Is It Time to Start Hiding Your Work Emails?

In this digital age, it is increasingly important for businesses to be aware of their online presence and data security. Many companies have already implemented measures such as two-factor authentication and strong password policies – but there is still a great deal of exposure regarding email visibility. It should come as no surprise that cyber […]

The post Is It Time to Start Hiding Your Work Emails? appeared first on Security Intelligence.

Continue reading Is It Time to Start Hiding Your Work Emails?

The Cybersecurity Takeaway from Twitter’s Verification Chaos

Twitter has been verifiably bonkers since electric car and rocket mogul Elon Musk took over and reworked the social network’s long-standing verification system. This provides a valuable lesson about the link between verification or authentication and between security and usability.  It all started in early October when Musk closed the Twitter deal and claimed that […]

The post The Cybersecurity Takeaway from Twitter’s Verification Chaos appeared first on Security Intelligence.

Continue reading The Cybersecurity Takeaway from Twitter’s Verification Chaos

How to Keep Your Secrets Safe: A Password Primer

There are two kinds of companies in the world: those that have been breached by unethical hackers, and those that have been breached and don’t know it yet. Hackers are relentless. Today’s cyberattacks have evolved into high-level espionage perpetrated by robust criminal organizations or nation-states. In the era of software as a service (SaaS), enterprise […]

The post How to Keep Your Secrets Safe: A Password Primer appeared first on Security Intelligence.

Continue reading How to Keep Your Secrets Safe: A Password Primer

How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging […]

The post How to Fix the Big Problems With Two-Factor and Multifactor Authentication appeared first on Security Intelligence.

Continue reading How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Google to make multi-factor authentication its default mode

Google will soon enroll users into multi-factor authentication by default, the technology giant said on Thursday. In a blog post commemorating World Password Day, the company announced the move to make users sign in via a second step after entering a password, such as a phone app. “Today we ask people who have enrolled in two-step verification (2SV) to confirm it’s really them with a simple tap via a Google prompt on their phone whenever they sign in. Soon we’ll start automatically enrolling users in 2SV if their accounts are appropriately configured,” wrote Mark Risher, director of product management, identity and user security. “Using their mobile device to sign in gives people a safer and more secure authentication experience than passwords alone.” While multi-factor authentication isn’t entirely foolproof, and users will be allowed to opt out, Google’s embrace of automatically enrollment could be a big security boon. Microsoft said its […]

The post Google to make multi-factor authentication its default mode appeared first on CyberScoop.

Continue reading Google to make multi-factor authentication its default mode

Does Multifactor Authentication Keep Your Remote Workers Safe?

Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high that eight-hour window will soon be even shorter. To combat this, many companies added multifactor authentication (MFA) into their […]

The post Does Multifactor Authentication Keep Your Remote Workers Safe? appeared first on Security Intelligence.

Continue reading Does Multifactor Authentication Keep Your Remote Workers Safe?

Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

If you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall prey to phone authentication scams. That’s not to say 2FA itself is a problem. You should keep using it, and many groups have turned […]

The post Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams appeared first on Security Intelligence.

Continue reading Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

Twitter bolsters security for political accounts as election looms

Just weeks away from the U.S. presidential election, Twitter says it is taking extra steps to secure high-profile accounts, such as political campaigns and major news outlets, whose compromise could impact voter perceptions. Twitter began rolling out the new security features, such as strong password requirements, on Thursday to the election-related accounts, including secretaries of state overseeing the vote and federal agencies and lawmakers. Accounts will be “strongly encouraged” to use two-factor authentication to prevent hacking, the social media platform said. In the weeks ahead, Twitter said it would implement “more sophisticated detections and alerts” to keep hackers from breaking into accounts. The eleventh-hour move to heighten account security reflects what Twitter executives described as the “unique sensitivities of the election period.” Four years ago, Russian bots and trolls spread disinformation on Twitter in a bid to damage Hillary Clinton’s campaign and boost Donald Trump. This year, U.S. intelligence agencies […]

The post Twitter bolsters security for political accounts as election looms appeared first on CyberScoop.

Continue reading Twitter bolsters security for political accounts as election looms

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Biden, […]

The post #TwitterHack: Power, Privilege and Pandemic appeared first on Security Intelligence.

Continue reading #TwitterHack: Power, Privilege and Pandemic

A malicious Android app is trying to scam Brazilian bank customers

Brazil’s financial sector, which has long grappled with cybercrime, has a new foe. An insidious Android application is trying to steal users’ login credentials, and their money, by impersonating Brazilian banks, researchers from IBM Security said Tuesday. The malicious code is designed to steal the text messages that people use as a secondary security measure to log into their bank accounts. While focused on Brazil, the code could be repurposed to target banking sectors elsewhere, the researchers warned. It is the latest hacking tool to be aimed at Brazil’s financial sector, which has had to contend with cybercrime for years. “Malware of this type is extremely simple to redirect to other regions by changing the target list and embedded screens, thereby modifying its attack turf and potential targets,” IBM researchers Ben Wagner and Limor Kessem wrote in a blog post. Some of the Brazilian banks targeted operate in Spain, Portugal and across Latin […]

The post A malicious Android app is trying to scam Brazilian bank customers appeared first on CyberScoop.

Continue reading A malicious Android app is trying to scam Brazilian bank customers