• Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
30 Apr
4 Min read

Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective

April 30, 2025 Nok Nok News Cybersecurity, Industry News, Passkeys, passwordless authentication 0 comments

Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective

The Verizon 2025 Data Breach Investigations Report (DBIR) paints a clear, urgent, and yet familiar picture: password-related attacks remain the number one threat to organizations worldwide. As a leader in passwordless authentication, here at Nok Nok, we see the findings as both a wake-up call and a validation of our mission to move everyone beyond passwords.

Key Findings: Passwords and Credential Abuse Remain Top Risks

The report highlights several critical points regarding the persistence of credential-based attacks:

  • Stolen Credentials Are the Primary Entry Point: Credential abuse was the initial vector in 22% of breaches globally, making it the single most common way attackers get in. Attackers aren’t hacking their way in-they’re logging in through the front door using stolen, guessed, or leaked passwords.
  • Web Application Attacks Rely on Credentials: A staggering 88% of basic web application attacks involved stolen credentials. This highlights how password reuse and weak password policies continue to undermine security.
  • Phishing and Social Engineering Fuel Credential Theft: Phishing accounted for nearly 25% of breaches, and social engineering remains a top tactic for stealing login information. The median time for a user to click a phishing link was just 21 minutes-far faster than most organizations can detect and respond. Yikes!
  • Infostealers Target Devices and Credentials: 30% of infostealer-compromised systems were enterprise-managed, but 46% were unmanaged, often personal devices used for work (BYOD). This exposes organizations to credential theft outside their direct control.
  • Ransomware and Credentials: Ransomware was present in 44% of breaches, and infostealer logs containing corporate credentials were found in over half of ransomware victims. Credentials are often the first step to a much larger compromise.

Other Notable Trends from the 2025 DBIR

Beyond credential attacks, the DBIR also highlights other significant trends:

  • Exploitation of Vulnerabilities: Exploits targeting unpatched edge devices (like VPNs and firewalls) surged by 34%, now accounting for 20% of breaches. Attackers are increasingly automating the exploitation of known and zero-day vulnerabilities.
  • Third-Party Breaches: The share of breaches involving third parties doubled to 30%, highlighting the risks in supply chains and partner ecosystems.
  • Human Error: Human involvement remains a factor in 60% of breaches, reinforcing the need for user training and better security design.
  • Remediation Gaps: Only 54% of vulnerable edge devices were patched, with a median fix time of 32 days-leaving a wide window for attackers.

Why Passwords Remain the Weak Link

The DBIR’s findings confirm what we at Nok Nok have long argued: passwords are fundamentally flawed as a security mechanism. Attackers exploit them because:

  • They are easily stolen via phishing, malware, or leaks.
  • Users often reuse passwords, at work and at home, across multiple sites.
  • Passwords can be guessed, brute-forced, or found in breached databases.
  • Device and BYOD risks mean credentials can be compromised outside IT’s visibility.

As the report states, “Credential theft continues to be the key to the kingdom in the majority of breaches. And it’s not slowing down”.

The Path Forward: Passwordless Authentication

For organizations looking to break the cycle, the DBIR offers a clear mandate: move beyond passwords. Here’s how Nok Nok recommends responding:

  • Adopt Passwordless, Phishing-Resistant Authentication: FIDO-based authentication(aka passkeys) eliminate the risks of credential theft, phishing, and reuse by removing passwords from the equation.
  • Enforce Strong Access Controls for Devices: Ensure only managed, secure devices can access sensitive systems-especially in BYOD environments.
  • Accelerate Patch Management: Reduce the window for vulnerability exploitation by patching edge devices and VPNs rapidly.
  • Invest in User Training and Real-Time Detection: While technology is critical, user awareness and rapid response to phishing remain essential.

Conclusion: The Time to Act Is Now

The 2025 Verizon DBIR makes it clear: attackers are evolving, but they still rely on the same old trick – stealing passwords. Why? Because it’s the least path of resistance. Why spend time hacking when you can just log in instead? As long as organizations depend on passwords, breaches will continue. At Nok Nok, we believe the solution is simple: eliminate passwords, embrace modern authentication, and close the door on credential-based attacks for good. This gets us out of the arms-race and leap-frogs credential based attacks. If you’re attending Kuppinger Cole EIC 2025, our very own Rolf Lindemann, Vice President, Products, will be speaking to this very topic!  

The future of security is passwordless. Let’s make 2025 the year we finally leave passwords behind.

Read more
02 Apr
3 Min read

Another Step Towards a Passwordless Future

April 2, 2025 Nok Nok News Cybersecurity, Industry News, Passkeys, passwordless authentication 0 comments

Another Step Towards a Passwordless Future

Microsoft’s announcement that it will be replacing passwords with passkeys for over a billion users by 2025 is huge news for the entire digital security landscape. At Nok Nok, we’re not just excited – we see this as the right approach, and another step on the long-overdue journey toward a passwordless future.

Why Microsoft’s Move Matters
Microsoft’s decision to make passkeys the default sign-in method across its platforms (including Outlook, Xbox, and Microsoft 365) is a powerful endorsement of passwordless authentication.

Here’s why we think it’s so important:

Reach: Microsoft can bring passwordless authentication to a massive audience. Educating their users about the benefits and ease of use of passkeys will accelerate adoption across the board.

Security: Passkeys, built on FIDO standards, offer significantly stronger security than passwords. They are resistant to phishing, keylogging, social engineering, and other common attacks that passwords are vulnerable to. With cyberattacks targeting login credentials on the rise, this enhanced security is purpose-built to meet security needs.

User Experience: Microsoft is focusing on a streamlined sign-up and sign-in process, making passkeys easy to adopt and use. By making the user experience simple and intuitive, they are removing a major barrier to adoption.

Another Nail in the Password Coffin
For years, passwords have been the weakest link in online security. They are hard to remember, easy to guess, and constantly targeted by attackers. The industry has known this for a long time, and we’ve been working towards a better solution. Microsoft’s move is another big step in getting rid of passwords once and for all, leading us closer to a more secure online world.

What This Means for the Industry
Microsoft’s commitment to passkeys will likely have a ripple effect across the industry. As more and more users experience the benefits of passwordless authentication, other companies will be compelled to follow suit. This increased adoption will drive further innovation and standardization in the passkey space, making it easier for everyone to implement and use passwordless solutions.

Why We’re Thrilled Here at Nok Nok
We here at Nok Nok have been a pioneer in passwordless authentication, and we’re excited to see a tech giant like Microsoft championing passkeys. We know that passkeys are the future of authentication. Microsoft’s initiative validates our vision and demonstrates the growing momentum behind passwordless technology. We have been building and deploying FIDO-based passwordless solutions for over a decade and our FIDO-certified solutions are deployed at internet scale to hundreds of millions of global end users. We are ready to support businesses in implementing passkeys and are excited about helping make the internet safer for everyone!

Read more
07 Mar
3 Min read

The US Government Now Wants Phishing Resistant MFA

March 7, 2023 Nok Nok News Industry News 0 comments

One year ago, the United States government issued a new mandate. The goal was to transition key government digital infrastructure to “Phishing Resistant MFA” systems by 2024. Phishing is where cyber-criminals use deceptive techniques or even digital spy/surveillance technology to steal the login credentials required to access an account. The traditional password system has always been especially vulnerable to this, as a single password grant total access.

How Passwords Are Stolen

The most common techniques for stealing access are:

Phishing

This usually entails a deceptive email impersonating an individual or organization of authority that requires a credential check-in, usually at a fake website.

Push Bombing

The practice of sending multiple notifications to a person’s device, hoping that fatigue will eventually cause them to erroneously accept a notification and inadvertently grant access to a device.

SS7 Protocol Vulnerabilities

The cellular communication infrastructure has certain vulnerabilities that allow for outside surveillance. More sophisticated cybercriminals can spy on these lines of communication to read messages sent via text/SMS.

SIM Swap

A more specialized form of phishing, this technique impersonates the victim, going to the service provider and deceiving them into surrendering more access to an account to the person posing as the identity that they wish to steal. Here, the victim doesn’t provide access; the victim’s service provider does.

How MFA Helps

Phishing-resistant multifactor authentication, or MFA, throws up barriers that make these established practices nearly impossible to execute. The multifactor nature of this authentication means more than one component is required for verification and access. This means that even if a password is still being used, should it be stolen, other components, such as biometrics, or a physical passkey, prevent the password alone from being enough to grant access.

The Fast Identity Online Association, or FIDO, has worked with the Cybersecurity & Infrastructure Security Agency, or CISA, to create standard phishing-resistant MFA technology that works across different forms of hardware and software. FIDO/WebAuthn authentication and public key infrastructure, like passkeys, mean that even surveillance techniques like SS7 can’t yield complete success for thieves because the required usage of a passkey on a specific device or biometrics, such as a thumbprint, prevents remote access.

This provides government workers the security they need to protect data while still providing the flexibility to securely access that data, onsite or at any location, with their personal devices.

If you’re interested in improving your cybersecurity, you can learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
02 Mar
3 Min read

The Government Is Now Turning To The Private Sector For Better Cybersecurity

March 2, 2023 Nok Nok News Industry News 0 comments

Government data is some of the most valuable in the United States. Some of it, like data on the citizenry, contains important private information, such as social security numbers, that can be used for identity theft. Other data, such as military or economic information, can be valuable for theft and personal usage or sold to interested parties.

Because of this, government cybersecurity has always been a driving consideration. However, the government doesn’t rely strictly on internal security measures coded by their agencies. Increasingly, the private sector has been providing cybersecurity measures in key areas, with two companies, in particular, making great strides.

A Partnership For Better Cybersecurity

Ping Identity in Colorado and UberEther in Virginia are two prominent American software companies that now work closely with the government on two major fronts; security and identity management. The government had always been interested in improving cybersecurity, particularly identity management, but this need was accelerated two years ago, as the global pandemic began. More and more government workers needed access to their data while working from home. This need for remote access was hampered by legacy security systems that had never intended that kind of access.

Ping Identity and UberEther helped government agencies from municipal, state, and Federal to transition to identity management systems that operated in a hybrid environment. Workers needed flexible systems that allowed them the expected onsite access but also gave them the flexibility to use could-based resources if required.

At the same time, this greater convenience still needed to operate in a “zero trust” environment that assumed all queries were hostile and required multi-factor authentication to verify identities. The days of a single password granting total access wouldn’t work under these more demanding security constraints while providing greater work flexibility.

FIDO Helps

Because of the collaboration between companies like Ping Identity, UberEther, and the Fast Identity Online Association, or FIDO, passwordless multi-factor authentication has become more feasible to implement seamlessly across multiple platforms. Workers are no longer restricted to specific software on specific hardware, allowing people to use more devices in different locations without compromising the sensitive data that must be restricted to only authorized personnel.

Identity management has become increasingly complex as data resides online but must be retrieved from other locations and devices. Passwordless multifactor authentication technology is crucial in providing a way for the government to conveniently access this data while still protecting it.

If you’re interested in improving your cybersecurity, you can learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
28 Feb
3 Min read

The US Government Is Ramping Up Cybersecurity Precautions

February 28, 2023 Nok Nok News Industry News 0 comments

Government operates at roughly three levels: municipal, state, and federal. At each level, there is a wealth of valuable information that must remain private either for individual citizens’ protection or national security reasons.

However, when the military’s research wing, Defense Advanced Research Projects Agency, or DARPA, created the “ARPANET,” they laid the cornerstone for the modern Internet that everyone uses today, and everything changed. The ability to send, receive, and access information online made data-based technologies much more efficient but also much more vulnerable. Ever since then, cybersecurity has been a major concern, as it should be.

CISA At Work

In 2018, the government formed a new organization known as the Cybersecurity & Infrastructure Security Agency, or CISA. As the name suggests, this new agency is dedicated to preserving the cybersecurity integrity of government digital infrastructure and other key infrastructure systems that may rely on government systems.

Since its formation, the agency has been evaluating the state of cybersecurity in the United States, and in September of 2022, it presented its strategic plan, which comprises two main spearheads.

Risk Reduction

The first and most important is reducing the vulnerability of various American government digital systems and making them more robust against cyberwarfare, both against private individuals and state-sponsored actors. 2022 has already demonstrated the importance of digital infrastructure as the world witnessed Russian hackers attempt to destabilize Ukrainian infrastructure, such as power generation, during their invasion. Large-scale intrusions have occasionally victimized various corporations and even medical facilities over the years that, compromised the private data of thousands of people. These are all lessons CISA is taking into account for the government’s own cybersecurity.

Resilience

Another key factor is the ability to respond in the event that a system is compromised and a disruption occurs. It’s not enough to create defenses to repel digital incursions; plans must be in place to respond and recover should a compromise occur. Any organization that has no precautions in place for a breach of defense can make a recovery extremely difficult, sometimes even impossible, if there was never a recovery plan in place and the entire system relied on never failing.

To this effect, CISA has worked on recognizing critical infrastructure, looking at the vulnerabilities in place for those systems, and working quarantine and recovery processes to aid in hastening the restoration of critical functions. 

All of these cybersecurity measures encompass newer protocols, such as passwordless authentication systems. If you’re interested, you can learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
24 Jan
3 Min read

Intuit Announce New Advances In Digital Financial Management

January 24, 2023 Nok Nok News Industry News 0 comments

Intuit has made a name for itself in financial management by spearheading digital efforts to help accountants and others manage finances digitally, making finances faster, more efficient, and more secure. They are already well known in financial circles for software such as Turbo Tax, Credit Karma, and QuickBooks, which have served individuals and companies alike. Now, according to Yahoo Finance, Intuit has a suite of innovations to make digital financial management even more convenient, all of which point to an increased need for cybersecurity.

Commerce Accounting

A recent survey indicates that a lot of accounting is still carried out through a combination of software and pen-and-paper activities. Commerce Accounting is a new function from Intuit that seamlessly integrates more possible commerce channels into a digital stream to reduce the manual work required.

For example, now sales from retailers such as Amazon, eBay, and Shopify can track and add transactions and other interactions directly into QuickBooks so that users no longer have to enter these transactions into their business financial records manually.

More Cybersecurity Integrations For Mid-Market

Intuit is introducing new features and functionality for mid-market software to help larger companies get more efficient financial accounting and even help to improve sales. QuickBooks, for example, is introducing “Spreadsheet Sync,” which works with industry standards like Microsoft Excel to integrate two-way syncing and help streamline the accounting and reporting of activities.

Other innovations include “Custom Report Builder with Chart View,” which can help to track key performance indicators in sales activity, letting businesses get a more accurate picture of what sales are doing and which factors matter to them.

QuickBooks Online Expansion

QuickBooks itself is increasing its range of services, including software suites for human resource management and centralized online resources for accounting, and even training portals to help businesses and entrepreneurs at different stages of development to incubate important skills and business practices that can be crucial to long-term success.

However, with this emphasis on more convenient online resources, this also means a need for companies to have better cybersecurity. While easy to implement, traditional password systems are increasingly vulnerable to being compromised. Single-factor authentication using a password system introduces a risk of password theft. Many users choose easy-to-guess passwords to make things easier for themselves without realizing this also makes it easy for criminals to guess or “brute force” these passwords. Increased cybersecurity, such as multifactor authentication or passwordless systems like passkeys, can circumvent this.

If you’re interested in passkeys and increased cybersecurity, learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
17 Jan
3 Min read

Apple Introduces New iPhone Security Features

January 17, 2023 Nok Nok News Industry News 0 comments

The smartphone has become a vital device for many users, and the iPhone is one of the most common models today. As a result, a lot of important data and accounts are accessible through the use of an iPhone, meaning that security has become far more important for these devices. Multifactor authentication, which is a process of using more than one verification system, has been crucial in increasing cybersecurity. As documented by Forbes, Apple has introduced new ways to improve that security further.

Physical Security Returns

The iPhone is now adding an additional layer of multifactor authentication security in the form of “security keys.” Unlike passkeys, which are entirely digital in form, a security key is a physical object, such as a token that uses NFC technology or a USB device that plugs directly into the phone.

The security key operates by being paired and recognized by only a single device. When attempting to access an iPhone with security key features enabled, in addition to multifactor authentication measures such as face or fingerprint recognition, the security key must either be in proximity to the iPhone or plugged directly into it, depending on the nature of the key. The iPhone will only unlock if the presence and validity of the security key are confirmed.

Why This Matters

Today’s smartphones, including the iPhone, often contain some of the most important data and access in a person’s life. In addition to personal materials such as photos and messages, accounts for everything from banking to shopping are typically part and parcel of accessing an iPhone. In other words, people who have phones stolen and accessed aren’t just losing a convenient form of communication; they may also be granting thieves access to their financial data, work data, and personal data.

This is why multifactor authentication is crucial for device security, especially for devices like iPhones that are small and can be easily lost or stolen. If a phone is lost, the security key requirement prevents others from accidentally accessing the device. In the event of theft, criminals cannot use the data on the phone for broader criminal activities, such as identity theft, emptying bank accounts, and using credit cards to make purchases. 

iPhones are incredibly convenient devices, especially with more and more interactions centralized online. However, that same convenience also means the devices are particularly vulnerable and can cause enormous damage if unauthorized users access them. 

If you’re interested in passkeys and increased cybersecurity, learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
10 Jan
3 Min read

You Can Set Up Passkeys On Your Apple Devices

January 10, 2023 Nok Nok News Industry News 0 comments

Traditional passwords, especially those that are only single-factor authentication systems, continue to be one of the weakest ways to secure devices, accounts, and important digital data. It’s one of the reasons why many of the big technology companies such as Google, Microsoft, and even Apple are now embracing passwordless authentication systems that are both more convenient and more secure than the old password system.

Apple, in particular, is now encouraging users to use multifactor, passwordless authentication systems, and many technology outlets, such as Tom’s Hardware, are now showing Apple users how to implement these “passkey systems” on their iPad, iPhone or Mac device.

Encrypted Device-Specific Security

The passkey system adds multiple layers of security to data and devices. It uses two encrypted “keys” that are paired with each other. One is the “public key,” which is encrypted and stored online, while the other, the “private key,” is encrypted and stored only on a specific device, such as an iPad, iPhone, or Mac.

When a user attempts to access an account, device, or data protected by a passkey system, the public key communicates with the private key over encrypted communication channels. When combined with existing biometric measures on Apple devices like TouchID or FaceID, this combination of biometrics and device-specific passkeys mean that stealing access strictly through online means is impossible, while even stealing the device won’t yield access without biometric authentication.

Setting Up Passkeys

Creating a passkey for an Apple device is comparatively simple. The first steps involve:

Going Online

Go into the settings section, select “Password,” then “Password Options,” and toggle on Autofill Passwords. Then tap iCloud Passwords & Keychain.

Enable Passkeys

Click the Apple logo and then go to “System Settings.” Select your name, then “Select iCloud.” Toggle on “Password & Keychain.”

Create Your Key

Your Apple device is now ready to accept a passkey. Use the supporting website or app of your choice, and follow the specific directions for the service you are using.

Changing Security

It’s also possible for accounts with an existing password system to transition to the more secure passkey passwordless authentication system. This varies from service to service, but you can always check by going into the account area of the service or website you use and seeing if a “Set Up Passkey” option is available. If so, tap on that to switch to passwordless authentication on your Apple device.

If you’re interested in passkeys and increased cybersecurity, learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
05 Jan
3 Min read

Google Broadens Its Passkey Plans For More Users & Devices

January 5, 2023 Nok Nok News Industry News 0 comments

Multifactor authentication continues to be a new and more secure way for people to access devices, accounts, and data. While the traditional, single-factor authentication password system is fast, cheap, and easy to implement, it is also by far the most vulnerable security system.

As a result of digital security advances, newer and better systems are coming online. According to Gadgets 36-, Google is one of the major players in the technology industry that has decided to help its users enjoy greater security by implementing passkey systems for password-free security.

No More Stolen Passwords

For Chrome users on Android and Mac devices, Google now has a password-free system, known as a “passkey,” that users can use instead of traditional password systems. A single-authentication password system is extremely vulnerable because stealing or guessing the password alone grants total access to a device or account. Moreover, most passwords are considered “weak” because people choose easy-to-guess or remember passwords rather than endure the greater security and inconvenience of the recommended random string of alphanumeric characters that many find too difficult to remember and thus fail to comply with.

Multifactor authentication methods mean more than one form of verification is used. So even if a password is part of that system, stealing the password alone is not enough to grant total access.

How Passkeys Work

Passkey systems operate by pairing together two digital “keys” that must communicate with each other to grant access. A “public key” is first encrypted and stored online. The second, known as a “private key,” is generated for a specific device, such as a phone, tablet, laptop, or desktop computer.

When a user attempts to access an account, data, or device that is passkey protected, the private key in a device must communicate via encrypted channels with the public key. Only after encrypted interaction and confirmation of private and public keys is access granted, but at no point is a passkey required.

Google Spreads The Word

Google is now making it easier for Chrome users to transition from passwords to passkeys. Chrome users who have Android devices can enjoy device-wide usage of passkeys. However, passkeys generated on Chrome for macOS or Windows devices will not have those passkeys shared online, only locally stored on specific devices. However, passkeys are still a stronger form of password-free security, especially when combined with other authentication factors such as biometrics.

If you’re interested in passkeys and increased cybersecurity, learn more here about Nok Nok’s multifactor authentication technology and passwordless security measures.

Read more
29 Dec
3 Min read

New Survey Indicates Consumers Are Taking A Zero Trust Stance

December 29, 2022 Nok Nok News Industry News 0 comments

AP News reports that recent surveys from a digital identity trust company, indicate that 92% of consumers in the USA now believe that cybersecurity threats will outpace current cybersecurity measures. In a study conducted with 2000 Americans and 1000 British, responses indicate that average Americans now believe that the digital environment is inherently risky, with that risk continuing to rise. A surprising 91% of those surveyed showed an interest in taking extra personal digital security precautions, like multifactor authentication, rather than leaving their data entirely up to the protection of external systems.

The Password Is The Culprit

The survey also indicated that 68% of respondents felt that the traditional password security system is the most used yet simultaneously least trusted security measure implemented today. These consumer fears are, unfortunately, well-founded. For several reasons, traditional, single-factor passwords, as a cybersecurity measure, are one of the most vulnerable systems in today’s digital world.

If a password system is single-factor only, that means knowing a password grants total access to whatever is protected behind it. Multi-factor systems at least reinforce security by requiring something more than a password to grant access. However, the biggest issue with passwords is the continued use by many people of “weak passwords.” Most people prefer to use an easy and easy-to-remember password, and it’s not unusual for people to use the same password for multiple accounts.

These two traits combined make many consumers vulnerable. An easy or weak password means it can be easily guessed or even “brute-forced” through a process of elimination. If that password is also used for other accounts, that can potentially mean stealing the password for an online streaming service account can grant access to online shopping accounts, credit cards, and even bank accounts.

Unfortunately, even if a password is “strong” and uses a random string of alphanumeric characters if it is tied to a traditional, single-factor authentication system, it is still vulnerable. The consumer may have strong personal passwords to protect themselves, but they can still be stolen through a security breach, not with them, but with a company with which they hold an account. Businesses such as Yahoo, Sony, Twitter, eBay, LinkedIn, and many others have experienced data breaches where thousands—or even millions—of accounts were compromised and put consumers at risk through no fault of their own. 

Multifactor authentication, however, is making great strides in cybersecurity. If you’d like to give your customers an alternative to passwords and increase your digital security, learn more here about Nok Nok’s next-level multifactor authentication technology and passwordless security measures.

Read more
    123…7

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • World Password Day: Time to Ditch Passwords for Good?
  • Verizon 2025 DBIR: Credential Attacks Still Dominate – A Nok Nok Perspective
  • Phillip Dunkelberger Recognized as a “Champion in Security” by Portal26 at RSA Conference 2025
  • Another Step Towards a Passwordless Future

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

 

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required

[mc4wp_form id=”18773″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18790″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18789″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18788″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18787″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18786″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18785″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18784″]

Please complete this form to view and download this resource.

[mc4wp_form id=”18783″]

MUFG-800×600

“Transactions using mobile devices are rapidly spreading and it is essential to support both usability and security. By combining Hitachi’s abundant system development capabilities and know-how in the financial system and security related fields, and Nok Nok’s globally deployed and proven FIDO certified products, we achieved this compatibility, which led to this adoption.”

– Mr. Nobuo Nagaarashi, General Manager, Financial Information Systems 1st Division, Hitachi, Ltd.

 

The M in MUFG stands for Mitsubishi, which is a combination of the words mitsu and hishi. Mitsu means three. Hishi means water chestnut, and the word denotes a rhombus or diamond shape.  In partnership with Hitachi, MUFG has enabled passwordless authentication solutions across many of the bank’s apps and services.

Coverage In The Paypers
Coverage In Finextra
intuit

“As an early adopter of FIDO, we’ve seen significant business benefits and are completely on board with continuing to leverage the latest FIDO innovations with our partner, Nok Nok.”

– Rakan Khalid, Group Product Manager, Identity.

 

Intuit has delivered passwordless authentication across mobile applications and devices using Nok Nok’s S3 Suite. The results have reduced customer friction in their Intuit application experience.

Read The Nok Nok Intuit Case Study
Watch the FIDO Alliance Webinar: The Right Mix
Watch Marcio Mello discuss Intuit’s Nok Nok implementation at Identiverse 2019:
docomo-800×600

“DOCOMO is a worldwide innovator in providing its millions of customers with simple and strong authentication backed by a standards-based approach.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

As one of Nok Nok’s earliest customers, NTT DOCOMO became the first carrier to offer a billing system that is enabled by FIDO, the first to offer a federated Identity system integrated FIDO, and was the first to offer a mobile device that authenticates via the iris biometric modality.

Coverage In Find Biometrics
Coverage In Telecompaper
bbva-800×600-2

“Traditionally, one of the biggest challenges of authentication systems has been to balance security with user experience. Due to the FIDO standard, we are confident that both elements work together seamlessly to provide customers with the highest security standards, along with a transparent and agile user experience.”

– Juan Francisco Losa, Global Technology & Information Security Officer.

Nok Nok partnered with banking leader, BBVA to improve the security and user experience of the bank’s mobile banking services through state-of-the-art biometric capabilities.

Coverage In American Banker
Coverage In Planet Biometrics
Softbank-800×600-1

“We can no longer rely on passwords for our financial or other sensitive transactions as they are weak, forgotten and easily hacked. We are very pleased with SoftBank’s decision to choose our standards-based authentication platform for their millions of customers.”

– Phillip Dunkelberger, President & CEO of Nok Nok Labs.

 

Millions of SoftBank’s mobile subscribers now have the ability to use biometrics for authentication through the mobile application “My SoftBank Plus”. With this implementation, SoftBank’s mobile users access data with the My SoftBank service using biometrics for a frictionless, simple and fast authentication experience.

Coverage In Mobile ID World
Coverage In Planet Biometrics
Coverage In The Paypers
Aflac-Japan-800×600-1

“Aflac is the first Japanese insurance provider to deploy a FIDO-certified solution, and we would like to continue collaborating with Nok Nok Labs to introduce it to banks, insurance industry and other industries.”

– Michihiko Ejiri, VP, Head of Portal Service Division, Service Technology Unit, Fujitsu Limited.

With the Nok Nok S3 Suite, Fujitsu has provided Aflac customers with strong authentication to their mobile claims payment application using any biometrics on their iOS and Android devices. The solution also provides Aflac and their customers with a scalable method to authenticate users that is interoperable with their existing security environments and reduces or eliminates the reliance on usernames and passwords.

Coverage In Find Biometrics
Coverage In Find Authority
lichtenstein-800×600-1

“For our customers, we only use the most secure products on the market that meet their requirements. Nok Nok perfectly aligns within our product portfolio and we are proud of the very trusted partnership.”

– Lukas Praml, CEO of YOUNIQX.

 

YOUNIQX Identity AG, the award-winning subsidiary of the Austrian State Printing House (OeSD) and Nok Nok partnered to deliver a electronic identity system (eID) for the citizens of the country of Liechtenstein.  This deployment represents the first time that Nok Nok’s FIDO platform has been used to deliver an eID.

FUN FACT
As of 2009 Liechtenstein’s per capita income was $139,100, the highest of any country in the world.

Learn How FIDO Supports EIDAS Regulation
Coverage In Mobile ID World
Coverage In The Paypers
Coverage In Biometric Update
Gallagher-800×600-1

“Nok Nok’s state-of-the-art, standards-based platform will deliver a tremendous user experience,”

– Steve Bell, Chief Technology Officer at Gallagher

When a horse called Joe took too much of a liking to using a car as a scratching post, owner Bill Gallagher Sr. devised a cunning electrical circuit that delivered a shock whenever the horse rocked the vehicle, and in doing so created a company.  Today, with passwordless authentication from Nok Nok, Gallagher is leading the IoT industry with innovative solutions that work in your office and in the outback.

Coverage In Biometric Update
Coverage In Mobile ID World
Coverage In Planet Biometrics
tmobile-800×600-1

“Our Forgot Password flows were running at about 65%. After we rolled out FIDO by Nok Nok, our forgot passwords dropped to 7%.”

Michael Engan, T-Mobile

 

Using the Nok Nok S3 Suite, T-Mobile has become a leader in carrier adoption of passwordless authentication. Their solutions have reduced forgotten passwords and dramatically improved customer satisfaction.

Watch Michael Engan from T-Mobile talk about their implementation of Nok Nok’s S3 Authentication Suite at Identiverse 2019.

  • 日本語