Computer Scientists Break Security hardware Token Key in Record Time


According to a recent New York Times post, computer experts claim to have found an easy way to hack into a certain RSA token that has a USB port and compromise the seed-file. Essentially, tokens physical or software based, all hold a seed file that tells what code to show in which token at what time. These are all commonly known as pre-issued token systems.  Without arguing or validating the news, the latest story posted in the New York Times blog, illustrates the challenges this widely used approach has when it comes to the modern threats of today. The best solution is to focus on real-time session specific solutions that do not contain seed files or pre-issued codes. Be it delivered via SMS or software or hardware tokens. The SMS PASSCODE solution is one such solution where the user ID and password is validated before a code is generated in real-time and delivered via SMS, voice or secure email to the users mobile device. No seed-file, no pre-issued codes. The solution is highly awarded due to this simple, yet profound difference. To learn more about the New York Times post, click here.

You may be interested in attending our latest Webinar: Modern Threats, Modern Solutions – New Generation 2 Factor Authentication. Register here.

This entry was posted in Enterprise Posts and tagged , , by NetUtils. Bookmark the permalink.

About NetUtils

We operate as a specialist integrator of network, security and data solutions across the industry. Gathering together those with the skills and expertise to assess, champion and partner with the best innovation and technology available. Combining top tier solution providers and our own expert team we offer you decades of knowledge and experience in maximising your security investment. With our 25-year heritage comes over 450 years collective experience available to you in a million-pound team of industry leading specialists. By design we are structured to be guided by our technical arm, ensuring our core business is driven by solid technical policy. Working with over 400 enterprise and service provider clients, including household names across financial, education, public sector, manufacturing and healthcare brings a multitude of variance in challenge and opportunity. Our technology subject matter experts work with all our clients to meet their individual needs, both in the immediate and into the future for the threats yet to come.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s