Blog

News and articles

Press Release: MIRACL announces partnership with Bulbet

17 Sep, 2019 by MIRACL Technologies Ltd

Ultra Secure Authentication for Gamers: MIRACL Gaming Solutions announces partnership with Bulgarian Gaming Site, Bulbet. Bulbet, the Bulgarian gaming site, has announced MIRACL Trust® as the player and transaction authentication solution for both their Social and Real-Money gaming products. MIRACL Gaming Solutions can uniquely offer the security, scalability and zero-friction user-flow critical for gaming businesses. Not only will MIRACL provide market leading security against both internal and external threats, it will ensure that Bulbet will meet and exceed current European standard PSD2 for transaction authentication.…

Announcing MIRACL Core: A commercially, relevant cryptographic library

04 Sep, 2019 by MIRACL Technologies Ltd

To co-inside with attendance at the 2nd International Conference in Blockchain, Identity and Cryptography in Edinburgh, MIRACL Trust® has today launched its new, commercially relevant cryptographic library – MIRACL Core (V4). Years of experience and development, combined with a deep understanding as to what is needed in a cryptography library from a commercial point of view, means this new offering is unmatched - and meets the needs of organisations seeking cryptographic solutions to ensure they deliver the absolute best in security for their customers.…

NEW MIRACL Core – commercially relevant cryptographic library

03 Sep, 2019 by Dr Michael Scott

To co-inside with my attendance tomorrow at the 2nd International Conference in Blockchain, Identity and Cryptography in Edinburgh, MIRACL will announce details of its new cryptographic library – MIRACL Core (V4). Years of experience and development, combined with a deep understanding as to what is needed in a cryptography library from a commercial point of view, means this new offering is unmatched - and meets the needs of organisations seeking cryptographic solutions to ensure they deliver the absolute best in security for their customers.…

Press Release: Don't Gamble With Passwords

29 Aug, 2019 by MIRACL Technologies Ltd

With MIRACL, It’s One Pin And You’re In Revolutionising passwords. Introducing the world’s first 100% software multi-factor authentication. This August, tech market disruptor MIRACL Gaming Solution launches a highly innovative, new authentication solution for gaming clients. MIRACL already supplies the worlds only 100% software, multi-factor authentication (MFA) PIN based solution to customers such as banking giant Crédit Agricole and consumer credit leader, Experian. Challenging the increasingly out-dated concept of passwords and stored credentials, this new, highly-secure solution from MIRACL is set to revolutionise the way we provide authentication for online financial transactions, especially in the online gaming sector.…

Why Delaying PSD2 is Good

23 Aug, 2019 by MIRACL Technologies Ltd

(2 Minute Read) No-one thought complying to PSD2 was going to be easy. This revised Payment Services Directive is going to revolutionise the payment services industry but this is going to take time. Delaying until 2021 will ensure organisations find the best solution to make the necessary changes and ultimately ensure online payments within Europe are safer, faster, cheaper and more convenient. Last year, cyber incidents increased by 1000% and fraud losses on UK ‘card not present’ transactions 47%.…

Designated Verifier Signatures

19 Aug, 2019 by Dr Michael Scott

Here, Dr Michael Scott considers digital signatures and the verification they provide in today’s digital world. (4 Minute Read) Digital signature is an attempt to provide a digital analogue of the human signature. Before getting into that, let’s look again at the human signature, and what it provides. The hand-written human signature provides irrevocable authentication of a document. You sign something, you are committed to it, and you can’t deny it later.…

No more dongles

09 Oct, 2018 by James Chapman

One of the biggest issues in security today is that of secure identification and the misuse of stolen credentials to gain fraudulent access. This is highlighted in recent Verizon Data Breach reports: in the 2017 report it is revealed that 62% of data breaches featured hacking with 81% of these leveraging stolen or weak passwords; in the 2018 report the authors note the considerable number of breaches due to botnets using malware to capture login details and exclude them from their analysis since “due to the sheer number of them (over 43,000 successful accesses via stolen credentials), they would drown out everything else”.…

How can Two-Factor Authentication Protect your Brand?

13 Feb, 2018 by MIRACL Blogger

What do Yahoo!, Equifax, and eBay all have in common aside from data breaches on an epic scale? They all rely on a user’s trust across digital networks to move their businesses forward. If your enterprise still relies on stored and shared authentication credentials (e.g. passwords) it’s only a matter of time before your company’s name (and perhaps your name as well) appear in the news related to a hack of your user database.…

How can you Easily Protect Citizen and Consumer Data?

01 Feb, 2018 by MIRACL Blogger

Your end user has a relationship with your business application for only one reason. To do business with you. Anything that interferes with the security of that relationship not only disrupts your business, but also can place your customers at risk in other business relationships. As seen with the Equifax breach in the United States, 143 million US citizens lost control of their Social Security numbers, which are used in nearly all government and banking systems.…

How Regulated Industries can Easily Comply with Security Requirements

18 Dec, 2017 by MIRACL Blogger

Europe’s financial institutions are sleepwalking into a regulatory nightmare with security systems that are not fit for purpose to meet the requirements of the European Union’s revised Directive on Payment Services (PSD2), which was adopted in 2015. Member states have had two years to introduce the necessary changes in their national legislation in order to comply with the new rules, and firms are expected to be compliant by January 2018.…

The Simple Commandments You Should Learn to Avoid Leaking Secrets

06 Dec, 2017 by Dr Michael Scott

Often a competent and experienced software engineer is tasked to implement a cryptographic algorithm. Unfortunately they may be unaware of what we call side-channels attacks. For example normally a programmer couldn’t care less about the power consumption profile of their running program. However in many situations where cryptography is deployed an attacker is in a position to monitor power consumption. And the power consumption profile may leak information about a secret cryptographic key.…

Stop the Hackers: Here's How to Remove Your Password Database

30 Nov, 2017 by MIRACL Blogger

There are two key questions anyone associated with business and data need to ask themselves: Does our company still have a password database and, if so Why? The simple fact is that there is no reason for any company to have a password database anymore. It is now estimated that 81% of all hacking related breaches involve the use of stolen or weak credentials (source: DIBR). And we need to put this in the context of 8 billion authentication credentials having been stolen since 2013, with all that this implies for damage to a company’s business and brand reputation.…