Viewing posts from January, 2009
comment-status
Posted by: admin 15 years, 10 months ago
As with every blog out there, we've been battling comment and trackback spam. I had turned off comments altogether, but now have turned them back on. Comments are still protected by WiKID Strong Authentication, but you can add a comment anonymously. Here's how to do it:
features-and-functionality-for-consumer-acceptable
Posted by: admin 15 years, 10 months ago
Anton Chuvakin posts a response to this post about the PayPal tokens. These posts point out a number of desired features for broad-based consumer roll-out of two-factor authentication, such as the hope for a single token to work everywhere. but fail to mention that token won't stop phishing (one of the commenters does point that out).
dhs-predicts-more-brokerage-attacks
Posted by: admin 15 years, 10 months ago
The DHS is joining in on one of my earlier predictions: Brokerage accounts will be increasing targeted in the coming year. According to their post they are tempting accounts because they typically have more money in them. Further, typical anti-fraud transaction analysis doesn't really work because of the infrequency of transfers.
I'm convinced that brokerage accounts and other heavy transactions accounts will need cryptographically secure transaction authentication in addition to session and host/mutual authentication.
7-easy-steps-to-maximizing-your-fraudulent-stock
Posted by: admin 15 years, 10 months ago
The SEC has noticed a dramatic rise in fraud against online brokerage accounts. This is a very interesting article in that it shows how an attacker can take over accounts and make money without necessarily removing money from those accounts. All they need is a couple of "legitimate" account that the fraudsters open, a thinly traded small-cap stock and to control a couple of pwned accounts with enough money to manipulate the targeted stock. The article describes "pumping" as using pwned accounts to drive up the price of stocks that you hold. However, you can also make money on the way down:
how-to-get-microsoft-esque-security-with-open
Posted by: admin 15 years, 10 months ago
I was duly impressed with the recent ComputerWorld article about how Microsoft fends off 100,000 attacks per month. That is a lot of attacks! The article doesn't mention what Microsoft has spent on security, but my guess is: More than your company's revenues. So what is a poor company to do? Like wine, it is easy find a good bottle of $30 wine, the challenge is finding a good bottle of $8 wine (and were talking magnum). Luckily, thanks to open source software and the many tools built into Linux, even the stingiest of companies can have good security.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)