The WiKID Blog, musings on two-factor authentication, information security and some other stuff.
security-issues-with-googles-anti-phishing-tool
Posted by: admin 15 years, 3 months ago
There is a great post by Nitesh Dhanjani over at O'Reilly about his security concerns about their Safe Browsing for Firefox extension.identity-theft-the-nanny-state-and-ambulance
Posted by: admin 15 years, 3 months ago
Mordaxus at Emergent Choas has an inciteful post on how the government can protect people from identity theft.
I can think of a situation we need protection from. Here is a scenario. Let us take the case of a lender, Larry. We need a law to make it so that if Larry lends money to Alice, he cannot try to collect it from Bob. That's all we need. If we have that, we'll have all the legal protection we need to solve identity theft.This is an interesting idea, but I fear that it is too simplistic. I suspect that this is the current law. The problem is really the burden of proof. Currently, Bob has to prove to Larry that he did not borrow the money. Larry gets to put all sorts of nastiness onto Bob's credit report that Bob will never be able to get off. Bob can sue Larry, butas mordaxus points out, the way to change the business practice is to make it not worthwhile, which means a class-action lawsuit.
air-marshalls-arrested-for-drug-smuggling
Posted by: admin 15 years, 3 months ago
According to this Time article two Air Marshalls were arrested in Houston for allegedly smuggling cocaine.voting-round-up
Posted by: admin 15 years, 3 months ago
- Remember to vote today, or there is no way your vote can be mis-counted
- It's expensive and screwed up notes Adam
- Unattended voting machines turning up, just waiting for manipulation
- If you're a Govenor or a member of Congress chances are that you won't be able to vote.
- I bet that pansy Ed Felton never thought of just busting the crap out of Diebold machine with a metal cat paperweight. NB: I am assuming that the guy didn't own the pansy-esque paperweight, but just borrowed it from his roomate/grandmother.
- If you're frustrated with both parties, just vote for Somebody Else, at least it will test the write-in functionality of your voting machine.
- No matter how many issues there are with voting macines, nothing will happen because the macine makers have come up with the ultimate distraction and surely the top news story: Brittany Spears files for divorce.. It's Diebold-olical!
spy-coins-from-canada-collect-all-6
Posted by: admin 15 years, 3 months ago
From Yahoo::
In a U.S. government warning high on the creepiness scale, the Defense Department cautioned its American contractors over what it described as a new espionage threat: Canadian coins with tiny radio frequency transmitters hidden inside.It is very strange. The article points out what a poor mechanism it is for tracking: short distance only, likely to be used to buy something, etc. I would think they must have been looking for a very limited amount of information. The location of a safe house, for example. While the distance is limited, you could compensate for that with an 'rfid rifle'.
Recent Posts
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
Archive
2024
- January (1)
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)