Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
New soft tokens from Diversinet can be used on “mobile devices supporting Java, Symbian, Windows Mobile, Palm and RIM operating systems, on SanDisk TrustedFlash(TM) memory cards, and on personal ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID(R) Software Token for iPhone Devices that enables an iPhone to be ...
“Entrust's security framework not only bridges physical, logical and mobile access management via a single platform, but also provides necessary migration capabilities to co-exist with current systems ...
A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...
Le Brun asks: "Technology has moved on, so isn’t it about time to kill off the hardware token?" The cost of 2FA First, let’s cover the basics. Two-factor authentication (2FA) is where a user’s ...
GoldKey Security Corporation has launched GoldKey Soft-Tokens for iOS and Android devices. With the token a mobile device becomes a software authenticator that, with a PIN, can achieve two-factor ...
Blue Cross of Northeastern Pennsylvania is licensing a service that will securely send members' health and healthcare finance information to electronic devices, including PDAs and cell phones. The ...