Viewing posts tagged Information Security
tower-group-pushes-two-factor-authentication-for
Posted by: admin 14 years, 2 months ago
Clearly, we need to do a better job of promoting WiKID.
trusted-computing-for-mobile-devices
Posted by: admin 14 years, 2 months ago
There is a new specification for mobile phone security called the Mobile Security Specification. It is essentially trusted computing for cell phones.
The specification has been years in development, said Janne Uusilehto, head of Nokia product security and the chairman of the working group developing this technology. "It is a big deal. This is the first time that we have created such common security specifications for all handheld devices," Uusilehto said.More:
When these devices appear, they will make things more difficult for data thieves and mobile virus writers. Down the line, the technology could be used to build electronic wallets into mobile phones. In general terms, the specification calls on hardware vendors to store protected information in a secure area of the phones. Similar to the Trusted Platform Module used in PCs, this technology could be used to ensure that the phone's operating system, applications and data have not been tampered with.
All the usual trusted computing warnings apply here, but perhaps more so as cell carriers maintain a 'walled garden' and can limit the devices available. They are also essentially 'tri-opolies'. It seems likely that you will be able to buy a computer without TCP in the future. You might not be able to buy a cell phone without it (that works on a carrier).
two-factor-authentication-needed-to-protect
Posted by: admin 14 years, 2 months ago
I blogged a long time ago about how social engineers got Paris Hilton's address book from T-Mobile. Now we learn that Paris is allegedly got the password to Lindsey Lohan's Blackberry:
This cyber fued between the girls started last month, when Page Six ran an item that indicated the password to Lindsay's Blackberry had been leaked. Her rep told Page Six people were sending "disgusting and very mean messages that everyone thought were coming from Lindsay. They weren't. We now have her lawyers looking into it. Some people think Paris may have been involved because the wording of the messages sounds very familiar."Of course, unlike the Sidekick, getting the password to a Blackberry does you no good unless you also have possession of the device. More than likely, they got hold of here email password.
from-the-what-goes-around-comes-around-dept
Posted by: admin 14 years, 2 months ago
The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:
Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.
google-corporate-blog-hacked-again
Posted by: admin 14 years, 2 months ago
While I'm here, here is a quicky: Google's blog has been hacked again
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)