Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent I… Continue reading Conditional Access Establishes Trust In the Network

Multi-Factor Authentication, New Attacks on 4G and 5G Mobile Networks

This is your Shared Security Weekly Blaze for March 4th 2019 with your host, Tom Eston. In this week’s episode: Multi-factor authentication to protect your credentials, and new attacks on 4G and 5G mobile networks. Protect your digital privacy wi… Continue reading Multi-Factor Authentication, New Attacks on 4G and 5G Mobile Networks

MFA: How to Eliminate Profile Fraud and Win the Fight for Consumer Trust

Social media sites are fraught with fake accounts and imposter profiles aimed at scamming money from innocent users or promoting fake products in support of illegal businesses. These fake accounts, on Facebook and various dating sites, have defrauded … Continue reading MFA: How to Eliminate Profile Fraud and Win the Fight for Consumer Trust

DHS prepares emergency order to prevent DNS hijacking

The Department of Homeland Security is preparing to issue a rare “emergency” directive ordering federal civilian agencies to secure the login credentials for their internet domain records, according to government officials familiar with the matter. DHS is expected to issue the order as soon as Tuesday, officials said, out of concern that federal agencies could be vulnerable to cyberattacks intended to gain access to the platforms used to manage domain name system (DNS) records. The DNS system, dubbed the “phone book of the internet,” translates a domain name to a valid IP address, sending a user to the website they are trying to access. Once compromised, a DNS server or registrar account can be used to redirect users to a malware-laden website. There are at least six civilian agency domains that have been affected by malicious DNS activity, according to people familiar with the matter. The emergency directive, which carries more urgency than DHS’s more-common Binding Operational […]

The post DHS prepares emergency order to prevent DNS hijacking appeared first on CyberScoop.

Continue reading DHS prepares emergency order to prevent DNS hijacking

The Rise and Fall of Enterprise Security Technology

Over the past few years “security” has become a buzzword across many industries, and for good reason. With the threat of data breaches haunting industry stalwarts, household brands and countless consumers, companies are paying more and more attention … Continue reading The Rise and Fall of Enterprise Security Technology

Hackers target ‘hundreds’ of Middle East activists with fake login pages, 2FA bypass schemes

Hackers have been going after email accounts of hundreds of Middle East-based human rights activists, journalists and others using methods that bypass security features of services like Google, Yahoo, ProtonMail and Tutanota, according to a report published Wednesday by Amnesty International. The human rights watchdog says its likely that a single group of hackers has been using clever pages that mimic secure login pages, as well as tricks that bypass two-factor authentication (2FA) to target accounts at least throughout 2017 and 2018. The targets are mostly in the United Arab Emirates, Egypt, Yemen and Palestine, the group said. “What makes these campaigns especially troubling is the lengths to which they go to subvert the digital security strategies of their targets,” the group says in the report. Amnesty International analyzes the activity as two separate campaigns. One uses fake pages that look like they belong to ProtonMail and Tutanota in order to get […]

The post Hackers target ‘hundreds’ of Middle East activists with fake login pages, 2FA bypass schemes appeared first on CyberScoop.

Continue reading Hackers target ‘hundreds’ of Middle East activists with fake login pages, 2FA bypass schemes

Sneaky phishing campaign beats two-factor authentication

Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure. Continue reading Sneaky phishing campaign beats two-factor authentication

DerbyCon, Russians, and Next Story – Paul’s Security Weekly #578

New Apple and Microsoft security flaws at Black Hat Europe, CCTV makers leaves at least 9 million cameras public, upset Google+ users are sueing Google, US weapons systems apparently can be easily hacked, not all multifactor authentication is created e… Continue reading DerbyCon, Russians, and Next Story – Paul’s Security Weekly #578