Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:32 PM
Dark Reading
Dark Reading
Products and Releases

NetAuthority Rolls Out Device Authentication Service To Thwart Man-In-The-Browser Attacks

NetAuthority offers support for Windows, Mac, and Linux end-user devices

SAN FRANCISCO ­ Aug. 14, 2012 ­ NetAuthority, the device-centric strong authentication provider, today announced its Device Authentication Engine, Device Authentication Service (DAS) and Transaction Verification Key (TVK) technology, a suite of strong device-centric data security products that irrefutably identify network-connected devices and prevent automated ³man-in-the-browser² (MitB) injected transactions.

With these offerings, NetAuthority has tightly coupled its patented Dynamic Device Key (DDK) generation and authentication technologies with industry-proven security standards and a flexible, high performance SaaS-based authentication service to provide the industry¹s first mass-scale device-centric strong authentication solution. The TVK transaction verification technology will be offered as an extension to the NetAuthority device authentication engine and service products.

Strong authentication is essential for preventing impersonation of stolen user names and passwords by irrefutably identifying the device and its association with the user. Transaction verification is a layered and equally essential solution that protects transactions from automated malware-based transaction fraud, which can occur after user authentication.

The NetAuthority device authentication engine and service are purpose-built for seamless, cost-effective mass adoption to address the ever-increasing security needs of the Internet-connected world. ³Man-in-the-browser² malware has become a significant threat to online banking services, with new research reports estimating automated fraud attempts at over $2 billion resulting in nearly $100 million in losses from successful attacks.

Furthermore, automated MitB malware like Zeus and SpyEye are expanding from online banking attacks to other areas of online fraud. MitB fraud cannot be reliably detected by antivirus solutions, and is impervious to traditional multi-factor authentication.

The new NetAuthority transaction verification key technology provides strong device-centric transaction verification aimed at detecting and preventing MitB attacks. With the addition of the TVK extension, NetAuthority provides the industry¹s only strong authentication solution that incorporates independent transaction verification with zero day attack protection. Online service providers and financial institutions can now utilize NetAuthority¹s patented device-centric strong authentication engine and service to verify online transactions, preventing MitB malware attacks without additional software or complexity.


Chris Brennan, CEO of NetAuthority, said:

³Unlike other forms of multi-factor authentication, the DAE and DAS are designed to facilitate widespread adoption of strong authentication that is both affordable and transparent to the end user. Our suite extends the freedom of mobility and user choice with exceptional authentication security measures; preventing user account breaches while helping financial institutions, consumer online services and SaaS-based cloud services providers protect their customers, information and assets.²

Derek Brink, vice president and research fellow for IT Security at Aberdeen Group, said:

³Solutions for authenticating users and transactions have always been a balance of user experience, strength of security and total cost ­ and the corresponding risks of user dissatisfaction, data loss and fraud and negative impact on corporate brands. The market trend has been towards solutions that are simple and transparent for end-users, while offering higher levels of protection against online fraud.²


Device-centric multi-factor strong authentication and verification is both affordable and transparent to the end-user.

The TVK detects and prevents automated MitB attacks, providing zero day protection from financial fraud while enabling the discovery of malware-infected devices.

Multi-dimensional Dynamic Device Key (DDK) generation provides a unique device identifier for each session, eliminating the vulnerabilities of static identifiers such as digital certificates or security cookies.

NetAuthority offers support for Windows, Mac and Linux end-user devices.

Administrators can set flexible internal access protocols with fully-enabled

white- and black-listing.

About NetAuthority

NetAuthority is the strong device-centric authentication solution provider.

NetAuthority¹s patent-protected technology uniquely identifies and authenticates internet-enabled devices to thwart cyber security attacks, delivering compelling ROI for enterprise, government and other data-sensitive environments. For more information, visit www.NetAuthority.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
PUBLISHED: 2021-03-08
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulner...
PUBLISHED: 2021-03-08
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.