Cryptanalysis of Tso et al.'s Password Authentication Scheme Based on Smart Card

In 2015, Tso et al.'s demonstrated that the researchers password authentication scheme could not achieve the user anonymity property and do not allow changing password freely for the user. Then, they proposed a new method to remedy the weaknesses. However, this paper points out that Tso et al.'s scheme is still vulnerable to online password guessing attack and denial of service attack using stolen smart card unlike their claims. For this reason, Tso et al.'s scheme is insecure for practical application.

Spotlight

Orca Security

Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.

OTHER WHITEPAPERS
news image

The State of Ransomware 2022

whitePaper | April 20, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals working at the frontline has revealed an ever more challenging attack environment together with the growing financial and operational burden ransomware places on its victims. It also shines new light on the relationship between ransomware and cyber insurance, and the role insurance is playing in driving changes to cyber defenses.

Read More
news image

CyberSecurity Under Stress

whitePaper | August 11, 2022

SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compounded by significant recruitment and retention issues within cybersecurity.

Read More
news image

Guide to Cloud Security Posture Management Tools

whitePaper | June 16, 2023

Good cloud security hygiene starts with complete visibility into the security and compliance posture of every resource you deploy into your cloud. It’s one thing to achieve this visibility in a single cloud environment—you can lean heavily on the native monitoring and auditing tools of your cloud provider, using third-party solutions to fill in gaps (e.g., threat detection)—but in a multi-cloud architecture, maintaining robust cloud security posture becomes exponentially more complex. It is much more difficult to achieve centralized visibility as well as consistently enforce policies and compliance rules within a multi-cloud environment. It’s also more complicated to detect threats and fix vulnerabilities quickly due to the sheer complexity of threats across distributed, multilayered architectures. You can address these challenges, though—and you need to, if you want to take advantage of multi-cloud architecture without compromising on security.

Read More
news image

Security White Paper for Synappx Applications and Services

whitePaper | September 28, 2022

Synappx application services help bring smarter office experiences. They are designed to help optimize hybrid collaboration experiences. Synappx application services are protected by a robust, layered security system to ensure the system and its components are not opening points of vulnerability for your data or networks. Through a combination of world-class technology providers including Microsoft Azure, Google Workspace and security best practices, your use of the Synappx application services helps keep your information safe and secure while helping you enhance productivity in your office.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More

Spotlight

Orca Security

Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of all risks across the cloud. With continuous first-to-market innovations and expertise, the Orca Platform ensures security teams quickly identify and remediate risks to keep their businesses secure.

Events