Viewing posts from January, 2009
trolltechs-greenphone
Posted by: admin 14 years ago
Trolltech announced their Greenphone today. It is a development worth watching for those of us in the wireless application development space.
tsa-worker-sentenced-for-falsifying-reports
Posted by: admin 14 years ago
According to the Atlanta Business Chronicle, Robert Wilson, 51, of Ellenwood, Ga. will be doing four months in federal prison for falsifying records.
From about November 2004 to January 2005, Wilson filed at least eight inspection reports with TSA that contained false information. For example, Wilson falsely claimed that he inspected gates that were in fact closed and inaccessible due to construction. Wilson also falsely reported that he had made an inspection of an airline to ensure its compliance with security regulations. Wilson also falsely reported that he performed some inspections with TSA employees who, according to time and attendance records, were not on duty at the time.
two-factor-for-foodies
Posted by: admin 14 years ago
Consider how much stronger this form of two-factor authentication for access to a "private club is over single-factor authentication:
incentive-plan-for-an-information-security-team
Posted by: admin 14 years ago
It has occurred to me that you could develop an interesting incentive program for an information security team, assuming that you believe a couple of data points (or can come up with your own) and your primary concern is a data breach. In my opinion, security people are all too often incented only to maintain security - not to optimize the investment in security. Interests need to be aligned.
voting-round-up
Posted by: admin 14 years ago
- Remember to vote today, or there is no way your vote can be mis-counted
- It's expensive and screwed up notes Adam
- Unattended voting machines turning up, just waiting for manipulation
- If you're a Govenor or a member of Congress chances are that you won't be able to vote.
- I bet that pansy Ed Felton never thought of just busting the crap out of Diebold machine with a metal cat paperweight. NB: I am assuming that the guy didn't own the pansy-esque paperweight, but just borrowed it from his roomate/grandmother.
- If you're frustrated with both parties, just vote for Somebody Else, at least it will test the write-in functionality of your voting machine.
- No matter how many issues there are with voting macines, nothing will happen because the macine makers have come up with the ultimate distraction and surely the top news story: Brittany Spears files for divorce.. It's Diebold-olical!
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)