Authentication

Archive

Fake phishing scheme shows the value of corporate data to hackers

A recent faux phishing scheme designed to track the activity of hackers accessing the “leaked” data confirms what we already know — hackers gravitate towards corporate data, and not by the dozens, but by the...

GreenRADIUS Now Supports LDAP Authentication

Another key feature has been added to GreenRADIUS and is now available — authentication through the LDAP protocol. The GreenRADIUS premium LDAP Module enables 2FA use with systems/products that require LDAP authentication but do not...

Lost Device? GreenRADIUS Still Has You Covered

We hope everyone has a great Christmas and New Year’s season. This time of year usually means gathering with family and friends, enjoying good food, and taking a relaxing break from the office. Not so...

Low 2FA Adoption Among U.S. Federal Agencies

A recent audit by the U.S. Government Accountability Office (GAO) revealed weaknesses in cybersecurity practices at various U.S. federal agencies. Among the weaknesses cited is the lack of implementing two-factor authentication (2FA). Twenty-two agencies reported...

A word to Companies – “Man-up” to 2FA

With our growing presence in the user authentication space, I thought I would Google “2FA” and see what comes up. I found this website – https://twofactorauth.org/. They appear to be leading the charge to force...

Background Noise as Authentication data?

So new this week is the idea of “Sound Proof” authentication. The idea is that the microphone on your device would listen to the background noise where you are and determine if you are who...

Almost 40% of Companies Still Use Only Passwords

So I ran across this article the other day about the number of companies still using password-only authentication. Now looking at the actual survey, and it says that in 2015, 39% of respondents reported using...

OpenSSH Vulnerable to Unlimited Authentication Attempts

Possibly the biggest security news this past week was the announcement of a bug in OpenSSH that opens it to password cracking. Normally, OpenSSH restricts the number failed authentication attempts that can occur on an...

Emoji Authentication?

So I ran across this article where a UK bank is replacing PIN codes with emoji. I get the point. One of the main problems with PIN codes is that in general they are only...

U2F Presentation by Yubico CEO

As mentioned in previous posts here and here, FIDO standards have been gaining traction with governments and the private sector. Our enterprise partner Yubico produces YubiKeys employing FIDO’s U2F authentication standard which Google and Yubico...