Posts Tagged ‘Two-factor authentication’

Rohos Logon KeyThe new version of Rohos Logon Key 3.0 with a lot of changes and updates that will protect your computer against illegal intrusion to personal information stored on your PC.

Rohos Logon Key – the program 2-factor authentication for secure access to Windows. No more need to manually enter sensitive information during login, where it is vulnerable. Rohos Logon Key speeds up the login process and keeps it safe.

The program turns an ordinary USB flash drive into a powerful, two-factor tool to protect your computer and laptop.

Features Rohos Logon Key 3.0:

– Support for Google Authenticator

For owners of the phones Android, BlackBerry or IPhone: Google Authenticator app embedded in the list of supported OTP keys. To log on to Windows using one-time password generator from Google. Phone is always at hand, your password to you and it is convenient. (more…)

FortinetAmong the key risks – sophisticated targeted attacks on mobile devices and applications, active use of malicious IPv6 shelters and exploits.

1. The purpose of APT attacks will be mobile users

APT attacks, the so-called sophisticated targeted threats (Advanced Persistent Threats), named No. 1 threat because of their ability to use a variety of techniques and the latest technology for simultaneous attack from all sides. All these actions are clearly aimed at achieving a specific goal – to gain access to confidential information. A few recent examples of victims: Stuxnet, Flame and Gauss. Analysts expect that in 2013, the main purpose of APT attacks will shift to the private individuals, executives, politicians, and public figures. Confirm this forecast will be extremely difficult, in part because, after hackers managed to gain access to desired data, they can easily remove malware from the target device before the victim realizes what has happened. Moreover, it is hardly a person who have been victims of such attacks, will report the incident to the media, as it is in the first place will affect their personal reputation, and not on the company, public or government organization. In turn, attackers will actively seek out the information that they could use for criminal purposes, such as blackmail or industrial espionage in order to obtain compensation. (more…)