RSA Security expanded its line of tokens in two directions on Tuesday, launching both a browser toolbar and a hardware token that can electronically “sign” online transactions. The introductions at ...
Replacing the weak security of passwords with two-factor authentication is a no-brainer for security today, but there are still situations where passwords remain. Replacing the weak security of ...
Token replacement after the breach of RSA's SecurID token in March was highest in Australia. However, the company remains satisfied with how it handled the incident. About 10 percent of RSA SecurID ...
If you're in an environment where you need to make use of RSA SecurID software tokens and have a BlackBerry 10 device, you can now download the official app from BlackBerry World. The app is of course ...
You can keep control over your own products while allowing later software downloads. This technology can be ported to other ARM 7 or 9 based products. CypheRix has a ...
With the March RSA hack still ringing in the ears of token users, banks and any organisation that uses tokens for two-factor authentication, the world must finally learn that authentication does not ...
The best application for tokens remains when you need stronger authentication than a password, and it is not practical to use biometrics, says BT’s Bruce Schneier RSA’s SecurID tokens, with their red ...
RSA Security's proposed acquisition of privately held Cyota will allow the company to offer a relatively cheap two factor, non token-based authentication system for its banking customers. RSA is ...
A researcher has devised a method that attackers with control over a victim's computer can use to clone the secret software token that RSA's SecurID uses to generate one-time passwords. The technique, ...
News that Symantec lost some of the Norton AV source code is not new – the story gained credence in early January when some of the source code was sent to Infosec Island. The story has never gone away ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results