Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
Cyber attackers using Distributed Denial of Service (DDoS) Re-post from Government Security News By: Mark Rockwell The cyber security threat level for banks and financial institutions remains high as organized denial of service attacks cripple U.S. banking Websites....
Access Smart received their ECCN classification determination number today from the US Dept. of Commerce. We are classified as a 5D992b Information Security Software product which allows Access Smart to ship our Power LogOn software and licenses internationally....
They Are Just Drawn That Way Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline:...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
Password manager security technologies are available today, use them. We all have been told by IT that we must have complex passwords, they must have a minimum of eight characters, don’t use the same password for other sites, and then change your password again...