MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
December 2010
Eric Beidel
Cybersecurity Threatened By Common Password Buster GTRI researchers have proven that an inexpensive graphics processing unit (GPU) can bust passwords at the speed of a $100 million supercomputer. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
Bank Technology News
January 2002
Maria Bruno
Citi's Biometrics Tease Yet another banking giant's quest for the ultimate in security... mark for My Articles similar articles
PC Magazine
September 15, 2003
Sebastian Rupley
What's My Name? Do you keep a list of your user names and passwords in your wallet or PDA? If so, you're not the only one who can't remember them all. mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
Wall Street & Technology
January 5, 2006
Behavioral Security With the recent SEC and FFIEC recommendations casting a spotlight on online account security, behavioral biometrics has emerged as an increasingly popular technique for financial services institutions to meet federal regulators' call for multifactor authentication for online account security. mark for My Articles similar articles
PC Magazine
April 6, 2004
Peter Suciu
Press to Pass The APC Biometric Password Manager doesn't just put your online passwords at your fingertips, it uses your fingerprints to remember passwords for you. mark for My Articles similar articles
Wall Street & Technology
April 18, 2008
Melanie Rodier
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
AskMen.com
Aaron Broverman
How To: Use Keyboard Shortcuts There's a secret language on your computer that is built on two words: keyboard shortcuts. Not only do keyboard shortcuts save on time, but they're also your lifeline in keeping your computer running when your mouse goes down. mark for My Articles similar articles
Bank Technology News
May 2005
John Adams
Security: Voca Tackles The Threat Within UK-based electronic payments engine Voca deploys a password management platform that automates control over access, in an attempt to stave off security breaches from inside the enterprise. mark for My Articles similar articles
InternetNews
December 17, 2004
Brian Livingston
Protect Your Passwords The plunging cost of memory gives rise to a possible solution to the password-recall problem. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
InternetNews
October 24, 2006
Andy Patrizio
DigitalPersona Reads Your Finger DigitalPersona has introduced version 4.0 of its enterprise-scale biometric reader, featuring improved accuracy and single sign-on support. mark for My Articles similar articles
The Motley Fool
July 6, 2010
Anders Bylund
Apple Gets Hacked Apple wipes egg off its face and makes one Fool think about safer online security standards. mark for My Articles similar articles
Bank Technology News
March 2006
John Adams
Biometrics: The Keyboard Has a Good Memory San Antonio city employees Credit Union has deployed a password management product that remembers user keystroke patterns for less user invasive authentication mark for My Articles similar articles
PC Magazine
January 20, 2004
Brett Glass
Biometric Security Someday biometric systems may play an important role in securing all kinds of systems, but they're not foolproof yet. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
PC Magazine
November 2, 2004
Neil J. Rubenking
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. mark for My Articles similar articles
PC Magazine
June 21, 2006
Outsmarting Keyloggers How to protect passwords and personal information in public cybercafes. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
Bank Systems & Technology
February 27, 2006
Maria Bruno-Britz
Back to the Future Banks are beginning to realize that biometrics offer a viable solution in today's security- and compliance-conscious environment, according to a new report. mark for My Articles similar articles
PC Magazine
December 30, 2010
Neil J. Rubenking
Kaspersky Password Manager 4 Kaspersky Password Manager automatically secures and retrieves your Web site and application passwords and fills Web forms with personal data. It can even generate a USB-based portable edition for travel. mark for My Articles similar articles
Fast Company
John Paul Titlow
Google Is Gearing Up To Kill Your Email Password The company is testing a new, multi-device method for letting people log into their accounts without using a password, according to TechCrunch. mark for My Articles similar articles
American Family Physician
April 15, 2001
Preventing Dog Bites Most dogs will never bite anyone. However, any dog may bite if it feels threatened. Children are the most common victims of dog bites. Infants and young children should never be left alone with a dog... mark for My Articles similar articles
Entrepreneur
March 2005
Amanda C. Kooser
Touch and Go Fingerprint readers mean better security--and no more tricky passwords. mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
PC Magazine
November 30, 2005
Neil J. Rubenking
Where Does IE Store Passwords? The saved user ID/password pairs in Internet Explorer are stored in the Registry under a key whose default permission settings make it inaccessible to all users, even the user to whom the passwords belong. mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
Entrepreneur
November 2006
Amanda C. Kooser
Identify Yourself How will increasingly sophisticated biometric technologies affect you? mark for My Articles similar articles
CIO
November 1, 2005
Robert McMillan
Clicking, Clacking and Snooping Researchers at the University of California, Berkeley have found a way to turn the clicks and clacks of typing on a computer keyboard into a startlingly accurate transcript of what is being typed -- and showed that note even 'random' passwords are secure. mark for My Articles similar articles
Bank Technology News
August 2009
Rebecca Sausner
Time to Raise the White Flag on PII Tower Group's George Tubin declared banks have "lost the battle" over protecting personally identifiable information (PII), and should assume "clients and prospects no longer have any uncompromised private information." mark for My Articles similar articles
Fast Company
Neal Ungerleider
How To Sell Your Company To Google In A Year Israeli startup Slicklogin thinks passwords are insecure, messy, and time-consuming. The answer to password woes: soundwaves. The company has only been around for a year or so; they have just been acquired by Google. mark for My Articles similar articles
Information Today
September 19, 2013
Precise Biometrics Builds Ecosystem for Mobile Device Security Precise Biometrics recently integrated its Tactivo products with a global ecosystem of technology partners that create authentication applications. mark for My Articles similar articles
AskMen.com
Nick Clarke
How To: Defend Yourself Against A Dog A dog may be man's best friend, but even the most docile one can turn in the blink of an eye. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
American Family Physician
June 1, 2004
Dog Bites: Teaching Your Child to Be Safe Most dogs never bite anyone. But any dog might bite if it feels threatened. Children are the most common victims of dog bites. Infants and young children should never be left alone with any dog. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
PC Magazine
February 8, 2008
Loyd Case
Keyboard Bugs Cleaning your laptop keyboard. mark for My Articles similar articles