Viewing posts from January, 2009
voting-hackable-or-error-prone-you-decide
Posted by: admin 14 years, 4 months ago
Hat Tip: MSNBC First Read: The SciFi channel has a page up that displays voting mechanism by state. It's quite jazzy, but I have one problem with the methodology. Mainly that they seem to think that if it's electronic, it's hackable but not error prone. While they do have a page discussing the pros and cons of the voting machines, they don't rank them that way on the map.
we-are-71
Posted by: admin 14 years, 4 months ago
According to eSecurity Planet, the WiKID Strong Authentication System is number 71 of the top 75 Open Source Security Apps. Actually, the ranking seems to be random. We are one of two entries under the "User Authentication" section and the sections are listed alphabetically. So, if our category had been "Authentication", we would have been 12th, just after Anti-spyware. :)
why-you-need-two-factor-authentication-for-ssh
Posted by: admin 14 years, 4 months ago
I've been chewing on doing a post about the need for two-factor authentication SSH for a while, long enough that someone else has done the work for me, which is just the way I like it.
web-application-insecurity-statistics
Posted by: admin 14 years, 4 months ago
Security geeks who like to chew on numbers will enjoy the WebAppSec Statistics. Lots of pretty pictures too.
what-is-the-opposite-of-a-moral-hazzard
Posted by: admin 14 years, 4 months ago
According to a recent study by researchers from my alma mater, the University of Virginia, the use of cameras to fine motorists who run red lights actually increases the number of accidents at those intersections. There are fewer T-bone collisions, but more rear-end collisions.Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)