Configure
security level accordingly for safety precaution. Set the number of icons to be
displayed on the screen. Decide how many login trials are allowed. Have it your
way! Source: https://www.authicon.com/index/features!
Monday, November 30, 2015
Wednesday, November 25, 2015
Always There
Authicon
authentication system stays on the website so there is no fear of your account
getting compromised if you lose your device. No extra device needed. Source: https://www.authicon.com/index/features!
Tuesday, November 24, 2015
Works Anonymously and Independently
Authicon
system works with anonymity and independently, and focuses on privacy and
security. Leaks are impossible, and not even malware with root privileges can
find out the user’s credentials. Source: http://bit.ly/1kSwewh!
Monday, November 23, 2015
Easy Deployment
Deploying
Authicon authentication system is easy and secure. Quickly deploy Authicon and
protect your account with ease. Within 30 minutes more secure! Source: https://www.authicon.com/index/features!
Sunday, November 22, 2015
Cheaper than 2-Factor (SMS) Authentication
Authicon
authentication provides cost effective solution that can allow you to achieve
the stronger authentication you need that has little to no per-user costs and
also do not use tokens that carry expiration dates. Source: https://www.authicon.com/index/features!
Thursday, November 19, 2015
Bypass Key logging Malware
With
the use of icons as password, we add protection from keystroke-stealing
malware. Entering iconic password on your icon board provides no detection for key
loggers. Source: https://www.authicon.com/index/features!
Wednesday, November 18, 2015
Enhanced Security Level
By
using Authicon authentication system, we enhance your website’s security level
by decreasing the exposure of your website to potential attacks that can occur
through the web. Source: https://www.authicon.com/index/features!
Monday, November 16, 2015
Data hack: A Russian gang just stole over billion passwords
A Russian criminal gang has successfully carried out the
world’s largest data breach amassing over a billion usernames and passwords as
well as over 500 million email addresses.
First reported by the New York Times, this is the single
largest breach of its kind and affects a huge variety of websites from
well-known brands to personal sites and blogs.
With over a billion ‘keys’ into people’s website accounts
the gang has a potential goldmine of information but according to the New York
Times it only appears to be using the information to spam people on behalf of
other groups and then collect the fees.
- Data Hack: A Russian Gang Just Stole Over A Billion
Passwords
Huffington Post UK, 06 August 2014
How often do we read news about username and password being
stolen by hackers? This incident addresses the need for industries to take a
better look at the methods on how to secure users’ data. On the part of the
users, people should also start to rethink how they secure themselves online.
Below are some information about the stolen user credentials and how Authicon
secure its users data.
Stolen users’ credentials
Online breaches are on the rise and every year, millions of
credentials are stolen. End-user credentials (usernames and passwords) are of
interest to spammers but what happens to the stolen information? Stolen user’s
credentials can be sold in underground markets by hackers at a varying price.
The more important the information, the higher the price tag. This is another
way of hackers getting money from your account information.
Storing user credentials
For safety reasons, we do not store users’ passwords. We
only collect the user’s “hashed username” using our hashing method. We collect
the users’ username and encrypt it, which serves as its access_id to the
system. We store the user data (username) on our own database. The database
stores the encrypted values. Source: http://blog.authicon.com/authicon_articles/data-hack-a-russian-gang-just-stole-over-billion-passwords/!
Sunday, November 15, 2015
Alert! Massive Hack Compromises 4 Million Federal Employees’ Private Info
No one is safe from hackers, even US federal employees
private information gets hacked. According to Engadget, “A group of hackers has
attacked the Office of Personnel Management (OPM), stealing sensitive data on 4
million current and former American federal employees. Law enforcement sources
tell Reuters that the government believes the perpetrators are from China and
have penetrated not just OPM’s IT systems, but also the records it stores at
the Department of the Interior’s data center.” Read the complete story here.
To avoid hackers stealing your website’s sensitive data,
increase the level of security by using graphical icons. Authicon provides that
level of security that makes hacking impossible. Try it now for FREE at http://www.Authicon.com!
Thursday, November 12, 2015
Giant Hack May Be First Step in Pursuit of Bigger US Secrets
US secrets are in peril as a giant hack targeted personal
files of government employees that spies may use to make their way to more
secure computers. Dan Payne, a senior counterintelligence official for the
Director of National Intelligence immediately told Federal employees to change
their passwords. According to Dan Payne, “Some of you may think that you are
not of interest because you don’t have access to classified information,” he
said. “You are mistaken.”
Federal officials said Friday the cyber-attack appeared to
have originated in China, but they didn’t point fingers directly at the Chinese
government. The Chinese said any such accusation would be “irresponsible and
unscientific.”
Read the whole story at The New York Times.
Make your website more secure by using graphical icons. Try
Authicon today for free. Source: http://blog.authicon.com/authicon_articles/giant-hack-may-be-first-step-in-pursuit-of-bigger-us-secrets/!
Wednesday, November 11, 2015
Introducing Authicon
What is
graphical password?
A graphical
password is an authentication system that works by having the user select from
images, in a specific order, presented in a graphical user interface (GUI). In
a graphical password system, a user needs to choose memorable locations in an
image.
A graphical
password is easier than a text-based password for most people to remember. It
may also offer better security than text-based passwords because many people,
in an attempt to memorize text-based passwords, use plain words.
Why
Authicon?
Using
alphanumerical passwords has been shown to have significant drawbacks. To
address this problem, Authicon uses the graphical password technique that deals
with shoulder-surfing problem, identity theft and other online attacks.
Traditional
cyber security system relying on just usernames and passwords isn’t enough
anymore. The key is adding extra layers of protection. Authicon adds an extra
layer of protection by using a graphical password technique. The system works
by having the user logs in to his account on the website secured by Authicon
using his login information – email and password for the particular website.
Authicon pop up page will then open where the user has to enter the preselected
icons from among a variety of icons displayed. If the correct icons were
clicked in, the user would be authenticated. Once the user is authenticated, he
can now access his account. Everytime the user will access his account on the
website secured by Authicon, he has to enter the correct icons on the Authicon
pop up page after every login.
Authicon
server is capable of supporting tens of thousands of users and can be easily
expanded to users without disrupting its infrastructure. Authicon is accessible
through any web browser from anywhere.
Authicon
eliminates significant up-front expense by offering a way for companies of any
size to implement authentication quickly and inexpensively. Deploying Authicon
authentication system is easy, cost-effective and secure. Visit http://blog.authicon.com/introducing-authicon/!
Tuesday, November 10, 2015
How to Create a Secure Password
News about online hacks are not
very new to us. Every year the criminals make off with millions of passwords.
Even the major websites that are known to have high security measures such as
Facebook, Twitter, LinkedIn and Google are not spared from these online
attacks.
Here are some tips on how to
secure and create a unique password:
Do not share your passwords with
others, for a very obvious reason – the more people know your password, the
more vulnerable your accounts are to unauthorized logins. Don’t ever write your
passwords down and never give them out to anyone nor post it on your computer
screen or desk.
Make a password that is unique to
you and not something that is easily guessed, use a combination of uppercase
and lowercase letters, symbols and numbers. Avoid using the common passwords
such as ‘123456’, ‘111111 ‘qwerty’, and the most common ‘password’.
(“Password”? Really?) Choose a phrase that is unique to you and you can customize
for each website you use. For example, one possible phrase is “I like
sandwiches” then use numbers and letters to recreate it and add an exclamation
point at the end. So “I like sandwiches” becomes “1l1k3s4ndw1ch3s!”. You can
put the first letter of the website you are using on your new password phrase.
For example, for your Facebook password you can use F1l1k3s4ndw1ch3s! and T1l1k3s4ndw1ch3s!
for your Twitter account.
Have a different password for
each online account, this reduces the risk of having your other accounts
compromised. Using one password for all or most of your accounts is never a
good idea – if a criminal gains access to one, all of them are compromised.
Change your password several
times a year, if the site you’re using has a history of being hacked, the
software used in hacking major websites often makes it possible for hackers to
continue to view your information until you change your password. Set up your
password recovery options and keep them up-to-date so you will have a way to
get back into your account if you forget your password.
Other ways to secure an account
is by using two-factor and multi-factor authentication:
Two-factor authentication uses a
username and password and another form of authentication, often times a
security code.
Multi-factor authentication uses
the three factors of authentication to verify an identity such as a username
and password, a security code, and a biometric like voice ID, fingerprint,
facial recognition, or iris recognition.
The problem with two-factor
authentication is there is always the fear of your device getting lost or
stolen which makes it impossible for the user to get the codes being sent to
the device. Authicon offers a layer of protection without having to use a
device to authenticate. You will never have to worry about not signing in to
your account if you lose your device. Authicon layer of protection stays on the
website so there is no fear of the code getting lost or stolen. Only you know
the icons to input when prompted. This is the main advantage of using Authicon
protection.
It is important to choose a
strong password to secure your important accounts. It is always a good practice
to update your passwords regularly and to remember it. Further secure your
accounts by using additional authentication methods. Source: http://blog.authicon.com/how-to-create-a-secure-password/!
Monday, November 9, 2015
The Three Factors of Authentication
For the user and website provider, it is
important to have a complete understanding of authentication to establish trust
in critical business processes. Here we discuss the three factors of
authentication.
·
Something you
know – a memorized information such as a word, phrase, number, code or fact
known only to the user.
·
Something you
have – having a unique item containing secret information such as a token code,
smart card or a USB-interface device.
·
Something you are
– all biometric such as the user’s voice, fingerprints, hand geometry, retinal
or iris scans and handwriting.
One-factor
Authentication
This is a traditional security process
where the user is required to enter a username and password to be granted
access.
Two-factor
Authentication
Two-factor authentication is a
single-factor plus a software- or hardware-generated token code, a smart card
or a USB-interface device. It is where the two authentication elements fall
under different categories with respect to ‘something you have’, ‘something you
are’, and ‘something you know’. A common example for a two-factor
authentication is withdrawing money from a cash machine. To withdraw, you will
need your bank card (something you have) and a PIN (personal identification
number) (something you know) to have a successful transaction. Another example
is when entering a password (something you know) and scan a fingerprint
(something you are).
Three-factor
Authentication
This is the use of three factors to
authenticate the user. The three factors meaning ‘something you know’,
‘something you have’, and ‘something you are’. This is a much-preferred form of
authentication as it is much more difficult for an intruder to overcome.
Authicon’s
Authentication
Most sites these days offer two-factor
authentication where you have to login and they send the code to your phone.
The problem with this sytem is that mobile phones are easily lost and stolen
and if another person has possession of the user’s phone, they could read the
text message and fraudulently authenticate. SMS text messages can also be
intercepted and forwarded to another phone number, allowing a cybercriminal to
receive the authentication code.
With Authicon, there is no need to use a
device. The second layer of protection offered by Authicon stays only on the
website where you have to login so there’s no worry of it ever getting it lost
or stolen. That’s the advantage of Authicon among other sites offering website
security. Source: http://blog.authicon.com/the-three-factors-of-authentication/!
Sunday, November 8, 2015
Consulting Excellence
Agility and
flexibility are the ingredients of our Service Managers. Our skilled Service
Managers make sure you receive the highest possible quality of services and
have a strong relationship with your clients. We don't use the standard
"one size fits all" approach. We use a framework and methodology that
fit your needs, not the other way around. Visit http://www.activemindz.net!
Thursday, November 5, 2015
Together we do
Next to
software development, ActiveMindz provides consultancy that specializes in top
quality Project Managers. We help with decisions related to the overall
directions where IT Projects should be heading, implementation and deliver on
time within budget. The challenges in modern businesses like yours combined
with ActiveMindz Projects Managers are the solution in today's fast-changing
world. Visit http://www.ActiveMindz.net!
Wednesday, November 4, 2015
Alone, you may not have all the answers
Sometimes
your needs go beyond software development and web services projects. Whenever
you need more than IT-related knowledge, we are the partner who cover this
ground. Our project/service managers are cutting through complexity to deliver
results. We plan, design and deliver solutions that result in real value. Visit
http://www.ActiveMindz.net!
Tuesday, November 3, 2015
How Does it Work?
With
ActiveMindz mobile app developers, we will help you reach information at your
fingertips. We also make sure that our app works on multiple mobile application
platforms. You will have one-touch access to your contact information and you
can connect with on-the-go consumers. How convenient is that? Try our mobile app now! Visit http://www.ActiveMindz.net!
Monday, November 2, 2015
Convenience
In today's
world, customers are always on the move and they're using mobile application
platforms to get there. It's very convenient to get information whether by
using mobile phones, tablets, or other mobile devices. That's the importance of
mobile app in today's market. Visit http://www.ActiveMindz.net!
Sunday, November 1, 2015
Why Mobile?
The number of
smartphones in use has exceeded 1.5 billion and it is estimated to double in
2015. As much as 65% of smartphone users prefer mobile browsers to the ones on
their desktops or notebooks. Only last year, more than 45 billion mobile apps
were downloaded. It is not a question of ‘if’, it is ‘how your existing
business or startup participates in the mobile world. Because we’ve got the
know-how, we’ll be happy to take your business to the mobile side. Visit http://www.activemindz.net!
Subscribe to:
Posts (Atom)