Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/15/2012
12:32 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NetAuthority Rolls Out Device Authentication Service To Thwart Man-In-The-Browser Attacks

NetAuthority offers support for Windows, Mac, and Linux end-user devices

SAN FRANCISCO ­ Aug. 14, 2012 ­ NetAuthority, the device-centric strong authentication provider, today announced its Device Authentication Engine, Device Authentication Service (DAS) and Transaction Verification Key (TVK) technology, a suite of strong device-centric data security products that irrefutably identify network-connected devices and prevent automated ³man-in-the-browser² (MitB) injected transactions.

With these offerings, NetAuthority has tightly coupled its patented Dynamic Device Key (DDK) generation and authentication technologies with industry-proven security standards and a flexible, high performance SaaS-based authentication service to provide the industry¹s first mass-scale device-centric strong authentication solution. The TVK transaction verification technology will be offered as an extension to the NetAuthority device authentication engine and service products.

Strong authentication is essential for preventing impersonation of stolen user names and passwords by irrefutably identifying the device and its association with the user. Transaction verification is a layered and equally essential solution that protects transactions from automated malware-based transaction fraud, which can occur after user authentication.

The NetAuthority device authentication engine and service are purpose-built for seamless, cost-effective mass adoption to address the ever-increasing security needs of the Internet-connected world. ³Man-in-the-browser² malware has become a significant threat to online banking services, with new research reports estimating automated fraud attempts at over $2 billion resulting in nearly $100 million in losses from successful attacks.

Furthermore, automated MitB malware like Zeus and SpyEye are expanding from online banking attacks to other areas of online fraud. MitB fraud cannot be reliably detected by antivirus solutions, and is impervious to traditional multi-factor authentication.

The new NetAuthority transaction verification key technology provides strong device-centric transaction verification aimed at detecting and preventing MitB attacks. With the addition of the TVK extension, NetAuthority provides the industry¹s only strong authentication solution that incorporates independent transaction verification with zero day attack protection. Online service providers and financial institutions can now utilize NetAuthority¹s patented device-centric strong authentication engine and service to verify online transactions, preventing MitB malware attacks without additional software or complexity.

SUPPORTING QUOTES:

Chris Brennan, CEO of NetAuthority, said:

³Unlike other forms of multi-factor authentication, the DAE and DAS are designed to facilitate widespread adoption of strong authentication that is both affordable and transparent to the end user. Our suite extends the freedom of mobility and user choice with exceptional authentication security measures; preventing user account breaches while helping financial institutions, consumer online services and SaaS-based cloud services providers protect their customers, information and assets.²

Derek Brink, vice president and research fellow for IT Security at Aberdeen Group, said:

³Solutions for authenticating users and transactions have always been a balance of user experience, strength of security and total cost ­ and the corresponding risks of user dissatisfaction, data loss and fraud and negative impact on corporate brands. The market trend has been towards solutions that are simple and transparent for end-users, while offering higher levels of protection against online fraud.²

KEY FACTS:

Device-centric multi-factor strong authentication and verification is both affordable and transparent to the end-user.

The TVK detects and prevents automated MitB attacks, providing zero day protection from financial fraud while enabling the discovery of malware-infected devices.

Multi-dimensional Dynamic Device Key (DDK) generation provides a unique device identifier for each session, eliminating the vulnerabilities of static identifiers such as digital certificates or security cookies.

NetAuthority offers support for Windows, Mac and Linux end-user devices.

Administrators can set flexible internal access protocols with fully-enabled

white- and black-listing.

About NetAuthority

NetAuthority is the strong device-centric authentication solution provider.

NetAuthority¹s patent-protected technology uniquely identifies and authenticates internet-enabled devices to thwart cyber security attacks, delivering compelling ROI for enterprise, government and other data-sensitive environments. For more information, visit www.NetAuthority.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...