authentication
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Enterprise-level management and control of SSL certificates
Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …
NBC News Twitter account hijacked by using a Trojan?
On the very eve of the tenth anniversary of the September 11 attacks, the NBC News Twitter account begun posting messages saying that two civilian airplanes have been hijacked …
SecurityByte: Cyber conflicts, cloud computing and printer hacking
Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …
KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Entrust strengthens mobile security with device authentication
In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …
New OAuth toolkit
Layer 7 Technologies unveiled its OAuth Toolkit, an enterprise-class solution to provide a generalized framework for handling a broad range of OAuth scenarios across cloud, …
Mac OS X Lion login password easily revealed
Mac OS X stores user login passwords in system memory even if the computer is locked or put into a sleep mode. The vulnerability is present in all modern versions of Mac OS X, …
Enterprises fail to control mobile access
The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
The future of identity verification through keystroke dynamics
When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …
Multi-function fingerprint sensor for tablets and notebooks
AuthenTec announced its newest smart sensor for the PC market, the AES2665, which is integrated in the TouchStone package module, gives PC and tablet users security, enhanced …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer