Viewing posts from January, 2009
focusing-on-things-you-can-control
Posted by: admin 15 years, 7 months ago
The blogosphere is alive with talk about the FFEIC's guidance requiring stronger authentication for online banking. Inevitablty, someone says how useless better authentication is when PCs are so insecure.from-the-what-goes-around-comes-around-dept
Posted by: admin 15 years, 7 months ago
The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:
Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.
ftp-and-two-factor-tutorial
Posted by: admin 15 years, 7 months ago
We've published another how-to on Howtoforge: How to Secure VSFTP with SSL and Two-factor Authentication
gonzo-bankers-predict-the-end-of-online-banking
Posted by: admin 15 years, 7 months ago
First, what a great site. Clearly, these guys agree with my philosphy that if you're not having fun, the money probably isn't worth it:
We are not the folks who borrow your watch to tell you what time it is - instead, we simply peer over at your wrist when you're not looking.
We never use silly words like "paradigm" and "mission statement" - we prefer more pragmatic terms like "revolutionary mental model" and "envisioned future state."
garage-door-authentication-they-cannot-steal-what
Posted by: admin 15 years, 7 months ago
The Washington Post has an article about garage door openers not working around Quantico due to a denial of service attack by the Marines and consumers wanting to get money from the Marines.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)