As cybercrime becomes increasingly sophisticated due to advancements in AI, users must adopt “phishing-resistant” passkeys to safeguard their online accounts. AI can now assist attackers in creating convincing phishing websites that closely mimic legitimate sites, posing a significant threat to traditional password-based security. Biometric authentication methods, such as fingerprint or facial recognition, are becoming the go-to options for enhancing security. Systems like Face ID, Touch ID, and Android’s Face Unlock are excellent examples of this technology in action.
Additionally, using PINs or patterns to unlock devices can help reinforce security. The main advantage of passkeys is the elimination of usernames and passwords, which means that stolen credentials cannot be exploited. For instance, attacks cannot access your account if you’ve set up a passkey since there are no two-factor authentication codes to steal. Recent reports from leading context on identity and access management highlight that threat actors are increasingly using AI tools to develop phishing sites.
Okta, a recognized IAM company, has observed the use of an AI tool called Vercel’s v0.dev, which allows users to generate deceptive web interfaces through simple text prompts. This capability enables attackers to create high-quality replicas of legitimate sign-in pages, significantly increasing their chances of deceiving victims. Okta’s Threat Intelligence team has witnessed real-time phishing attacks targeting well-known brands like Microsoft 365 and various cryptocurrency platforms. AI’s capacity to produce convincing phishing sites makes traditional indicators of deception, such as spelling errors, less effective.
Even two-factor authentication is no longer a foolproof defense. Consequently, the best strategy for users is to implement passkeys wherever possible and to avoid passwords in favor of these more secure alternatives. If a password is unavoidable, it should be complex, unique, and reinforced with robust non-SMS two-factor authentication methods.