Multi-Factor Authentication Not Working

August 2011
Credit Union Journal;8/15/2011, Vol. 15 Issue 31, p18
Trade Publication
The article shares the views of Terry Austin, chief executive officer (CEO) at Guardian Analytics, regarding the insufficiency of multi-factor authentication approach to stop cyber-criminals in Los Altos, California.


Related Articles

  • Email Authentication.  // Network Dictionary;2007, p175 

    A definition of the term "Email Authentication" is presented. It refers to ensuring a valid identity on an email to prove and protect the identity of the email sender. Email authentication helps prevent spam, forgery, fraud and more serious crimes. The DomainKey is used to ensure the entity has...

  • PRESERVING CYBER INVESTIGATION EVIDENCE: THE SCREEN TOOL WITNESS SIGNATURE. Wright, Benjamin // Digital Evidence & Electronic Signature Law Review;2011, Vol. 8, p190 

    Commonly, a cyber investigation examines how a digital resource, such as an application, a hyperlink or a web search box -- works. For example, the investigator observes that when mouse clicks on hyperlink 'X' browser goes to a web page containing 'Y' content. The investigator observes how a...

  • Vulnerabilities of LDAP as an Authentication Service. Obimbo, Charlie; Ferriman, Benjamin // Journal of Information Security;Oct2011, Vol. 2 Issue 4, p151 

    Lightweight Directory Access Protocol (LDAP) servers are widely used to authenticate users in enterprise level networks. Organizations such as universities and small to medium-sized businesses use LDAP for a variety of applications including E-mail clients, SSH, and workstation authentication....

  • How CFCU Is Approaching The MFA Issue. Jepson, Kevin // Credit Union Journal;12/18/2006, Vol. 10 Issue 50, p16 

    The article looks into how credit unions are approaching the issue of using the multi-factor authentication as a strategy to commit fraud. Hackers and phishers are using this tool to mislead and trick members through e-mail and web sites. Credit unions enhance technological knowledge to lay the...

  • Limits of token gestures. King, Stuart // Computer Weekly;4/4/2006, p22 

    This article presents views of the author on computer security. Although the author does not advocate providing a blood sample to enable him to log into his bank account from home, he likes the idea of his bank providing him with an extra form factor and using two-factor authentication. No...

  • More Fraud-Prevention Spending.  // CU360;10/20/2008, Vol. 34 Issue 18, p5 

    The article reports on a survey on the increase of fraud-prevention spending in response to rising fraud schemes on delivery channels in the U.S. According to the company Gartner, financial firms are spending more on fraud prevention and customer authentication. Gartner surveyed 50 financial...

  • Schneier: 'Two-factor security is not our saviour'. Goodwin, Bill // Computer Weekly;3/22/2005, p8 

    The article reports that moves by British banks to introduce two-factor authentication will not protect the public against phishing attacks and identity theft, international security expert Bruce Schneier said. Schneier, a security technologist, author and founder and chief technical officer of...

  • Phishers Sink to New Lows. Trombly, Maria // Securities Industry News;4/10/2006, Vol. 18 Issue 14, p23 

    The article highlights the adoption of authentication solutions by financial companies in the U.S. in response to the growth of phishing. Among the advancements in phishing technology are the use of multiple Web sites and the ability of phishers to change the setting of the victim's computer....

  • Happy New Year: Who are you? Stephenson, Peter // Sports Car;Jan2014, Vol. 25 Issue 1, p35 

    The article offers information on the cyber crimes and authentication management and also discusses malware effect on the global computing infrastructure including the increasing burden on the security professionals due to collaboration of terrorist and cyber criminals. The author discusses the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics