Generic selectors
Exact matches only
Search in title
Search in content


SecSign Blog Category

WordPress Security: Prevent Brute Force and DDoS Attacks

12 Nov 2014 / 0 Comments


Killing Passwords: the Real Solution for Password Security

02 Nov 2014 / 0 Comments


Mobile Security Neglected as Google Integrates U2F Authentication

29 Oct 2014 / 0 Comments


Apple iCloud Hacking in China: Credentials Are the Problem

23 Oct 2014 / 0 Comments


Two-factor Authentication for PCI Compliance: Achieving Better Security

20 Oct 2014 / 0 Comments

The recent data security breaches of point-of-sale systems at Target and Home Depot, which compromised over 90 million consumer payment cards, have drawn increasing attention to the need for two-factor authentication to protect access to company networks and ensure PCI compliance. At the time of the breaches, however, two-factor authentication was already a core requirement […]


HIPAA Person or Entity Authentication: How to Achieve Compliance

07 Oct 2014 / 0 Comments


How to Use Apple’s Touch ID for Two-factor Authentication

12 Sep 2014 / 0 Comments


Choosing the Best and Safest Two-factor Authentication Method

05 Sep 2014 / 0 Comments


Example for Apple’s Touch ID Fingerprint API for Swift and iOS

04 Sep 2014 / 0 Comments

Swift is the new programming language which was published by Apple in XCode 6. It can be used for Cocoa and Cocoa Touch, on iOS as well as on OS X. Swift code can be applied side-by-side with Objective-C. It is designed to assist developers in writing secure and reliable codes. This includes mechanisms which […]


Celebrity Photo Hack Points to Solution for Better Login Security

03 Sep 2014 / 0 Comments

SecSign 2FA