Similar Articles |
|
Wall Street & Technology June 13, 2006 |
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
InternetNews August 3, 2010 |
Tech Firms Split on Paying for Security Flaws Some major IT firms have made it a standard practice to pay security researchers for bringing vulnerabilities to their attention, while others have a strict prohibition against it. What accounts for the divide? |
InternetNews September 21, 2004 Ryan Naraine |
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. |
InternetNews May 20, 2011 Sean Michael Kerner |
Say What? Top Five IT Quotes of the Week LinkedIN's IPO, SUSE sticks with Mono, Android at risk and Dell disses tablets. |
Bank Systems & Technology May 26, 2010 Matt Gunn |
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. |
Technology Research News March 12, 2003 |
Net has few degrees of separation Researchers have found that the average number of connections needed to get from one point to another in real-world networks like the Internet and social networks is smaller than the number needed for randomly-connected networks. The findings could lead to improved networks. |
InternetNews July 22, 2009 Alex Goldman |
A Better iPhone for the Enterprise? RSA says the release of its SecurID Token helps address iPhone security concerns. |
InternetNews December 1, 2008 Richard Adhikari |
PayPal Rings Up Two-Factor Security PayPal customers can now use their cell phones to authenticate their transactions through a new service that lets customers use SMS messaging to get a randomly-generated access code to log into their accounts. |
Wall Street & Technology November 19, 2008 Melanie Rodier |
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. |
Technology Research News September 10, 2003 |
Neural net tracks skin color Researchers working to give computers and robots the ability to recognize gestures are up against several challenges. Researchers from China have come up with a way to use skin color to detect faces and hands. |
Technology Research News June 29, 2005 |
Paint program renders ink physics The physics behind the Moxi brush-and-ink style computer painting program is quite complicated. |
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
InternetNews April 7, 2008 Sean Michael Kerner |
The Annual Pitch For Two-Factor Security VeriSign keeps the faith on pitching two-factor authentication with new features, partners this year. |
InternetNews March 18, 2005 Erin Joyce |
Bruce Schneier, CTO, Counterpane Internet Security An interview covering the weakness of 2-factor authentication on the Internet, managed security services, software insecurity, and advice for lawmakers. |
The Motley Fool December 23, 2010 Carl Bagh |
Google Takes on iTunes: Buy Android Apps and Bill It on AT&T Account AT&T Android customers can buy apps more easily. |
JavaWorld May 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. |
Technology Research News March 26, 2003 |
Flexible motor takes shape Researchers from Pennsylvania State University have designed a motor that can be made in a range of shapes, including nearly flat. Key to the flexibility of the design is lead zirconate titanate, a piezoelectric material that changes shape in the presence of an electric field. |
Technology Research News May 19, 2004 |
Nanotube Sparks Could Cool Chips Researchers from Purdue University and have found a way to use carbon nanotubes to ionize air and generate minuscule air currents that can be used to cool computer chips. |
Technology Research News August 11, 2004 |
Shifty tiles bring walking to VR A moving floor allows the user to stay in place while walking through a virtual environment. One application? Simulating disaster evacuations and similar operations, according to the researchers. |
Technology Research News February 25, 2004 |
Film promises terabit storage Scientists are looking to cram more information in a given area by finding ways to store the 1s and 0s of computer information in single molecules. |
Technology Research News August 13, 2003 |
Video keys off human heat Researchers from the University of Tokyo have developed a method for segmenting out the human parts of a video stream that does not require a particular background. |
Technology Research News June 16, 2004 |
Pressure Adds Depth to Displays Researchers are proposing to add a new dimension to the clickable graphics that appear on computer screens: pressure. |
Technology Research News April 23, 2003 |
Degree of difference sorts data Researchers from the Institute of Applied Physics in Spain have found an efficient way to sort inconsistent sets of data into groups that share some similarity. |
Bank Systems & Technology July 28, 2006 Gregg Keizer |
Phishers Beat Citibank's Two-Factor Authentication Nearly three-dozen phishing Web sites have targeted Citibank business customers with a new scheme that circumvents two-factor authentication. |
Bank Technology News December 2009 Rebecca Sausner |
Out-of-Band Authentication Gets Outfoxed Banks in the United Kingdom are battling fraudsters that have found a way to compromise out-of-band authentication-an approach supported by many fraud experts. |
Technology Research News August 11, 2004 |
Pen writes micro wires Researchers have devised a way to write stripes of gold onto glass to produce microscopic wires. The method could eventually be used to manufacture conductors for tiny electronic devices. |
Technology Research News July 14, 2004 |
Retinal display guides near-blind Researchers develop a wearable computer that helps people with low vision see potential obstacles. The system will become practical in three to five years. |
Wall Street & Technology January 23, 2007 Cory Levine |
VASCO Bolsters Tokens The strong authentication vendor has bolstered its hardware authentication offerings with the release of two new user authentication products for online commerce. |
Wall Street & Technology November 18, 2005 |
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). |
Technology Research News August 10, 2005 |
Chemistry moves micro machines One way to propel microscopic machines is to turn them into tiny chemical rockets. |
Technology Research News July 2, 2003 |
Printing method makes biochips University of Illinois researchers have fabricated tiny, three-dimensional fluidic networks that promise to reduce the size of biochips. |
Technology Research News June 2, 2004 |
Process Nets Cheap Microstructures Researchers from Boston College have demonstrated that it's possible to use relatively inexpensive polymers to construct tiny structures using multiphoton-absorption photopolymerization. |
Wall Street & Technology April 27, 2005 Jim Middlemiss |
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. |
Technology Research News June 30, 2004 |
Mega video enables virtual window Researchers have put together a camera and display system that displays full-motion video at nearly human-visual-system resolution. |