Please turn on your JavaScript for this page to function normally.
Security challenges for the finance sector

As the migration to Windows 7 is proving a catalyst to organizations, banks are stepping up to the challenge to protect themselves against malware attacks abusing admin …

Optical transaction signing device limits ebanking fraud

SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …

Retailers increasingly considering biometric authentication

More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …

Biometric technologies for Android

Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …

Single packet authorization and port knocking

fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …

Exostar updates identity management solution

Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …

Syncplicity launches Security and Compliance Console

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …

Top 5 authentication predictions for 2012

Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …

Yahoo! Mail now with second sign-in verification

More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Pros losing confidence in hard tokens

Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …

Fraudsters beat two-factor authentication, steal $45k

It seems that two-factor authentication solutions that deliver verification codes to mobile phones are not as foolproof as one might think – a lesson that an Australian …

Don't miss

Cybersecurity news