authentication
Security challenges for the finance sector
As the migration to Windows 7 is proving a catalyst to organizations, banks are stepping up to the challenge to protect themselves against malware attacks abusing admin …
Optical transaction signing device limits ebanking fraud
SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …
Retailers increasingly considering biometric authentication
More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …
Biometric technologies for Android
Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …
Single packet authorization and port knocking
fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …
Exostar updates identity management solution
Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …
Syncplicity launches Security and Compliance Console
With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Yahoo! Mail now with second sign-in verification
More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
Pros losing confidence in hard tokens
Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …
Fraudsters beat two-factor authentication, steal $45k
It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer