A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...
The app works with a SecurID token seed and RSA's Authentication Manager; together they can provide a one-time password that changes every minute. This password is used to securely access a VPN, WLAN, ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID(R) Software Token for iPhone Devices that enables an iPhone to be ...
My recent post on software tokens generated interesting feedback. I wanted to elaborate a bit more on how soft tokens can be, in fact, as strong as hardware tokens -- perhaps even better in terms of ...
Security tokens used to safeguard computer networks risk going the way of the rotary phone as EMC's RSA unit, the top maker of the devices, is challenged by smartphones deployed as cyber-protection ...
Singapore's state-owned security vendor, Assurity Trusted Solutions, is hoping its introduction of a mobile software token will resolve common user grievances associated with hardware tokens and ...
I’m writing about Aspen Technology today not because you are likely to ever need its software (unless you own an oil refinery) but because the way the company allows its customers to purchase its ...
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Dr. Snyder is a popular speaker and ...
The attack bypasses protections built in RSA's 2-factor authentication system. Weird, I'd never would have made a windows app for the rsa thingy; that's just asking for it to be compromised. If you ...