Dropbox says it was phished – simple as that. As a result, the attacker had access to 130 of its code repositories and downloaded a wide range of information. Dropbox has been very transparent about this, but it is both embarrassing and damaging to the company. The hackers socially engineered an employee to give up […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google Decreased Account Takeovers by 50% by Mandating 2FA Late last year Google forced about a hundred fifty million users to start using multi-factor authentication. What results did they see? Account takeovers in that group were reduced by 50%. Google has previously said that only 10% of their users were using MFA. Now they are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you use multi-factor authentication? Google says that less than 10 percent of its users use MFA. They were concerned that if they made people use MFA they would leave. Not sure what they would leave to? Who else offers as compelling a suite of software. For free. Or at least just for stealing all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This falls into the “well, it is about time” category. While text message based two factor authentication is, by far, the most popular method of two factor authentication, Microsoft said it should be avoided, along with voice based two factor authentication. Why? Is two factor authentication bad? Or useless? No, none of the above. It […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As hackers got better, so did developers. Multi-Factor authentication, a technique which requires something that you know, like a password and something that you have, like an SMS message on your phone, makes the lives of crooks harder, but far from impossible to attack and here is why. One way this is done is via […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many Cyberspace Solarium Commission Recommendations Likely to Become Law The Cyberspace Solarium Commission was a blue ribbon commission that made recommendations to Congress earlier this year on improving government cybersecurity. It appears that many of their recommendations are being added to the National Defense Authorization Act, which is “must pass” bill to fund the military. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]