RSA Security on March 1 announced a new risk-based authentication product and said that ETrade Financial would use the program to secure log-ins for all its online brokerage customers. RSA Adaptive Authentication is a multi-tiered authentication scheme that combines RSAs SecurID tokens and tokenless “risk-based” authentication from Cyota. The new service will allow banks and […]
A security hole in a common technology used to manage prepaid store cards could let malicious hackers and other criminal groups bilk FedEx Kinkos stores, according to a recently published report. ExpressPay is a system developed by EnTrac Technologies, of Toronto. The system uses smart cards from Infineon, but does not secure data on the […]
Symantec unveiled on Feb. 28 a free service to warn home computer users about risks spreading over e-mail, the Web, file sharing and instant messaging networks. The Symantec Internet Threat Meter uses data from the companys Global Intelligence Network to rate Internet threats from low to high risk. The new meter rates the risk of […]
Have you ever hit “Send” on a text message on your mobile phone before addressing it? Ever wondered where all those lost SMS text messages go? If so, you might want to speak with Stan Bubrouski, whose cell phone has been channeling wayward text messages from across the country for years. Bubrouski, a computer science […]
Trend Micro is gearing up for a major product expansion this year that will introduce hardware, software and services that will move the company well beyond its roots as an anti-virus provider and, executives say, bring the company into the exploding market for on-demand services. The company will introduce a new InterScan Web Security appliance […]
Software code that can exploit a hole in Apples Safari Web browser was added to a popular hacking tool on Feb. 22, raising the risks of attack for Apple Mac users. So-called “shell code” that takes advantage of a security flaw in Safaris “safe file” feature was added to the Metasploit framework on Feb. 22 […]
A consumer advocate and advertising software expert claims that a recent update to advertising software from 180Solutions fails to prevent the unauthorized installations it was designed to stop. Spyware expert Ben Edelman said on Feb. 20 that unscrupulous partners were using security exploits to install 180s Zango software, despite the companys new S3 installer, which […]
A serious new vulnerability in Apple Computer Inc.s Safari Web browser and new worms that target Apples OS X operating system have raised awareness of the growing number of threats to computers that do not run the Windows operating system. Security and anti-virus companies issued advisories Feb. 21 about a dangerous new hole in the […]
When Bill Gates stood before an audience of IT security experts at the RSA Conference Feb. 14 and declared that “passwords dont cut it,” many in the audience took it as evidence of another sea change in the technology market and a sign that strong authentication has finally arrived. Major announcements from Microsoft, VeriSign, RSA […]
Secure tokens and strong authentication were all the rage here at last weeks RSA Conference, but many experts said they believe nascent anti-fraud services will be equally important in securing online transactions in the months and years to come. Major technology vendors, including RSA Security, Microsoft, VeriSign and IBM, are investing in technology that can […]