RSA, the security division of EMC, on Monday confirmed that data obtained via a March hack was used to attack the systems of defense contractor Lockheed Martin. To assuage fears about the breach, RSA ...
A team of cryptographic scientists have found a way to exploit the RSA SecurID 800 token, as well as at least seven other tokens, by leveraging cryptographic flaws in the devices. The researchers, who ...
RSA customers could be at risk after the company's two-factor SecurID tokens fell victim to what it's calling sophisticated cyber-attack. Art Coviello, executive chairman of Bedford, Mass.-based RSA, ...
Lockheed Martin and RSA today each separately confirmed that the breach that compromised RSA's SecurID authentication technology helped lead to the recent targeted attack aimed at the defense ...
When we learned back in March that security firm RSA had been hacked, we tutted, shook our heads, sighed with desperation, and collectively facepalmed. When news later emerged that its database of ...
The attack bypasses protections built in RSA's 2-factor authentication system. Weird, I'd never would have made a windows app for the rsa thingy; that's just asking for it to be compromised. If you ...
The intrusion by hackers of security giant RSA, a unit of EMC, has left customers and analysts wondering if it is still safe to use millions of the one-time passcode tokens used to log into enterprise ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
The app works with a SecurID token seed and RSA's Authentication Manager; together they can provide a one-time password that changes every minute. This password is used to securely access a VPN, WLAN, ...
RSA executive chairman Art Coviello said on Tuesday, that there were two groups of hackers working for a nation-state, who were behind a cyberattack on RSA that stole information on its SecurID tokens ...
A researcher has devised a method that attackers with control over a victim’s computer can use to clone the secret software token that RSA’s SecurID uses to generate one-time passwords. The technique, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results