Facebook Connect Twitter Connect RSS Feeds
  • Brands
  • Search
  • Contact

Articles tagged with: authentication

Google Implements Two-Step Authentication Worldwide

In June 2011, many Gmail accounts were compromised by hackers. Passwords of many US officials, political activists and officials in different countries were stolen.

Ever since then, Google had been working on it’s Two Step Authentication method. This method has enhanced the security of Google account holders. This method requires password based authentication along with a verification code which is sent to the user either through voice, call/text or is generated on the user’s smartphone device via a Google app from which one is accessing his/her account.

99.7% Of Android Users At Risk To Data Leaks

According to Adrian Kingsley Hughes from ZDNet, 99.7% of Android smartphones are leaking login information for Google services. This massive data leak may allow other cloud-stored information to be leaked as well. Where does this massive leak come from? Apparently, it is based on the way Google requests authentication tokens (tokens that exist to eliminate the hassle of logging in each time into a service).

Microsoft Announces Window Azure Toolkit

Microsoft announced on Monday a Windows Azure Toolkit for devices that consist of assets for Windows Phone, iOS, and Android. With the toolkits, developers will be able to use the cloud-based system by sharing files with one another through the network. This allows for collaboration over widespread networks. Developers will be able to use the cloud to share requirements such as device notifications, authentication, storage, and leaderboards.

Huge Security Hole Found In Many Nikon Cameras

Researchers have recently discovered a flaw in the system used by Nikon professional digital cameras, the same system that ensures that images have not been tampered with. What usually happens in high-end SLR digital cameras is a unique and encrypted signing key is assigned to an image when it is shot. This image is then verified by Nikon’s proprietary Image Authentication System. When an image gets edited, this key is overwritten, and the software does this automatically.

Datalocker 3 Offers Full Hard Drive Encryption; 320GB, 640GB, 1TB

Origin Storage has just rolled out the new Datalocker 3, an external hard disk that provides data encryption capability for the entire hard drive. The Datalocker 3 features USB 3.0 support, RFID for dual factor authentication and a backlit LCD on the drive, all features that weren’t present on the previous Datalocker 2.

Some customers have reported problems with the Datalocker 2, such as problems viewing the keypad whilst typing in their encryption access key in lowlit areas. Fortunately, this was remedied with Datalocker 3 and for good reason too! Datalocker 3 also supports a 31 digit access code in alphanumeric format and customers certainly don’t want to make mistakes that could lock them out of their drives.

Toshiba’s New Self-Encrypting Hard Drives (They Erase Themselves!)

Toshiba has unveiled today its family of self-encrypting hard disk drives that can erase data when connected to an unkown host. The new Toshiba Self-Encrypting Drives (SED) allow manufacturers to configure different data invalidation options to allow for consumers increased options for data security. The SED hard drives will be in a 2.5-inch form factor and run at 7,200 rotations per minute. The drives are built for PCs, copiers, and multi-function printers, as well as POS (point of sale) systems that are commonly used in government and medical sectors.