When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
Cyber security is something that people are having to think a lot more about these days than they ever have in the past. For one thing, this kind of danger did not even exist some time ago. Now, it is something that we have to deal with constantly. Anyone from a...
Security breach exposes roughly 100,000 IEEE members’ User IDs and Passwords On Sept. 24 2012 the Institute of Electrical and Electronics Engineers (IEEE) confirmed that nearly 100,000 of its members User Names and Passwords were publicly exposed from a...