RSA, the security division of EMC, on Monday confirmed that data obtained via a March hack was used to attack the systems of defense contractor Lockheed Martin. To assuage fears about the breach, RSA ...
eSpeaks host Corey Noles sits down with Qualcomm's Craig Tellalian to explore a workplace computing transformation: the rise of AI-ready PCs. Matt Hillary, VP of Security and CISO at Drata, details ...
In an acknowledgement of the severity of its recent computer compromise, RSA Security said Monday that it will replace SecurID tokens for any customer that asks. Customers have been left wondering ...
If you want to use single sign-on with Microsoft’s clouds, the go-to method is a Microsoft product called Microsoft Windows Active Directory Federation Services 2.0 (ADFS). RSA on Monday announced ...
A team of cryptographic scientists have found a way to exploit the RSA SecurID 800 token, as well as at least seven other tokens, by leveraging cryptographic flaws in the devices. The researchers, who ...
The same type of attack used recently to get around security measures at Lockheed Martin, and possibly other defense contractors as well, could also be used to hack international banking services, ...
"Although the security of customers' online banking has not been compromised, Westpac will replace tokens over the coming months to ease any customer concerns," said Harry Wendt, general manager of ...
The intrusion by hackers of security giant RSA, a unit of EMC, has left customers and analysts wondering if it is still safe to use millions of the one-time passcode tokens used to log into enterprise ...
RSA executive chairman Art Coviello said on Tuesday, that there were two groups of hackers working for a nation-state, who were behind a cyberattack on RSA that stole information on its SecurID tokens ...
RSA has released an iPhone app that can be used to provide SecurID access via a software token on the iPhone and iPod Touch replacing the traditional SecurID key fob token. David Martin David Martin ...
The inventor of the two-factor authentication SecurID token says the latest technology he’s come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for ...
A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results