As hackers got better, so did developers. Multi-Factor authentication, a technique which requires something that you know, like a password and something that you have, like an SMS message on your phone, makes the lives of crooks harder, but far from impossible to attack and here is why. One way this is done is via […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many Cyberspace Solarium Commission Recommendations Likely to Become Law The Cyberspace Solarium Commission was a blue ribbon commission that made recommendations to Congress earlier this year on improving government cybersecurity. It appears that many of their recommendations are being added to the National Defense Authorization Act, which is “must pass” bill to fund the military. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
9 Years of AMD Processors Vulnerable to 2 New Side-Channel Attacks AMD processors from as early as 2011 to 2019 carry previously undisclosed vulnerabilities that open them to two new different side-channel attacks, according to a freshly published research. Known as “Take A Way,” the new potential attack vectors leverage the L1 data (L1D) cache […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers have figured out how to attack Office 365 and Google G-Suite accounts protected by Multi Factor Authentication (MFA). No, this is not a bug in some software and no it is not hyper-sophisticated attack. In fact, it is very old school. First, as best I understand, it is a limited attack so it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]