Looking for a Logical Access Partner to handle all the IT concerns? We had a great presence at the ISC West 2013 conference in Las Vegas. One recurring theme we heard from ID resellers was their desire to offer their existing customers a value add, card based,...
An SEO Cyber Mule or SEO Hack is when unauthorized links are embedded into your website without your knowledge for the sole purpose of increasing Google rankings. For Google to increase a site rankings they look for the number of one-way backlinks. That’s why...
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
Cyber attackers using Distributed Denial of Service (DDoS) Re-post from Government Security News By: Mark Rockwell The cyber security threat level for banks and financial institutions remains high as organized denial of service attacks cripple U.S. banking Websites....