The WiKID Blog, musings on two-factor authentication, information security and some other stuff.
more-on-layered-authentication
Posted by: admin 16 years, 3 months ago
Ok, I slagged the concept of 'layered' authentication as a marketing neologism in my response to Eric Nolan's identity predictions for 2006. I was overcome by prediction hysteria. I've got to calm down...more-on-online-brokerage-fraud
Posted by: admin 16 years, 3 months ago
The Washington Post has an article today about the the increase in online brokerage fraud.
E-Trade Financial Corp., the nation's fourth-largest online broker, said last week that "concerted rings" in Eastern Europe and Thailand caused their customers $18 million in losses in the third quarter alone.To put that into perspective, E-Trade earned $128.1 million on revenue of $488.7 in their fiscal fourth quarter.
more-on-targeted-phishing-attacks
Posted by: admin 16 years, 3 months ago
A nice round up of article over at Infoworld, which links to a Washington Post article on virtual credit cards.wikid-systems-in-trouble-again-for-bribing
Posted by: admin 16 years, 3 months ago
Today it was revealed that selected bloggers that include positive mentions of WiKID Systems' two-factor authentication system were promised that could potentially receive a new-to-them laptop for their efforts. The laptops were described as Dell Latitude CPx with a screaming fast in-its-day P11600mhxz chip that are currently stacked unused in the closet and a dual-boot Thinkpad T23 with a persnickity display and built-in Snarkiness (TM) for the best blogging experience.
15-percent-of-corporate-pcs-have-keystroke-loggers
Posted by: admin 16 years, 3 months ago
According to David Aucsmith, architect and CTO, Security Business & Technology Unit at Microsoft, 15% of corporate PCs have key stroke loggers.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)