Monday, November 30, 2015

Configurable Security Level

Configure security level accordingly for safety precaution. Set the number of icons to be displayed on the screen. Decide how many login trials are allowed. Have it your way! Source: https://www.authicon.com/index/features!

Wednesday, November 25, 2015

Always There

Authicon authentication system stays on the website so there is no fear of your account getting compromised if you lose your device. No extra device needed. Source: https://www.authicon.com/index/features

Tuesday, November 24, 2015

Works Anonymously and Independently

Authicon system works with anonymity and independently, and focuses on privacy and security. Leaks are impossible, and not even malware with root privileges can find out the user’s credentials. Source: http://bit.ly/1kSwewh

Monday, November 23, 2015

Sunday, November 22, 2015

Cheaper than 2-Factor (SMS) Authentication

Authicon authentication provides cost effective solution that can allow you to achieve the stronger authentication you need that has little to no per-user costs and also do not use tokens that carry expiration dates. Source: https://www.authicon.com/index/features

Thursday, November 19, 2015

Bypass Key logging Malware

With the use of icons as password, we add protection from keystroke-stealing malware. Entering iconic password on your icon board provides no detection for key loggers. Source: https://www.authicon.com/index/features!

Wednesday, November 18, 2015

Enhanced Security Level

By using Authicon authentication system, we enhance your website’s security level by decreasing the exposure of your website to potential attacks that can occur through the web. Source: https://www.authicon.com/index/features

Monday, November 16, 2015

Data hack: A Russian gang just stole over billion passwords

A Russian criminal gang has successfully carried out the world’s largest data breach amassing over a billion usernames and passwords as well as over 500 million email addresses.
First reported by the New York Times, this is the single largest breach of its kind and affects a huge variety of websites from well-known brands to personal sites and blogs.
With over a billion ‘keys’ into people’s website accounts the gang has a potential goldmine of information but according to the New York Times it only appears to be using the information to spam people on behalf of other groups and then collect the fees.
- Data Hack: A Russian Gang Just Stole Over A Billion Passwords
Huffington Post UK, 06 August 2014

How often do we read news about username and password being stolen by hackers? This incident addresses the need for industries to take a better look at the methods on how to secure users’ data. On the part of the users, people should also start to rethink how they secure themselves online. Below are some information about the stolen user credentials and how Authicon secure its users data.

Stolen users’ credentials
Online breaches are on the rise and every year, millions of credentials are stolen. End-user credentials (usernames and passwords) are of interest to spammers but what happens to the stolen information? Stolen user’s credentials can be sold in underground markets by hackers at a varying price. The more important the information, the higher the price tag. This is another way of hackers getting money from your account information.

Storing user credentials

For safety reasons, we do not store users’ passwords. We only collect the user’s “hashed username” using our hashing method. We collect the users’ username and encrypt it, which serves as its access_id to the system. We store the user data (username) on our own database. The database stores the encrypted values. Source: http://blog.authicon.com/authicon_articles/data-hack-a-russian-gang-just-stole-over-billion-passwords/

Sunday, November 15, 2015

Alert! Massive Hack Compromises 4 Million Federal Employees’ Private Info

No one is safe from hackers, even US federal employees private information gets hacked. According to Engadget, “A group of hackers has attacked the Office of Personnel Management (OPM), stealing sensitive data on 4 million current and former American federal employees. Law enforcement sources tell Reuters that the government believes the perpetrators are from China and have penetrated not just OPM’s IT systems, but also the records it stores at the Department of the Interior’s data center.” Read the complete story here.


To avoid hackers stealing your website’s sensitive data, increase the level of security by using graphical icons. Authicon provides that level of security that makes hacking impossible. Try it now for FREE at http://www.Authicon.com

Thursday, November 12, 2015

Giant Hack May Be First Step in Pursuit of Bigger US Secrets

US secrets are in peril as a giant hack targeted personal files of government employees that spies may use to make their way to more secure computers. Dan Payne, a senior counterintelligence official for the Director of National Intelligence immediately told Federal employees to change their passwords. According to Dan Payne, “Some of you may think that you are not of interest because you don’t have access to classified information,” he said. “You are mistaken.”

Federal officials said Friday the cyber-attack appeared to have originated in China, but they didn’t point fingers directly at the Chinese government. The Chinese said any such accusation would be “irresponsible and unscientific.”
Read the whole story at The New York Times.

Make your website more secure by using graphical icons. Try Authicon today for free. Source: http://blog.authicon.com/authicon_articles/giant-hack-may-be-first-step-in-pursuit-of-bigger-us-secrets/

Wednesday, November 11, 2015

Introducing Authicon

What is graphical password?

A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). In a graphical password system, a user needs to choose memorable locations in an image.

A graphical password is easier than a text-based password for most people to remember. It may also offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words.

Why Authicon?

Using alphanumerical passwords has been shown to have significant drawbacks. To address this problem, Authicon uses the graphical password technique that deals with shoulder-surfing problem, identity theft and other online attacks.

Traditional cyber security system relying on just usernames and passwords isn’t enough anymore. The key is adding extra layers of protection. Authicon adds an extra layer of protection by using a graphical password technique. The system works by having the user logs in to his account on the website secured by Authicon using his login information – email and password for the particular website. Authicon pop up page will then open where the user has to enter the preselected icons from among a variety of icons displayed. If the correct icons were clicked in, the user would be authenticated. Once the user is authenticated, he can now access his account. Everytime the user will access his account on the website secured by Authicon, he has to enter the correct icons on the Authicon pop up page after every login.

Authicon server is capable of supporting tens of thousands of users and can be easily expanded to users without disrupting its infrastructure. Authicon is accessible through any web browser from anywhere.


Authicon eliminates significant up-front expense by offering a way for companies of any size to implement authentication quickly and inexpensively. Deploying Authicon authentication system is easy, cost-effective and secure. Visit http://blog.authicon.com/introducing-authicon/

Tuesday, November 10, 2015

How to Create a Secure Password

News about online hacks are not very new to us. Every year the criminals make off with millions of passwords. Even the major websites that are known to have high security measures such as Facebook, Twitter, LinkedIn and Google are not spared from these online attacks.

Here are some tips on how to secure and create a unique password:

Do not share your passwords with others, for a very obvious reason – the more people know your password, the more vulnerable your accounts are to unauthorized logins. Don’t ever write your passwords down and never give them out to anyone nor post it on your computer screen or desk.
Make a password that is unique to you and not something that is easily guessed, use a combination of uppercase and lowercase letters, symbols and numbers. Avoid using the common passwords such as ‘123456’, ‘111111 ‘qwerty’, and the most common ‘password’. (“Password”? Really?) Choose a phrase that is unique to you and you can customize for each website you use. For example, one possible phrase is “I like sandwiches” then use numbers and letters to recreate it and add an exclamation point at the end. So “I like sandwiches” becomes “1l1k3s4ndw1ch3s!”. You can put the first letter of the website you are using on your new password phrase. For example, for your Facebook password you can use F1l1k3s4ndw1ch3s! and T1l1k3s4ndw1ch3s! for your Twitter account.

Have a different password for each online account, this reduces the risk of having your other accounts compromised. Using one password for all or most of your accounts is never a good idea – if a criminal gains access to one, all of them are compromised.

Change your password several times a year, if the site you’re using has a history of being hacked, the software used in hacking major websites often makes it possible for hackers to continue to view your information until you change your password. Set up your password recovery options and keep them up-to-date so you will have a way to get back into your account if you forget your password.

Other ways to secure an account is by using two-factor and multi-factor authentication:
Two-factor authentication uses a username and password and another form of authentication, often times a security code.
Multi-factor authentication uses the three factors of authentication to verify an identity such as a username and password, a security code, and a biometric like voice ID, fingerprint, facial recognition, or iris recognition.

The problem with two-factor authentication is there is always the fear of your device getting lost or stolen which makes it impossible for the user to get the codes being sent to the device. Authicon offers a layer of protection without having to use a device to authenticate. You will never have to worry about not signing in to your account if you lose your device. Authicon layer of protection stays on the website so there is no fear of the code getting lost or stolen. Only you know the icons to input when prompted. This is the main advantage of using Authicon protection.

It is important to choose a strong password to secure your important accounts. It is always a good practice to update your passwords regularly and to remember it. Further secure your accounts by using additional authentication methods. Source: http://blog.authicon.com/how-to-create-a-secure-password/

Monday, November 9, 2015

The Three Factors of Authentication

For the user and website provider, it is important to have a complete understanding of authentication to establish trust in critical business processes. Here we discuss the three factors of authentication.
·                      Something you know – a memorized information such as a word, phrase, number, code or fact known only to the user.
·                      Something you have – having a unique item containing secret information such as a token code, smart card or a USB-interface device.
·                      Something you are – all biometric such as the user’s voice, fingerprints, hand geometry, retinal or iris scans and handwriting.

One-factor Authentication

This is a traditional security process where the user is required to enter a username and password to be granted access.

Two-factor Authentication

Two-factor authentication is a single-factor plus a software- or hardware-generated token code, a smart card or a USB-interface device. It is where the two authentication elements fall under different categories with respect to ‘something you have’, ‘something you are’, and ‘something you know’. A common example for a two-factor authentication is withdrawing money from a cash machine. To withdraw, you will need your bank card (something you have) and a PIN (personal identification number) (something you know) to have a successful transaction. Another example is when entering a password (something you know) and scan a fingerprint (something you are).

Three-factor Authentication

This is the use of three factors to authenticate the user. The three factors meaning ‘something you know’, ‘something you have’, and ‘something you are’. This is a much-preferred form of authentication as it is much more difficult for an intruder to overcome.

Authicon’s Authentication

Most sites these days offer two-factor authentication where you have to login and they send the code to your phone. The problem with this sytem is that mobile phones are easily lost and stolen and if another person has possession of the user’s phone, they could read the text message and fraudulently authenticate. SMS text messages can also be intercepted and forwarded to another phone number, allowing a cybercriminal to receive the authentication code.

With Authicon, there is no need to use a device. The second layer of protection offered by Authicon stays only on the website where you have to login so there’s no worry of it ever getting it lost or stolen. That’s the advantage of Authicon among other sites offering website security. Source: http://blog.authicon.com/the-three-factors-of-authentication/

Sunday, November 8, 2015

Consulting Excellence


Agility and flexibility are the ingredients of our Service Managers. Our skilled Service Managers make sure you receive the highest possible quality of services and have a strong relationship with your clients. We don't use the standard "one size fits all" approach. We use a framework and methodology that fit your needs, not the other way around. Visit http://www.activemindz.net

Thursday, November 5, 2015

Together we do

Next to software development, ActiveMindz provides consultancy that specializes in top quality Project Managers. We help with decisions related to the overall directions where IT Projects should be heading, implementation and deliver on time within budget. The challenges in modern businesses like yours combined with ActiveMindz Projects Managers are the solution in today's fast-changing world. Visit http://www.ActiveMindz.net

Wednesday, November 4, 2015

Alone, you may not have all the answers

Sometimes your needs go beyond software development and web services projects. Whenever you need more than IT-related knowledge, we are the partner who cover this ground. Our project/service managers are cutting through complexity to deliver results. We plan, design and deliver solutions that result in real value. Visit http://www.ActiveMindz.net

Tuesday, November 3, 2015

How Does it Work?

With ActiveMindz mobile app developers, we will help you reach information at your fingertips. We also make sure that our app works on multiple mobile application platforms. You will have one-touch access to your contact information and you can connect with on-the-go consumers. How convenient is that? Try our mobile app now! Visit http://www.ActiveMindz.net

Monday, November 2, 2015

Convenience

In today's world, customers are always on the move and they're using mobile application platforms to get there. It's very convenient to get information whether by using mobile phones, tablets, or other mobile devices. That's the importance of mobile app in today's market. Visit http://www.ActiveMindz.net

Sunday, November 1, 2015

Why Mobile?

The number of smartphones in use has exceeded 1.5 billion and it is estimated to double in 2015. As much as 65% of smartphone users prefer mobile browsers to the ones on their desktops or notebooks. Only last year, more than 45 billion mobile apps were downloaded. It is not a question of ‘if’, it is ‘how your existing business or startup participates in the mobile world. Because we’ve got the know-how, we’ll be happy to take your business to the mobile side. Visit http://www.activemindz.net!