Industry news

September 27, 2013
 

Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog)


CSO (blog)

Hack of data brokers highlights weakness of knowledge-based authentication
CSO (blog)
A biometric control like a fingerprint is at least slightly more difficult to acquire, but even that should not be relied on by itself. The best approach is to require two-factor authentication–possibly combining knowledge and biometrics–so that it's

and more »



More articles by »
Written by: biometric

Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) products, services, solutions, system, software, download, free | Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) ppt, technology, API, server, cloud, definition, machine, How it works | Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) application, projects, uses, testing, module, sensor, reader, card, Tag, controller | Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) manufacturers, vendors, supplier, dealer, store, cost, price, free, buy | Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) support android, iphone, ios, aurdino, windows 8/7/Xp, linux | Hack of data brokers highlights weakness of knowledge-based authentication – CSO (blog) is available in India, Dubai, China, USA, America, Europe, UK, Germany and cities Bangalore, Delhi, Mumbai, Chennai, Pune, Hyderabad, Ahmedabad