• December 18, 2014 18 Dec'14

    inherence factor

    The inherence factor, in a security context, is a category of user authentication credentials consisting of elements that are integral to the individual in question, in the form of biometric data.  Continue Reading

  • December 18, 2014 18 Dec'14

    possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software ...  Continue Reading

  • December 18, 2014 18 Dec'14

    knowledge factor

    The knowledge factor, in a security context, is a category of authentication credentials consisting of information that the user possesses, such as a personal identification number (PIN), a user name, a password or the answer to a secret question.  Continue Reading

  • December 18, 2014 18 Dec'14

    user authentication

    User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require ...  Continue Reading

  • December 18, 2014 18 Dec'14

    Survey: Guest network security lacking at many businesses

    According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.  Continue Reading

  • December 18, 2014 18 Dec'14

    Silverlight security: Defending against browser plug-in attacks

    Silverlight security has been called into question following recent drive-by attacks on the browser plug-in. Expert Michael Cobb explains how to prevent these attacks.  Continue Reading

  • December 18, 2014 18 Dec'14

    Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close