A Bluetooth token thwarts man-in-the-middle attacks
Numerous third-party MFA tokens available
Smartphone token authentication
Key fobs generate one-time authentication passwords
A grid token provides an extra layer of authentication security
Thin credit card token convenient for authentication
Keypad authentication an example of a hardware token
An SMS token eases the authentication processes
The OAuth token is a new standard in authentication
Software tokens spurred multifactor authentication innovation
Voice recognition: Can you hear me now?
Iris authentication: What is your eye-dentity?
Smart TV, smart boxes, smart remote -- smart mouse?
Two-factor authentication devices: One key to rule them all
BYOB: Bring your own biometric key fob, that is
Password problems plaguing you? FIDO Alliance hopes to have the answers
Too old for fingerprint authentication? Think again
Secure element, secure NFC, secure mobility
Secure automatic login; just swipe your finger
FIDO authentication for Windows, Linux and Android
Beyond passwords and PINs: Fingerprint sensors for the mobile age
Can a fingerprint sensor make a smartphone smarter?
Don't overlook that Web application infrastructure
Web application session management issues, and how to avoid a hijacking
How to resolve SQL injection vulnerabilities? Trust no one!
Got insecure direct object references? Be random, unpredictable
How five common Web application vulnerabilities surface, get exploited
XSS vulnerabilities? Time for a visit to the security control library
Introduction: Mobile security survey 2012 audio slideshow
Mobile device security policy
Top mobile security concerns
Survey demographics and methodology
Mobile security project priorities
Mobile app security
Mobile device security risks
BYOD survey data analysis