Items Tagged with "Authentication"


Credit Card Connoisseur

July 08, 2010 Added by:Ron Baklarz

This authentication mechanism could be compromised and moreover, I would very much like to see the security scheme around the kiosk's ability to protect the PII associated with the driver's license as well as the PCI-DSS protections since the machines will accept credit and debit cards...

Comments  (1)


Personal Knowledge or “Qualifying Questions” as Authenticators

May 03, 2010 Added by:Robert Siciliano

How many times have you forgotten a password? Fortunately the website you were on only needed your username or an email address and they would respond with a few questions for you to answer. Once you responded with what was in the system you then re-set your password and you’re in.  Easy peazy.

Comments  (2)


Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…

May 02, 2010 Added by:K S Abhiraj

This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...

Comments  (0)


Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)


Enhanced Authentication Now Available on Infosec Island

February 17, 2010 Added by:Infosec Island Admin

Infosec Island™, the new community for IT and information security professionals, today announced that its new enhanced authentication service based on the SyferLock™ GridGuard™ solution, is now live.

Comments  (5)


Road Map for an Application/Software Security Architect (Part 5)

December 30, 2009 Added by:Stephen Primost

Without a Digital Identity, how would you expect to do any authentication? And with an incomplete Digital Identity, how would you expect to get the authorization done correctly? Without the proper data model and the expectation that it would have the correct data (besides being in the right place at the right time), securing a system is impossible, although having the information, it is the easies...

Comments  (0)

From the Web

DNSSEC + Certs As a Replacement For SSL’s Transport Security

October 15, 2009 from: Rsnake's blog at

RSnake discusses the feasability of using DNSSEC to provide transport-layer security in a more reliable fashion than the current SSL Certificate Authority site authentication model.

Comments  (0)

From the Web

All about Website Password Policies

October 07, 2009 from: Jeremiah Grossman's Blog

Passwords are the most common way for people to prove to a website that they are who they say they are, as they should be the only ones who know what it is. That is of course unless they share it with someone else, somebody steals it, or even possibly guesses it. This identity verification process is more commonly know as “authentication.”

Comments  (0)

From the Web

Hacking Two-Factor Authentication

September 22, 2009 from:

The failure of two-factor authentication and two new attacks: Man-in-the-middle and Trojan attacks both can circumvent two-factor authentication.

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »