Please turn on your JavaScript for this page to function normally.
Retailers increasingly considering biometric authentication

More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …

Biometric technologies for Android

Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …

Single packet authorization and port knocking

fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …

Exostar updates identity management solution

Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …

Syncplicity launches Security and Compliance Console

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …

Top 5 authentication predictions for 2012

Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …

Yahoo! Mail now with second sign-in verification

More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

Fraudsters beat two-factor authentication, steal $45k

It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …

Centralized management of Mac users

Centrify announced a new release of Centrify DirectControl for Mac OS X, a solution for Active Directory-based authentication, single sign-on, smartcard and group policy …

Personal electronic signatures for everyone

DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …

Don't miss

Cybersecurity news