Viewing posts tagged Phishing and Fraud
focusing-on-things-you-can-control
Posted by: admin 14 years ago
The blogosphere is alive with talk about the FFEIC's guidance requiring stronger authentication for online banking. Inevitablty, someone says how useless better authentication is when PCs are so insecure.etrade-to-deploy-rsa-tokens-but-does-it-stop
Posted by: admin 14 years ago
ETrade announced that they would be offering RSA SecurID key fob tokens to account holders with more than $50,000 in assets.google-looks-to-protect-its-business-with
Posted by: admin 14 years ago
I think Google's purchase of GreenBorder is very intersting. It shows that they see the threat that malware has to the online commerce and that they intend to do something about it. What's not clear is whether this acquisition was done with the goal of protecting payment processing (Google CheckOut) or whether it is meant to shore up security around their office application suite and their new offline access system Google Gears. Perhaps, Google is smart enough to know that both need additional security and is organized in such a way to make it happen.
another-plug-for-strong-authentication
Posted by: admin 14 years ago
A great analogy: strong authentication is like Penicillin for your network securityestonian-phisher-nabbed
Posted by: admin 14 years ago
"Pau said the suspect stole the money by infecting thousands of computers with a clever - and for a long time undetectable - trojan that transmitted their personal information, including internet banking account numbers and passwords, to him."Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)