Nine SCM Microsystems smart card readers have been approved for use at federal agencies. The HSPD-12 compliant readers have made the U.S. Government Services Administration’s approved product list.
AUBURN, Maine, March 11, 2010 /PRNewswire/ — Dirt, oils and other contaminants are introduced into a card reader everytime a credit card is inserted. For the read contacts to properly access thesmart ...
Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government ...
SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, is expanding its smart card reader product family with three new models. The new handheld, USB or ...
Santa Clara, Calif. (January 2, 2024) – SecuGen, an optical fingerprint device and technology vendor, is pleased to announce the immediate availability of the new SecuGen IQ SC1 contact smart card ...
This application note describes the software implemented in both TDA8029 mask 06 (TDA8029HL/C206) and TDA8029 mask 07 (TDA8029HL/C207) in order to handle a communication between a system controller ...
The malware uses a special driver to share local USB devices over TCP/IP with the attacker's computer, researchers say A team of researchers have created a proof-of-concept piece of malware that ...
Years before Steve Jobs showed off the first iPhone, the BlackBerry was already the must-have accessory for mobile professionals. Back then, nobody was worried about watching movies or playing the ...
It was supposed to help check electoral fraud, but it has ironically become a problem. The Independent National Electoral Commission (INEC) introduced the smart card reader in the 2015 general ...
A team of researchers has created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet. The malware ...
The basic password is the single biggest hole in network computing. Most network breaches are the result of hackers cracking simple passwords. Growing security concerns have enterprise network ...