Similar Articles |
|
National Defense December 2010 Eric Beidel |
Cybersecurity Threatened By Common Password Buster GTRI researchers have proven that an inexpensive graphics processing unit (GPU) can bust passwords at the speed of a $100 million supercomputer. |
PC Magazine April 19, 2006 Robert Lemos |
Password Policies A simple password could be the weak link that leaves your data open to attack. |
Bank Technology News January 2002 Maria Bruno |
Citi's Biometrics Tease Yet another banking giant's quest for the ultimate in security... |
PC Magazine September 15, 2003 Sebastian Rupley |
What's My Name? Do you keep a list of your user names and passwords in your wallet or PDA? If so, you're not the only one who can't remember them all. |
PC Magazine August 31, 2010 Eric Griffith |
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. |
Wall Street & Technology January 5, 2006 |
Behavioral Security With the recent SEC and FFIEC recommendations casting a spotlight on online account security, behavioral biometrics has emerged as an increasingly popular technique for financial services institutions to meet federal regulators' call for multifactor authentication for online account security. |
PC Magazine April 6, 2004 Peter Suciu |
Press to Pass The APC Biometric Password Manager doesn't just put your online passwords at your fingertips, it uses your fingerprints to remember passwords for you. |
Wall Street & Technology April 18, 2008 Melanie Rodier |
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. |
Wall Street & Technology June 13, 2006 |
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. |
AskMen.com Aaron Broverman |
How To: Use Keyboard Shortcuts There's a secret language on your computer that is built on two words: keyboard shortcuts. Not only do keyboard shortcuts save on time, but they're also your lifeline in keeping your computer running when your mouse goes down. |
Bank Technology News May 2005 John Adams |
Security: Voca Tackles The Threat Within UK-based electronic payments engine Voca deploys a password management platform that automates control over access, in an attempt to stave off security breaches from inside the enterprise. |
InternetNews December 17, 2004 Brian Livingston |
Protect Your Passwords The plunging cost of memory gives rise to a possible solution to the password-recall problem. |
InternetNews December 23, 2004 Brian Livingston |
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. |
InternetNews October 24, 2006 Andy Patrizio |
DigitalPersona Reads Your Finger DigitalPersona has introduced version 4.0 of its enterprise-scale biometric reader, featuring improved accuracy and single sign-on support. |
The Motley Fool July 6, 2010 Anders Bylund |
Apple Gets Hacked Apple wipes egg off its face and makes one Fool think about safer online security standards. |
Bank Technology News March 2006 John Adams |
Biometrics: The Keyboard Has a Good Memory San Antonio city employees Credit Union has deployed a password management product that remembers user keystroke patterns for less user invasive authentication |
PC Magazine January 20, 2004 Brett Glass |
Biometric Security Someday biometric systems may play an important role in securing all kinds of systems, but they're not foolproof yet. |
PC World September 2004 Andrew Brandt |
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. |
PC Magazine November 2, 2004 Neil J. Rubenking |
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. |
PC Magazine June 21, 2006 |
Outsmarting Keyloggers How to protect passwords and personal information in public cybercafes. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
Bank Systems & Technology February 27, 2006 Maria Bruno-Britz |
Back to the Future Banks are beginning to realize that biometrics offer a viable solution in today's security- and compliance-conscious environment, according to a new report. |
PC Magazine December 30, 2010 Neil J. Rubenking |
Kaspersky Password Manager 4 Kaspersky Password Manager automatically secures and retrieves your Web site and application passwords and fills Web forms with personal data. It can even generate a USB-based portable edition for travel. |
Fast Company John Paul Titlow |
Google Is Gearing Up To Kill Your Email Password The company is testing a new, multi-device method for letting people log into their accounts without using a password, according to TechCrunch. |
American Family Physician April 15, 2001 |
Preventing Dog Bites Most dogs will never bite anyone. However, any dog may bite if it feels threatened. Children are the most common victims of dog bites. Infants and young children should never be left alone with a dog... |
Entrepreneur March 2005 Amanda C. Kooser |
Touch and Go Fingerprint readers mean better security--and no more tricky passwords. |
T.H.E. Journal June 2006 Doug Gale |
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. |
PC Magazine November 30, 2005 Neil J. Rubenking |
Where Does IE Store Passwords? The saved user ID/password pairs in Internet Explorer are stored in the Registry under a key whose default permission settings make it inaccessible to all users, even the user to whom the passwords belong. |
Inc. November 1, 2009 Michael Fitzgerald |
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords |
Entrepreneur November 2006 Amanda C. Kooser |
Identify Yourself How will increasingly sophisticated biometric technologies affect you? |
CIO November 1, 2005 Robert McMillan |
Clicking, Clacking and Snooping Researchers at the University of California, Berkeley have found a way to turn the clicks and clacks of typing on a computer keyboard into a startlingly accurate transcript of what is being typed -- and showed that note even 'random' passwords are secure. |
Bank Technology News August 2009 Rebecca Sausner |
Time to Raise the White Flag on PII Tower Group's George Tubin declared banks have "lost the battle" over protecting personally identifiable information (PII), and should assume "clients and prospects no longer have any uncompromised private information." |
Fast Company Neal Ungerleider |
How To Sell Your Company To Google In A Year Israeli startup Slicklogin thinks passwords are insecure, messy, and time-consuming. The answer to password woes: soundwaves. The company has only been around for a year or so; they have just been acquired by Google. |
Information Today September 19, 2013 |
Precise Biometrics Builds Ecosystem for Mobile Device Security Precise Biometrics recently integrated its Tactivo products with a global ecosystem of technology partners that create authentication applications. |
AskMen.com Nick Clarke |
How To: Defend Yourself Against A Dog A dog may be man's best friend, but even the most docile one can turn in the blink of an eye. |
PC World October 2003 Scott Spanbauer |
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. |
PC World March 2004 Andrew Brandt |
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. |
American Family Physician June 1, 2004 |
Dog Bites: Teaching Your Child to Be Safe Most dogs never bite anyone. But any dog might bite if it feels threatened. Children are the most common victims of dog bites. Infants and young children should never be left alone with any dog. |
Wall Street & Technology April 27, 2005 Jim Middlemiss |
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. |
PC Magazine February 8, 2008 Loyd Case |
Keyboard Bugs Cleaning your laptop keyboard. |