RSA Security announced Monday the availability of RSA SecurID for Microsoft Windows two-factor authentication. The company said it enhances security, provides a consistent and simple user experience ...
Hackers have infiltrated Lockheed Martin, the world's largest defense equipment supplier's defenses, which the company termed as significant and tenacious. Reuters reported that hackers had breached ...
EMC’s RSA Security division says the security of the company’s two-factor SecurID tokens could be at risk following a sophisticated cyber-attack on the company. In a note published on the company’s ...
In an acknowledgement of the severity of its recent computer compromise, RSA Security said Monday that it will replace Securid tokens for any customer that asks. Customers have been left wondering ...
Editor's Note: RSA's surprising announcement of a cyberattack targeting its SecurID multifactor authentication products prompts this overview of what RSA SecurID is and what it does. RSA SecurID is a ...
How serious is the security threat posed by the theft of inside information about SecurID, the two-factor authentication system sold by EMC division RSA? "It is important enough that it required an ...
RSA confirmed on Friday that the attack that compromised the company’s high-value SecurID product was essentially a small, targeted phishing campaign that included a payload of a malicious Flash ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. While customers are understandably concerned about the ...
The same type of attack used recently to get around security measures at Lockheed Martin, and possibly other defense contractors as well, could also be used to hack international banking services, ...
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. INDIANAPOLIS, Ind. – By the year 2020, using ...
A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...