на Днепропетровщине и Полтавщине ожидается облачная погода и дожди в течение всех суток. Ночью термометры покажут от 10 до 13 тепла, а днем – 17-22.
В Киеве в субботу без осадков. Ночью температура будет колебаться от 11 до 13 градусов, а днем – от 22 до 24.

© Source: https://telegraf.com.ua/ukraina/mestnyiy/3586045-v-ukraine-ozhidaetsya-oblachnaya-i-teplaya-pogoda.html
All rights are reserved and belongs to a source media.

The password needs to die and better UX will kill it

0

For a vestige of the past, the password has managed to hold on and remain alive — even though some of the top people in computing said that it had already died over a decade ago. In one of his more famous predictions, Microsoft founder Bill Gates…
For a vestige of the past, the password has managed to hold on and remain alive — even though some of the top people in computing said that it had already died over a decade ago. In one of his more famous predictions, Microsoft founder Bill Gates said that passwords were on the way out already in 2004. Problem is that Gates, for all his wisdom, didn’ t tell us what to use to replace passwords.
“There is no doubt that over time, people are going to rely less and less on passwords, ” Gates said at the RSA conference in 2004. “People use the same password on different systems, they write them down and they just don’ t meet the challenge for anything you really want to secure.” How prescient he was, it turns out. There were hackers back in 2004, but hacking was nothing like the major international industry it is today — responsible for tens of billions in losses every year, and endangering businesses large and small. Gates said
That there is more than mere correlation between the ubiquity of password authentication and the high levels of hacking today is clear from a Verizon study, which shows that four out of every five data hacking-related breaches are due to stolen passwords or misused credentials. It’s a grim statistic, but one that shouldn’ t surprise anyone; a study by SplashData shows that the term “password” was the second most stolen password in 2016, right behind “123456” — which means that despite extensive education on password security and endless nagging by CISOs and security teams to users, there are plenty of people who are not listening. And for passwords that aren’ t easy to guess, hackers have a slew of tools — from phishing e-mails to malware like keyloggers — that lets them steal what they want. Verizon study four out of every five data hacking-related breaches SplashData
With all their drawbacks, passwords have remained popular mostly because people are used to them. User experience, it turns out, is a major driver of security for users. To replace passwords, you need not just tight security (any new solution should outdo passwords as a protection system) , but a positive user experience as well.
There is just one method that fits both bills — password-free mobile push-based authentication systems, usually in the form of apps that do the authentication automatically, with no excessive demands on users. Push authentication involves sending a notification (via a secure network) to a user’s device when accessing a protected resource. With push, possession of the device itself becomes a prime method of authentication — and if you add a secondary authentication element (passcode, gesture or biometrics) , you have an almost foolproof authentication system that is far stronger than password authentication, and easier to use.
Insecure they may be, but online services and network administrators just can’ t seem to give them up. Why? It’s probably due to ennui. Although a user has to devise, remember, and type in a password — which seems like a lot of work — they are used to how password authentication works, and they’ ve made passwords a part of their routine.
So any authentication system that seeks to step up and replace the password needs to be easier to use than passwords (i.e. no devising, remembering or typing needed) , as well as more secure.
Among the candidates for a more secure and user-friendly experience are biometrics (Apple, for example, has adopted the use of thumbprints to authenticate users of iOS devices) . In a biometrics-based authentication system, all a user has to do is touch the device. However, according to NIST (the US National Institute for Standards and Technology) , biometrics alone is not the way to protect a system. Biometrics, says NIST, “shall be used with another authentication factor; ” as an authentication system, it is not accurate enough to stand on its own. iOS says NIST
NIST further states that biometric characteristics “do not constitute secrets. They can be obtained online or by taking a picture of someone with a camera phone (e.g. facial images) with or without their knowledge, lifted from through objects someone touches (e.g. latent fingerprints) , or captured with high resolution images (e.g. iris patterns) .”
Another potential candidate to replace passwords — and a very strong one at that — is hardware tokens. But again, user experience is an issue; carrying around a token in order to connect as needed is a hassle. What about text messages — where a user types in a four-digit code sent by a site to a device via SMS? While easier to remember than passwords, this method too is insecure says NIST, which is why the industry is increasingly shifting away from this method of authentication.
The primary reason passwords are so problematic is that they constitute a single point of failure (i.e. a point at which a breach could take place that would compromise an organization’s entire security system) . If hackers steal/crack/phish their way to a password, the only thing separating them from a user’s data — or a corporate server — is no longer standing in the way.
Any method that we would want to adopt would have to be equipped with more security than is available in password or authentication — utilizing multiple channels to authenticate users and/or devices.
To boost security, many organizations have adopted two-factor authentication, usually based on a code sent via SMS. Google has embraced this authentication method; when a user wants to log onto a service or website, they provide their username and password, and the Google Authenticator sends a six digit password via SMS, based on a shared secret between the device and authentication server. While better than just a single-factor authentication system — especially one based on usernames and passwords — NIST says that as SMS messages can be hijacked, a more secure second-factor authentication method would be preferable. NIST says
Mobile push-based authentication, which enables users to sign on to services with one action, and without passwords, is perhaps counterintuitively, more effective both in terms of security and user experience. A ‘Great Authenticator’ of this type enables users to access multiple services/domains. The authentication is triggered when the user taps the requested key on their device. There is no need to keep logging in or repeating the authentication; it is passed on for that session to multiple environments.
In a push authentication scenario, a notification (via a secure network) is sent to a user’s device when they access a protected resource. This method verifies the position of an authenticated device by the user. Initially it is used to verify “something that the user has” (the phone) instead of “something that the user knows, ” both valid ways to authenticate. Since it’s reasonable to assume that users protect their devices and close or transfer their accounts when devices are lost or stolen — and possession is not something that can be faked by a hacker — push turns out to be far more secure than passwords or text, while being far easier to use.
Realizing that this is where things are headed, Microsoft recently introduced its new Microsoft Authenticator, which uses push authentication, by “shift [ing] the security burden from your memory to your device.” Instead of typing in a password, “which can be forgotten, phished, or compromised, ” users simply respond to a push notification when they try to access their Microsoft account. Besides being more secure than a password, push authentication “is easier than standard two-step verification” as well, says the company. recently introduced
Push-based mobile device authentication is a trend that is already taking hold — and is set to grow, according to Gartner, which says that 50 percent of enterprises using mobile authentication will adopt mobile push as their main authentication method by 2020, compared to the 10 percent who are using it today — a 500 percent increase by the end of the decade. according to Gartner
To a generation of security-challenged users, it sounds almost counterintuitive to get rid of passwords, however, even the longest, most complicated passwords are not as secure as a strong authenticator. For companies and employees, and for web sites and clients, push authentication provides a great leap forward by providing better security that is easier to use. Contributors
Sit back and let the hottest tech news come to you by the magic of electronic mail.
Prefer to get the news as it happens? Follow us on social media.
1.76M followers
1M likes
Got two minutes to spare? We’d love to know a bit more about our readers. Start! Start!
All data collected in the survey is anonymous.

© Source: http://feedproxy.google.com/~r/TheNextWeb/~3/rSamKf0MVEo/
All rights are reserved and belongs to a source media.

Timeline words data