News
A researcher has devised a method that attackers with control over a victim's computer can use to clone the secret software token that RSA's SecurID uses to generate one-time passwords. The technique, ...
RSA, The Security Division of EMC announced the availability of the RSA SecurID Software Token for iPhone Devices that enables an iPhone to be used as an RSA SecurID authenticator, providing ...
RSA has released an iPhone app that can be used to provide SecurID access via a software token on the iPhone and iPod Touch replacing the traditional SecurID key fob token. David Martin David Martin ...
New soft tokens from Diversinet can be used on “mobile devices supporting Java, Symbian, Windows Mobile, Palm and RIM operating systems, on SanDisk TrustedFlash(TM) memory cards, and on personal ...
In a digital age where more people are succumbing to the smart phone phenomenon and the desktop computer has become a thing of the past, the online world is literally at our fingertips. Technology has ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. We heard rumours of this app being in development as far back as early last year but it is now ...
“Entrust's security framework not only bridges physical, logical and mobile access management via a single platform, but also provides necessary migration capabilities to co-exist with current systems ...
Singapore's state-owned security vendor, Assurity Trusted Solutions, is hoping its introduction of a mobile software token will resolve common user grievances associated with hardware tokens and ...
I’m writing about Aspen Technology today not because you are likely to ever need its software (unless you own an oil refinery) but because the way the company allows its customers to purchase its ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results