The inherent weaknesses in token-based authentication

    Date23 Mar 2011
    Posted ByAlex
    Alternative tokenless 2FA technologies may offer much greater levels of security, especially in light of the recent news that hackers have stolen data related to RSA secure tokens Chris Russell from Swivel Secure, commented:
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.