Viewing posts tagged Information Security
tower-group-pushes-two-factor-authentication-for
Posted by: admin 16 years ago
Clearly, we need to do a better job of promoting WiKID.
ftp-and-two-factor-tutorial
Posted by: admin 16 years ago
We've published another how-to on Howtoforge: How to Secure VSFTP with SSL and Two-factor Authentication
two-factor-authentication-needed-to-protect
Posted by: admin 16 years ago
I blogged a long time ago about how social engineers got Paris Hilton's address book from T-Mobile. Now we learn that Paris is allegedly got the password to Lindsey Lohan's Blackberry:
This cyber fued between the girls started last month, when Page Six ran an item that indicated the password to Lindsay's Blackberry had been leaked. Her rep told Page Six people were sending "disgusting and very mean messages that everyone thought were coming from Lindsay. They weren't. We now have her lawyers looking into it. Some people think Paris may have been involved because the wording of the messages sounds very familiar."Of course, unlike the Sidekick, getting the password to a Blackberry does you no good unless you also have possession of the device. More than likely, they got hold of here email password.
from-the-what-goes-around-comes-around-dept
Posted by: admin 16 years ago
The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:
Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.
google-corporate-blog-hacked-again
Posted by: admin 16 years ago
While I'm here, here is a quicky: Google's blog has been hacked again
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)