ID R&D Blog


Document liveness for biometrics software

What Is Document Spoofing?

The integrity of digital onboarding processes is threatened when bad actors can easily use spoofed identity documents. The advancement of mobile computing has had a remarkable impact on so many…
Read More
Log4j vulnerability

Q&A on the Log4j vulnerability

News broke late last week that a vulnerability in the Log4j Java logging framework was being exploited by hackers.  What is Log4j? Log4j is a Java-based logging utility that is…
Read More