Viewing posts from January, 2009
is-visible-security-needed-for-consumer
Posted by: admin 14 years, 10 months ago
Consumer concerns about about information theft, data breaches and web-based attacks have caused a drop in online commerce activity.
From the article:
"If you look at the regulators like the banking regulators and the credit card associations, they are two years behind the curve," she said. "They finally responded with PCI and FFIEC, and it is definitely improving the security situation, but if they had done this two years ago it would have been in time to prevent this loss."
kaspersky-labs-update-on-bank-attacks
Posted by: admin 14 years, 10 months ago
Hat tip: Securology.
kim-cameron-on-fingerprint-readers
Posted by: admin 14 years, 10 months ago
Read the post: Fingerprint charade.
lexis-nexis-breach
Posted by: admin 14 years, 10 months ago
As Adam had pointed out the Lexis Nexis breach was due to " misappropriation by third parties of IDs and passwords from legitimate customers".majority-of-lexisnexis-breaches-the-result-of
Posted by: admin 14 years, 10 months ago
As pointed out by Adam at Emergent Chaos:
The company said that the 59 identified incidents -- 57 at Seisint and two in other LexisNexis units -- largely related to the misappropriation by third parties of IDs and passwords of legitimate customers and stressed that neither LexisNexis nor the Seisint technology infrastructure was breached by hackers.
So, essentially, if LexisNexis had been using strong authentication for their customers, none of this would have happened.
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)