strong authentication identity theft biometrics live encryption fraud credit card fraud identity authentication man-in-the-middle attack land attack identity theft protection authentication two factor authentication microsoft .net authentication online fraud logic bombs security internet security id theft identity 2.0