Action Fraud. (2016, July 5). How private is your personal information? Retrieved from YouTube: https://www.youtube.com/watch?v=yrjT8mOhcKU
Apple. (2023, August 22). About Face ID advanced technology. Retrieved from Apple Support: https://support.apple.com/en-gb/102381
Apple. (2023, November 15). About Touch ID advanced security technology. Retrieved from Apple Support: https://support.apple.com/en-gb/105095
AVG. (n.d.). What Is Two-Factor Authentication (2FA)? Retrieved from AVG: https://www.avg.com/en/signal/what-is-two-factor-authentication
BU TechWeb. (n.d.). Why Use 2FA? Retrieved from BU TechWeb: https://www.bu.edu/tech/support/information-security/why-use-2fa/
Cerullo, M. (2023, March 21). Cybercriminals are using AI voice cloning tools to dupe victims. Retrieved from CBS News: https://www.cbsnews.com/news/ai-scam-voice-cloning-rising/
Degruchy, C. (2020, September 23). Can I duplicate or clone a YubiKey? Retrieved from Yubico: https://support.yubico.com/hc/en-us/articles/360016614880-Can-I-duplicate-or-clone-a-YubiKey-
DiFurio, D. (2022, September 21). 10 Statistics That Show the Cost of a Data Breach to Companies. Retrieved from Beyond Identity: https://www.beyondidentity.com/blog/10-statistics-show-cost-data-breach-companies
Duo. (n.d.). Two-Factor Authentication (2FA). Retrieved from Duo: https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa
Gilbert, J. (2021, August 26). The importance of two-factor authentication. Retrieved from Techradar: https://www.techradar.com/news/the-importance-of-two-factor-authentication
GSD Solutions. (2022, June 7). Pros and Cons of Hardware Authentication Keys for 2FA. Retrieved from GSD Solutions: https://gsdsolutions.io/pros-and-cons-of-hardware-authentication-keys-for-2fa/
Henry, B. (2022, August 5). The Importance of Two-factor Authentication. Retrieved from Bitner Henry Insurance Group: https://bitnerhenry.com/the-importance-of-two-factor-authentication/
LaMotte, S. (2015, December 4). The other 'fingerprints' you don't know about. Retrieved from CNN Health: https://edition.cnn.com/2015/12/04/health/unique-body-parts/index.html
McMillan, R. (2012, January 27). The World's First Computer Password? It Was Useless Too. Retrieved from Wired: https://www.wired.com/2012/01/computer-password/
Medline Plus. (2022, July 7). Are fingerprints determined by genetics? Retrieved from Medline Plus: https://medlineplus.gov/genetics/understanding/traits/fingerprints/
Microsoft. (2023, January 5). What is SIM swapping & how does the hijacking scam work? Retrieved from Microsoft: https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/what-is-sim-swapping
Microsoft. (n.d.). What is: Multifactor Authentication. Retrieved from Microsoft: https://support.microsoft.com/en-us/topic/what-is-multifactor-authentication-e5e39437-121c-be60-d123-eda06bddf661
onelogin. (n.d.). What is Multi-Factor Authentication (MFA) and How Does it Work? Retrieved from onelogin: https://www.onelogin.com/learn/what-is-mfa
Pinghui, Z. (2017, December 14). Chinese woman offered refund after facial recognition allows colleague to unlock iPhone X. Retrieved from South China Morning Post: https://www.scmp.com/news/china/society/article/2124313/chinese-woman-offered-refund-after-facial-recognition-allows
Rafter, D. (2022, August 15). What is SIM swapping? SIM swap fraud explained and how to help protect yourself. Retrieved from Norton: https://us.norton.com/blog/mobile/sim-swap-fraud
Recfaces. (n.d.). What are Iris and Retina scanners, and how do they work? Retrieved from Recfaces: https://recfaces.com/articles/iris-scanner
Refvik, O.-M. (2022, November 2). Why is Two-Factor-Authentication (2FA) so important? Retrieved from Admincontrol: https://blog.admincontrol.com/en/why-is-two-factor-authentication-2fa-so-important
Roger. (2021, March 27). Is it Possible to Clone RFID Cards? An All-Inclusive RFID Security Guide. Retrieved from RFID Future: https://www.rfidfuture.com/clone-rfid-cards.html
Rublon Authors. (2021, December 14). What Are the Three Authentication Factors? Retrieved from Rublon: https://rublon.com/blog/what-are-the-three-authentication-factors/
Ryles, G. (2021, September 6). What is two-factor authentication and why is it important? Retrieved from Trusted Reviews: https://www.trustedreviews.com/explainer/what-is-two-factor-authentication-4161786
Scientific American. (1894, June). The Chance of Identical Fingerprints: 1 in 64 trillion. Retrieved from Scientific American: https://www.scientificamerican.com/article/the-chance-of-identical-fingerprints-1-in-64-trillion/
Shacklett, M. E. (2021, November). What is multifactor authentication and how does it work? Retrieved from TechTarget: https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA
Shokotko, D. (2018, January 10). The Pros and Cons of Different Two-Factor Authentication Types and Methods. Retrieved from Protectimus: https://www.protectimus.com/blog/two-factor-authentication-types-and-methods/
Slater, A. (2019, September 20). POLICING PROJECT FIVE-MINUTE PRIMERS: IRIS RECOGNITION. Retrieved from Policing Project: https://www.policingproject.org/news-main/2019/9/20/policing-project-five-minute-primers-iris-recognition
Stealth Labs. (2022, January 19). Number Of Cyber Attacks In 2021 Peaked All-time High. Retrieved from Stealth Labs: https://www.stealthlabs.com/news/cyberattacks-increase-50-in-2021-peaking-all-time-high-of-925-weekly-attacks-per-organization/
Stegner, B. (2020, April 15). The Pros and Cons of Two-Factor Authentication Types and Methods. Retrieved from Make Use Of: https://www.makeuseof.com/tag/pros-cons-2fa-types-methods/
Thales Group. (2023, March). The History of Biometric Authentication. Retrieved from Thales Group: https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/history-of-biometric-authentication
Williams, C. (2023, January 11). Why are fingerprint scanners still the most widely used biometric technology? Retrieved from M2 SYS: https://www.m2sys.com/blog/biometric-technology/fingerprint-scanners-are-the-most-widely-used-biometric-technology/