Attacks/Breaches
12/24/2013
09:57 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

GOTrust Introduces FIDO microSD

Provides universal strong authentication that can replace password authentication

Taichung, Taiwan - December 24, 2013. GOTrust, a FIDO Alliance member, announces FIDO microSD, among the first certified FIDO Ready&trade products in the marketplace. FIDO microSD will work with 99% of existing laptops and personal computers, and the one billion Android devices in the marketplace today. FIDO microSD supports FIDO login and includes 8GB memory capacity for user storage.

"For the hundreds of millions of users and systems integrators who want to adapt existing devices to become FIDO Ready&trade, there is FIDO microSD," said Darren Lee, CEO of GO-Trust. "GO-Trust makes it simple, fast and affordable for developers and providers of personal computers, mobile devices and phones already in the marketplace to be enabled with universal strong authentication that can replace password authentication with easier to use, more secure and private authentication."

FIDO microSD provides portability from device to device and one FIDO microSD can enable many devices and work for all sites that require or accommodate FIDO authentication.

"GOTrust's FIDO microSD is a great example of how users can benefit from the simple and powerful authentication strategies made possible by the FIDO Alliance," said Joerg Borchert, vice president of the chip card and security business for Infineon Technologies North America. "GOTrust chose the Infineon SLE97144SD Secure Element controller for its implementation of the microSD which gives the platform unsurpassed security based on our Integrity Guard technology and the high-speed contactless interfaces required for a superb user experience."

For enterprises and end users, microSD will soon be available at popular online outlets like eBay and Amazon. For more information about FIDO microSD, see http://www.go-rust.com/products/microsd-java/

FIDO microsSD can be seen in action at the Consumer Electronics Show, Las Vegas, NV from January 7-10, 2014 at the Infineon suites at the Aria Hotel.

About GO-Trust

GOTrust Technology Inc. (GO-Trust®) is the innovator of the secure microSDs and the first company to deliver hardware security for mobile devices using the SD and microSD form factor. GO-Trust® continues its world leading secure microSD innovation with the most powerful, fastest and smartest microSD embedded chips and the most sophisticated supporting applications. GO-Trust® has fourteen international patents for secure microSD products and applications and are sold in over 30 countries worldwide.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web