Quantcast
Channel: Two-Factor Authentication (2FA) – Security Intelligence
Browsing latest articles
Browse All 10 View Live

New Android Malware Channels Malicious Activity Through Accessibility Services

Security researchers uncovered a new Android malware strain called “DEFENSOR ID” that channels its malicious activity through a device’s Accessibility Services. In its analysis, ESET observed DEFENSOR...

View Article


Discord Client Modified to Steal Users’ Plaintext Passwords

Security researchers observed the “AnarchyGrabber3” malware modifying the Discord client to steal its victims’ plaintext passwords. As reported by Bleeping Computer, a threat actor released a new...

View Article


#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach...

View Article

Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

If you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall...

View Article

Does Multifactor Authentication Keep Your Remote Workers Safe?

Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high...

View Article


How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all...

View Article

Over 1,200 phishing kits found in the wild with ability to Steal 2FA codes

Academics discovered more than 1,200 phishing kits equipped with the ability to intercept users’ two-factor authentication (2FA) codes in the wild. Two types of 2FA phishing As noted by researchers...

View Article

The cybersecurity takeaway from Twitter’s verification chaos

Twitter has been verifiably bonkers since electric car and rocket mogul Elon Musk took over and reworked the social network’s long-standing verification system. This provides a valuable lesson about...

View Article


Is it time to start hiding your work emails?

In this digital age, it is increasingly important for businesses to be aware of their online presence and data security. Many companies have already implemented measures such as two-factor...

View Article


Are Meta and Twitter making cybersecurity less accessible?

Customers pay for additional features along with their purchases all the time. You can upgrade a car’s seats from fabric to leather, or pay for more analytics on a marketing automation platform. But...

View Article
Browsing latest articles
Browse All 10 View Live