Risk
5/12/2005
06:20 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Phones Fight Phonies

On Tuesday, VeriSign hosted a dinner for journalists at Le Colonial in San Francisco to help get its message out about strong authentication. Representatives from AOL, IBM, and Intuit also were in attendance. The idea is that journalists get good food and the hosts get good press. Of course, it's not officially quid pro quo, but it's hard to imagine companies sponsoring such events without some hope that what goes around comes around. Coincidentally, Bite public relations managed the affair.

On Tuesday, VeriSign hosted a dinner for journalists at Le Colonial in San Francisco to help get its message out about strong authentication. Representatives from AOL, IBM, and Intuit also were in attendance.

The idea is that journalists get good food and the hosts get good press. Of course, it's not officially quid pro quo, but it's hard to imagine companies sponsoring such events without some hope that what goes around comes around. Coincidentally, Bite public relations managed the affair.Anyway, VeriSign had come to town for a conference called Digital ID World 2005, where the company explained its plans to make two-factor (strong) authentication cheap and affordable.

Strong authentication involves using something one has-an ATM card, example-in conjunction with something one knows-a personal identification number or PIN. It generally provides better security than weak authentication, which utilizes just one of those two components, such as a password or a door key.

It's a potentially useful technology that could help reduce identity theft and fraud.

The challenge for VeriSign and other security companies is that authentication tokens are expensive and there's no established open standard. In the absence of such a standard, it's doubtful that consumers would be thrilled to carry different tokens for every commercial Web site they deal with.

The answer, it seems, is the cell phone. They're everywhere already. Using them as authentication tokens just makes sense, to me at least.

VASCO Data Security, an enterprise security company, is doing just that. The company said today that it's now offering its Digipass software security token for Java-enabled mobile phones.

Sounds promising.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.