News

Officials at Campus Information Technologies and Educational Services, also known as CITES, have recently revamped their network’s Bluestem system to increase security for users. Bluestem, a service ...
In the current state there are many authentication schemes and most of these suffer from many weaknesses. Some of them are based on the physical and behavioral properties of the user, and some others ...
In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones. If this sounds ...
Human being can remember graphical notations & signs, very easily & for a long time. This paper is to build a mechanism for password so that the users’ password become more secure, remembering ...
Sixty percent of respondents hit by an authentication-related cyberattack in the last 12 months agreed that they could have avoided it with a passwordless system. shw Authentication-related attacks ...
Scientists from the Hong Kong Baptist University (HKBU) have developed a new user authentication system that relies on reading lip motions while the user speaks a password out loud. The technology is ...
A number of factors inspired me to take a closer look at the Yubikey. For starters, it is such a simple and elegant solution to two of the major problems the security industry is facing these days: ...
If you run a publicly accessible Web server for your own use (and let's face it, if you're reading Linux Journal, there's a very good chance you do), how do you go about limiting the risk of someone ...
Arcot Systems Inc. of Sunnyvale, Calif., has developed an authentication application that uses Adobe Systems Inc.'s Flash software. The software, ID Flash, is designed to provide online authentication ...