Attacks/Breaches
12/24/2013
09:57 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

GOTrust Introduces FIDO microSD

Provides universal strong authentication that can replace password authentication

Taichung, Taiwan - December 24, 2013. GOTrust, a FIDO Alliance member, announces FIDO microSD, among the first certified FIDO Ready&trade products in the marketplace. FIDO microSD will work with 99% of existing laptops and personal computers, and the one billion Android devices in the marketplace today. FIDO microSD supports FIDO login and includes 8GB memory capacity for user storage.

"For the hundreds of millions of users and systems integrators who want to adapt existing devices to become FIDO Ready&trade, there is FIDO microSD," said Darren Lee, CEO of GO-Trust. "GO-Trust makes it simple, fast and affordable for developers and providers of personal computers, mobile devices and phones already in the marketplace to be enabled with universal strong authentication that can replace password authentication with easier to use, more secure and private authentication."

FIDO microSD provides portability from device to device and one FIDO microSD can enable many devices and work for all sites that require or accommodate FIDO authentication.

"GOTrust's FIDO microSD is a great example of how users can benefit from the simple and powerful authentication strategies made possible by the FIDO Alliance," said Joerg Borchert, vice president of the chip card and security business for Infineon Technologies North America. "GOTrust chose the Infineon SLE97144SD Secure Element controller for its implementation of the microSD which gives the platform unsurpassed security based on our Integrity Guard technology and the high-speed contactless interfaces required for a superb user experience."

For enterprises and end users, microSD will soon be available at popular online outlets like eBay and Amazon. For more information about FIDO microSD, see http://www.go-rust.com/products/microsd-java/

FIDO microsSD can be seen in action at the Consumer Electronics Show, Las Vegas, NV from January 7-10, 2014 at the Infineon suites at the Aria Hotel.

About GO-Trust

GOTrust Technology Inc. (GO-Trust®) is the innovator of the secure microSDs and the first company to deliver hardware security for mobile devices using the SD and microSD form factor. GO-Trust® continues its world leading secure microSD innovation with the most powerful, fastest and smartest microSD embedded chips and the most sophisticated supporting applications. GO-Trust® has fourteen international patents for secure microSD products and applications and are sold in over 30 countries worldwide.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web