Viewing posts from January, 2009
how-much-will-a-breach-cost-you-find-out-online
Posted by: admin 15 years, 8 months ago
I'm telling you, this internet thing is something. There is now an online calculator - from a company selling cyber-insurance - to help you estimate the cost of a data breach or identity theft data loss scenario . While I am also impressed with java script, I think their data loss archive needs some work.
how-to-secure-vnc-remote-access-with-two-factor
Posted by: admin 15 years, 8 months ago
I've written another how-to for Howtoforge. This article describes how to combine WiKID and NoMachine's NX products to secure VNC. It should be noted that NoMachine offers a lot more functionality and speed than just tunneling VNC through SSH. It is incredibly fast and allows for remote X and RPD in addition to VNC. They have a version that is free for two concurrent connections.
how-to-thwart-laptop-facial-recognition-systems
Posted by: admin 15 years, 8 months ago
hsbc-accuses-competitors-of-competing
Posted by: admin 15 years, 8 months ago
From ZDNet UK:
Speaking at the Gartner IT Security Summit 2006, Brendan Pickering, group head of fraud technology at HSBC, accused rival banks of getting into an "arms race" approach to authentication.What is next? Lowering interest rates to gain market share? Having people in a branch? Advertising? Where will it stop?
hsbc-issues-warning-to-180000-regarding-a-security
Posted by: admin 15 years, 8 months ago
The WSJ Online is reporting that HSBC has issued warnings to 180,000 of it's customers that a security breach may have resulted in their data being compromised.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)