Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
Authenticator apps (TOTP)
Push authentication
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
AI
Fraud awareness
Biometric authentication

Webinar July 2025 - Building high-trust in the age of AI-powered fraud

Ashutosh Bhadauriya
⬤
August 13, 2025
Share
Webinar July 2025 - Building high-trust in the age of AI-powered fraud

Last month, we hosted a webinar with our partners at iProov, diving deep into the evolving landscape of multi-factor authentication. With phishing attacks becoming more complex and AI-powered fraud on the rise, old-school MFA approaches are showing their age.

Don’t miss the insights—watch the full webinar below to discover how to build stronger, more adaptable authentication strategies that protect your customers today and tomorrow.
[▶ Watch the Webinar]

‍

The problem with traditional MFA isn't just about your front door

Here's a misconception we hear all the time: "We've got MFA at login, so we're covered." But you just can’t lock your front door and leave every other entry point wide open.

Traditional MFA implementations typically focus on that single sign-in moment, but threats happen throughout the entire customer journey. Between your "front door" (login) and your customer's transaction, there are countless opportunities for bad actors to strike:

  • Session hijacking - stealing active sessions from devices
  • Phishing and social engineering - still the number one cybersecurity threat in 2024
  • Contact center fraud - exploiting less secure workflows
  • SMS man-in-the-middle attacks - intercepting those "secure" text messages

The reality is that authentication needs to be dynamic and journey-based, not just a one-time gate at the beginning.

‍

The AI revolution is making attacks cheaper and more convincing

We've all seen the headlines about deepfakes, creating convincing fake content is no longer expensive or technically complex. Our colleagues at iProov demonstrated how you can perform a face swap attack for just $60 using a standard MacBook Air and readily available tools.

The data backs this up. iProov's threat intelligence shows:

  • Face swap attacks surged by 300% in the last year
  • The number of attack tools increased by 15%
  • Many of these tools are now free or offer basic versions at no cost
  • Image-to-video conversion tools can bypass even active liveness detection

What's concerning is the rise of "fraud as a service" - organized groups selling attack methods specifically designed to break KYC platforms used by banks and financial institutions.

‍

Phishing-resistant passkeys

If there's one thing you take away from this post, let it be this: passkeys are phishing-resistant. That's their superpower.

Here's why passkeys are different from passwords or even traditional biometrics:

The cryptographic binding

Passkeys use a public-private key pair that's cryptographically bound to the specific website or domain that issued them. This means:

  • You can only use a passkey on the legitimate website that created it
  • Even if a phishing site looks identical to the real thing, your passkey simply won't work there
  • The credential manager won't release the signature on fraudulent domains

Beyond screen lock security

Many banking apps today use what feels like biometrics - you open the app and use Touch ID or Face ID. But here's the key difference: that's just client-side authentication, essentially a fancy screen lock.

True passkey authentication involves end-to-end verification:

  • Your device generates a cryptographic signature
  • The server verifies this signature using the stored public key
  • Both client and server participate in the security process

‍

Biometrics are the perfect complement to passkeys

While passkeys prove possession of cryptographic material, biometrics answer a different question: "Is this really you?" When combined, they create what we call "inherent space authentication" - verifying who the user is, not just what they know or have.

Implementation points

The best place to introduce high-assurance biometrics is during onboarding, when the relationship with your customer is at its highest trust level. This is where you can:

  • Bind facial biometrics to the user's identity
  • Link biometrics to government-issued documents
  • Create the passkey enrollment process
  • Set up the foundation for risk-based authentication

Risk-based journey design

Not every transaction needs the same level of security. Smart authentication adapts based on context:

Low-risk scenarios: Simple passkey verification for small transactions to known accounts

High-risk scenarios: Biometric verification for:

  • Large transactions above certain thresholds
  • Transactions from dormant accounts
  • Device changes or new device enrollment
  • Account recovery situations

‍

Real-world use cases where this actually matters

Account recovery

Traditional account recovery is often a nightmare - long waits, manual reviews, frustrated customers. With biometrics enrolled at account creation, users can recover access by proving they're the same person who opened the account, even if they've lost their device.

Dormant account reactivation

Banks spend enormous resources on manual re-KYC processes for dormant accounts. If you've already bound biometrics to the original KYC documents during onboarding, reactivation can be automated and instant.

Contact center authentication

Instead of relying on easily compromised knowledge-based authentication ("What's your mother's maiden name?"), agents can verify callers using the same biometric templates established during digital onboarding.

‍

Regulation is catching up

For the first time in a while, regulation is actually keeping pace with technology. Central banks across the ASEAN region, including the Philippines, are actively directing financial institutions to move away from SMS OTPs.

This regulatory push is creating the perfect opportunity for banks to modernize their authentication infrastructure with passkeys and biometrics - not as a nice-to-have, but as a compliance necessity.

‍

Getting started by thinking journey, not technology

When planning your authentication upgrade, resist the urge to think about individual technologies in isolation. Instead:

  1. Map your customer journey - identify all the touchpoints where authentication matters
  2. Assess risk at each stage - not every step needs maximum security
  3. Start with onboarding - this is your highest-assurance moment
  4. Design for recovery - plan how users will regain access when things go wrong
  5. Think holistically - combine passkeys and biometrics strategically

‍

Your next steps

Authentication isn't just about keeping bad guys out, it's about creating experiences that don’t create friction legitimate customers while stopping fraud. The combination of phishing-resistant passkeys and high-assurance biometrics gives you the tools to do both.

The threat landscape is evolving rapidly, with AI making attacks cheaper and more convincing than ever. But the solutions are evolving too, and they're more accessible than you might think.

Start exploring how passkeys and biometrics can transform your authentication strategy. We're here to help you navigate this journey, from proof of concept to full production deployment.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
AI
Fraud awareness
Biometric authentication

You might also like

How to add push authentication to your app with Authsignal and React Native
Push authentication
React native
Node.js
Multi-factor authentication
Guides

How to add push authentication to your app with Authsignal and React Native

March 27, 2026
BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026
BSP Circular 1213
Philippine banking
SMS OTP
Risk based authentication

BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026

March 18, 2026
How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge
AWS
Authentication
Security

How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge

March 10, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies