• RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource...
    23 KB (2,341 words) - 08:58, 10 May 2025
  • Thumbnail for RSA Security
    public key cryptography algorithm was also named. Among its products is the SecurID authentication token. The BSAFE cryptography libraries were also initially...
    36 KB (3,685 words) - 01:58, 4 March 2025
  • into the сryptographic corporation RSA  and obtained information about SecurID two-factor authentication fobs. Using this data, the hackers later tried...
    35 KB (3,759 words) - 01:10, 24 May 2025
  • Thumbnail for Peiter Zatko
    buffer overflow vulnerabilities, Oct 2001 Initial Cryptanalysis of the RSA SecurID Algorithm, Jan 2001 AntiSniff: Identification of remote systems in promiscuous...
    39 KB (3,140 words) - 07:45, 13 May 2025
  • Thumbnail for One-time password
    then be used to gain access to messages being sent to it. RSA Security's SecurID is one example of a time-synchronization type of token, along with HID...
    26 KB (3,542 words) - 07:02, 15 May 2025
  • implanted backdoors into them. In 2011 RSA was hacked and secret keys of securID tokens were stolen which allowed hackers to circumvent their authentication...
    10 KB (1,004 words) - 13:44, 31 March 2025
  • Thumbnail for Kenneth P. Weiss
    American entrepreneur, human factors engineer and inventor. He invented the SecurID Card, now a trademark of RSA Security. Weiss held a bachelor's degree from...
    5 KB (551 words) - 03:16, 10 May 2025
  • has been used in several prominent hacks, including a breach of the RSA SecurID authentication tool and the Nitro attacks on chemical companies, both in...
    4 KB (259 words) - 14:44, 28 January 2025
  • Thumbnail for Multi-factor authentication
    RSA SecurID token, an example of a disconnected token generator...
    43 KB (4,763 words) - 00:23, 18 May 2025
  • Mobile signature (redirect from Mobile ID)
    registration procedures. This is used for example as a replacement for RSA SecurID dongles with anonymous but specific identity in corporate access applications...
    19 KB (2,307 words) - 08:31, 26 December 2024
  • Thumbnail for Phishing
    significant increase in the number of attacks. In 2011, the master keys for RSA SecurID security tokens were stolen through a phishing attack. Chinese phishing...
    93 KB (8,667 words) - 00:19, 23 May 2025
  • user. Used to provide one-time password authentication such as S/Key or SecurID. Used by some OpenSSH configurations when PAM is the underlying host-authentication...
    41 KB (4,509 words) - 15:10, 30 May 2025
  • Thumbnail for Pleiades (supercomputer)
    jobs a user can connect from a remote location via ssh, while employing a SecurID. "Pleiades Supercomputer". NASA. Retrieved March 19, 2020. "Pleiades -...
    20 KB (1,887 words) - 08:18, 10 April 2025
  • Thumbnail for Cyber kill chain
    Jackson (January 12, 2013). "How Lockheed Martin's 'Kill Chain' Stopped SecurID Attack". DARKReading. Archived from the original on 2024-01-19. Retrieved...
    14 KB (1,416 words) - 09:53, 9 November 2024
  • Thumbnail for Smart card
    Smart card (section NagraID)
    Archived from the original on 12 May 2021. Retrieved 12 May 2021. "RSA SecurID SD200 – hardware token Series Specs". CNET. Archived from the original...
    115 KB (12,132 words) - 14:27, 12 May 2025
  • Helix, Phelix, Py, TPypy, the HAVAL cryptographic hash function, and the SecurID hash function. Preneel, Bart; Bosselaers, Antoon; Govaerts, René; Vandewalle...
    12 KB (975 words) - 17:42, 26 May 2025
  • Thumbnail for Keychain
    network connection to a secure network. (A well-known example is the RSA SecurID token.) This kind of key fob may have a keypad on which the user must enter...
    14 KB (1,817 words) - 08:06, 27 May 2025
  • improvements were made, including out-of-the-box support for Active Directory and SecurID-based VPNs. Built-in fax support.: 1  Sending a fax can be done using the...
    13 KB (998 words) - 20:50, 19 April 2025
  • Thumbnail for Mark Pesce
    for the next few years, developing prototype firmware and software for SecurID cards. In 1988, Pesce joined Shiva Corporation, which pioneered and popularized...
    11 KB (1,068 words) - 21:29, 10 April 2025
  • keys and biometric data. The most popular type of security token (RSA's SecurID) displays a number that changes every minute. Users are authenticated by...
    31 KB (4,033 words) - 11:39, 11 May 2025
  • authentication protocol involving a username/password combination, and an RSA SecurID Key Fob for authentication. Users who are within the trusted networks of...
    3 KB (300 words) - 22:06, 9 April 2025
  • keys and biometric data. The most popular type of security token (RSA SecurID) displays a number which changes every minute. Users are authenticated...
    7 KB (1,004 words) - 12:21, 4 July 2024
  • Thumbnail for PrivacyIDEA
    replace classical proprietary two factor authentication systems such as RSA SecurID or Vasco. It supports single sign-on via SAML. It is also possible to login...
    3 KB (233 words) - 19:56, 4 August 2024
  • Thumbnail for Security token
    time, become unsynchronized. However, some such systems, such as RSA's SecurID, allow the user to re-synchronize the server with the token, sometimes...
    22 KB (2,611 words) - 16:06, 4 January 2025
  • DNSChanger HBGary Federal Operation AntiSec PlayStation network outage RSA SecurID compromise 2012 LinkedIn hack Stratfor email leak Operation High Roller...
    14 KB (1,265 words) - 12:12, 18 April 2025
  • Shell • Secure telephone • Secure Terminal Equipment • Secure voice • SecurID • Security association • Security engineering • Security level • Security...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • to Vista's release, and is included in Vista's successor, Windows 7), SecurID Support in May 2006, PC-to-PC Synchronization in June 2006. The initial...
    53 KB (5,197 words) - 16:49, 3 April 2025
  • Manual wvdial.conf(5) – Linux File Formats Manual Using wvdial with a SecurID one-shot password Chestnut, an alternative dialer eznet, an alternative...
    4 KB (240 words) - 10:11, 15 April 2024
  • Bania Lifetime Achievement: pipacs/PaX Team Lamest Vendor Response: RSA SecurID token compromise RSA Best Song: "[The Light It Up Contest]" Geohot Most...
    37 KB (3,398 words) - 02:39, 13 May 2025
  • challenge–response was eliminated to produce a one-time password token similar to the SecurID product. Enigma Logic merged with Secure Computing Corporation in 1996...
    15 KB (1,776 words) - 22:05, 20 February 2024