-
Peterson says that Agari hopes to offers its authentication data to other spam filtering services run by McAfee and Symantec.
FORBES: Cisco-Spawned Startup Agari Aims To Finally Kill Phishing
-
It is within these that gaps of trust among different systems that could allow bad actors access to sensitive data without proper authentication.
FORBES: The Dangers In Following The Crowd
-
Handset manufacturers are also doing their bit by enabling NFC chip-based phones for NFC-enabled transactions that provide security of personal data with proper authentication.
FORBES: How much should you trust your mobile phone?
-
Almost three months after a hacking incident that compromised sensitive data used in its authentication tokens, security firm RSA has resorted to a last-ditch fix: a product recall.
FORBES: RSA Offers To Replace Some Customers' Compromised SecurID Tokens
-
AuthenTec anti-spoofing technology then compares the data with expected properties to ensure fingerprint authentication.
FORBES: Securing The Future of Apple's iPhones and iPads
-
Unlike neatly defined science problems, which amaze more by their petabyte scale than their inherent complexity, virtual organisations are noteworthy because of their constantly shifting landscape of data and computer resources, and the authentication on which they rely.
ECONOMIST: REPORT: COMPUTER NETWORKS: Computing power on tap | The
-
In order to maintain a good, consistent consumer experience, both telcos and banks should stick to their current methods of registration, authentication (SIM based) and other data checks deemed necessary for checks while registering a user for financial transactions.
FORBES: How much should you trust your mobile phone?
-
The data-hiding technique neatly fits within the image, and all the authentication tasks are localised, notes Guarav Sharma of Xerox.
ECONOMIST: MONITOR
-
The United States army has expressed an interest in the data-hiding algorithms for combining extremely high-resolution reconnaissance photographs with authentication security.
ECONOMIST: MONITOR
-
The router, called ASR-1000, allows Internet service providers (ISPs), large companies and universities to move data and integrate services that enable security, voice over Internet, deep packet inspection and the authentication of broadband flow to specific subscribers, all in a single piece of hardware.
FORBES: Cisco Seeks An Edge