When a cryptocurrency project launches, one of the most important decisions is determining how many tokens should exist. Will there be a fixed maximum supply, ...
A core rap against two-factor authentication based on hardware tokens is the cost of deployment and management, which puts it out of range of any company looking to use the technology to secure ...
New soft tokens from Diversinet can be used on “mobile devices supporting Java, Symbian, Windows Mobile, Palm and RIM operating systems, on SanDisk TrustedFlash(TM) memory cards, and on personal ...
The attack bypasses protections built in RSA's 2-factor authentication system. Weird, I'd never would have made a windows app for the rsa thingy; that's just asking for it to be compromised. If you ...
AT&T* has announced the addition of soft token authentication support to AT&T Token Authentication Service, which helps mobile workers more easily protect commercial and government resources using ...
“Entrust's security framework not only bridges physical, logical and mobile access management via a single platform, but also provides necessary migration capabilities to co-exist with current systems ...
My recent post on software tokens generated interesting feedback. I wanted to elaborate a bit more on how soft tokens can be, in fact, as strong as hardware tokens -- perhaps even better in terms of ...
New York City-based art rockers Imaginary People have spent the year building up to the release of their third full-length album, Alibi. Envisioned as a response to the tensions brought on by the US’s ...
Building on its investment in the Middle East, Entrust Inc. released Arabic-language soft tokens for its IdentityGuard software authentication platform and security framework. Entrust intends for the ...
RSA has released an iPhone app that can be used to provide SecurID access via a software token on the iPhone and iPod Touch replacing the traditional SecurID key fob token. David Martin David Martin ...