tag:blogger.com,1999:blog-3798604115389836864.post8227296032028570147..comments2024-03-13T13:04:53.453+00:00Comments on IT Security Expert Blog: RSA SecurID - What's the Risk?SecurityExperthttp://www.blogger.com/profile/02816379340772195492noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-3798604115389836864.post-14927178746753864142011-11-21T06:38:20.311+00:002011-11-21T06:38:20.311+00:00Phishing information is crucial in hacking this, t...Phishing information is crucial in hacking this, the reason why these should be changed periodically. Take a look at what happened to wiki leaks.windows dedicated serverhttp://www.netcetera.co.uk/servers/noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-51095793351196608152011-06-16T12:41:21.018+01:002011-06-16T12:41:21.018+01:00I don't think so that Hacker will be that much...I don't think so that Hacker will be that much eligible who can generate one time password and I believe that we can secure entire system with Web server SSL Certificates.<br /><br /><a href="https://www.thesslstore.com/wildcardssl-certificates.aspx" rel="nofollow">WildCard SSL</a>Thomashttps://www.blogger.com/profile/03195877157348959511noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-62081600321886129112011-06-07T12:16:41.379+01:002011-06-07T12:16:41.379+01:00RSA is offering to replace virtually all 40 millio...RSA is offering to replace virtually all 40 million SecurID token - http://bit.ly/jvnjLo >>The solution I predicted http://bit.ly/i5542QSecurityExperthttps://www.blogger.com/profile/02816379340772195492noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-9725314345463046532011-05-23T15:42:02.215+01:002011-05-23T15:42:02.215+01:00I bet if the attacker has all the mentioned criter...I bet if the attacker has all the mentioned criteria by ax0n, then it is like 100% hackable. Seeds are so confidential but do the attacker know the algorithm to generate the one time password out?<br /><br />Alan<br /><a href="http://www.itscolumn.com" rel="nofollow">IT Security Column</a>Administratorhttps://www.blogger.com/profile/05662049093699921407noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-361516141018927382011-03-25T12:44:51.857+00:002011-03-25T12:44:51.857+00:00Keep in mind also that even if an attacker now has...Keep in mind also that even if an attacker now has a list of seeds and serial numbers, and also has a list of which of RSA's customers each serial number went to, there's a huge stretch of uncertainty left. Which employee has which serial number? Has this token even been deployed yet? And that's added to the other layers of security you mentioned here.ax0nhttp://www.h-i-r.net/noreply@blogger.com