Home authentication
 

Keywords :   


Tag: authentication

Secure Guns and Gadgets with Authentication System

2013-03-10 21:13:41| Electronics - Topix.net

Putting a small device, the size of a key fob, in your pocket could "authenticate" your entire body for various purposes, such as unlocking your front door, or using a firearm.

Tags: system secure guns gadgets

 

Authentication System Would Use the Body to Secure Guns and Gadgets

2013-03-09 01:19:23| Semiconductors - Topix.net

Leave a gun lying around, and anyone who picks it up could fire it. That could change, though, with newly announced technology from Microchip Technology , which uses the body as part of a secure authentication process.

Tags: system body secure guns

 
 

Evernote Accelerating Two-Factor Authentication Rollout

2013-03-06 06:34:54| PC Magazine Software Product Guide

Following a massive Evernote hack that forced the company to reset the passwords of its 50 million users, the company is pushing ahead with new security measures originally intended to launch later this year.

Tags: authentication accelerating rollout evernote

 

Evernote Accelerating Two-Factor Authentication Rollout

2013-03-06 04:35:54| PC Magazine Security Product Guide

Following a massive Evernote hack that forced the company to reset the passwords of its 50 million users, the company is pushing ahead with new security measures originally intended to launch later this year.

Tags: authentication accelerating rollout evernote

 

Researchers find loophole in Google's two-factor authentication

2013-02-26 16:47:01| InfoWorld: Top News

Researchers from two-factor authentication provider Duo Security found a loophole in Google's authentication system that allowed them to bypass the company's 2-step login verification by abusing the unique passwords used to connect individual applications to Google accounts. According to the Duo Security researchers, Google fixed the flaw on Feb. 21, but the incident highlights the fact that Google's application-specific passwords don't provide granular control over account data.

Tags: find researchers authentication loophole

 

Sites : [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] next »