Please turn on your JavaScript for this page to function normally.
RSA admits SecurID tokens have been compromised

RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens. The admission comes …

Reveal Facebook passwords stored in Web browsers

Logins and passwords to various Web resources are routinely stored or cached in Web browsers to speed up access to protected resources. While it is possible to extract cached …

Physical, logical and mobile authentication in one software

Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …

Attack against Lockheed Martin result of previous RSA breach?

Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …

Cloud identity tools for LinkedIn, Twitter and Microsoft Live

Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …

The rise of layered fraud prevention

By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication …

Google authentication protocol flaw endangers Android users

If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …

OpenID Attribute Exchange flaw

The OpenID Foundation has issued an alert for all sites using OpenID that don’t confirm that the information passed through Attribute Exchange – the service …

Governance on unstructured data

Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …

Embed strong authentication into mobile applications

To improve the speed and efficiency in which financial institutions develop and provide customers secure, trusted mobile banking applications, Entrust announces their …

Creating a secure firewall policy for a large company

When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …

Entrust expands authentication platform

Entrust is extending their Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private …

Don't miss

Cybersecurity news