Thursday, January 03, 2008

Bank of America authenticates via mobile phone

Security Strategies Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Bank of America authenticates via mobile phone

M. E. Kabay By M. E. Kabay
Guest writer Mike Drabicky discusses Bank of America's newest security option: SafePass, a text message code sent to your cell phone. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.

MORE STORIESARROW


SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule
RELATED NEWS:

Malware evolving too fast for antivirus apps, 01/02/2008 If you think that the latest security suites afford complete protection against malware attacks, think again. Today's for-profit malware pushers ...

Hackers quickly move to exploit Bhutto assassination, 12/28/2007 Within hours of yesterday's assassination of former Pakistani Prime Minister Benazir Bhutto, malware makers exploited the breaking news to dupe ...

Storm switches tactics third time, adds rootkit, 12/28/2007 The ongoing Storm Trojan attack that began Monday has morphed again, security researchers said Thursday, changing the malicious file's name ...

Storm worm tempts with Christmas strip show, 12/24/2007 The criminals behind the Storm botnet waited until the last minute, but they've finally started delivering unwanted Christmas presents. . ...

The white knight of phish-busting, 12/24/2007 Until just a few months ago, Gary Warner did not have the kind of day job you'd expect from an antiphishing crusader. He didn't work for a security ...


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY QUALYS
rule

Webcast: Five PCI Best Practices
Listen this to this webcast to learn the latest about the PCI Data Security Standard. Discover why you need to comply with this specification designed to keep owner credit card information private. Learn how to avoid PCI DSS compliance failure and five best practices to supporting the standard. Listen to this webcast now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/03/08

TODAY'S MOST-READ STORIES:

  1. Eight can't-miss tech predictions for 1998
  2. The 15 best downloads of the year
  3. AOL to end support for Netscape browser
  4. 12 IT skills that employers can't say no to
  5. Storm switches tactics third time
  6. Everything that matters in IT
  7. Security dominates 2008 IT agenda
  8. 20 great Firefox extensions
  9. The 25 most innovative products of the year
  10. Management in '08: Can you say automate?

FEATURED BUYER'S GUIDE:
Network Monitoring and Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment