Monthly Archives: December 2013

Month-by-Month Guide to Scams and Cons You Should Avoid – AARP

Did you know that certain scams are more likely to occur during certain times of the year? Here’s a year-long look at cons to beware of. (“Scams to Avoid” good read. Be sure to share & RT. See on http://www.aarp.org

Posted in Uncategorized

Analysis: As Fed tapers, don’t count out emerging market currencies – Reuters

Firstpost Analysis: As Fed tapers, don’t count out emerging market currencies Reuters “Once the cat (Fed tapering) is out of the bag and the outcome should be much lower volatility than what we saw in the past, market participants will

Posted in Uncategorized

Zimperium Raises $8M For Mobile Security That Turns The Tables On Attackers – TechCrunch

Zimperium Raises $8M For Mobile Security That Turns The Tables On AttackersTechCrunchLet’s say you’re at the airport, checking your email on your iPhone over the wifi. Well, you’ve already made your first mistake. See on techcrunch.com

Posted in Uncategorized

Exclusive: Secret contract tied NSA and security industry pioneer

SAN FRANCISCO (Reuters) – As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million (RT @WeldPond: Wow! See on webcache.googleusercontent.com

Posted in Uncategorized

Target security breach challenges retailer, consumers and banks – Pioneer Press

Krebs on SecurityTarget security breach challenges retailer, consumers and banksPioneer PressCancel the card? Or use it for Christmas shopping? Across the nation, shoppers weighed the risks of a massive security breach at Target. See on http://www.twincities.com

Posted in Uncategorized

CES To Offer Look At Biometric Alternatives To User Passwords

Several companies devoted to secure alternatives to user-generated passwords have adopted an open standards protocol to foster compatibility. See on http://www.forbes.com

Posted in Uncategorized

Even Good Passwords Are Bad. You Need Two-Factor Authentication – PC Magazine

Even Good Passwords Are Bad. You Need Two-Factor AuthenticationPC Magazine“Something you are” refers to fingerprints, iris scans, facial recognition, and other types of biometric authentication. … See on http://www.pcmag.com

Posted in Uncategorized

FIDO Ready Products ready – Planet Biometrics

FIDO Ready Products readyPlanet Biometricsievo Ievo™ readers are quickly representing the future of fingerprint access control by challenging your perception of biometrics. See on http://www.planetbiometrics.com

Posted in Uncategorized

On Target: Identity Theft Twice As Costly for Americans | Voice …

With a few simple measures, identity authentication and verification technologies technologies could help stem the tide of identity theft. See on voicebiocon.com

Posted in Uncategorized

Iris Recognition vs. Retina Scanning – What are the Differences? – M2SYS Blog On Biometric Technology

What is iris scan? This blog post examines the differences between iris recognition and retinal scanning. (Often confused: Iris Recognition vs. Retina Scanning – What are the Differences? See on blog.m2sys.com

Posted in Uncategorized