Twitter, tightening security, stops requiring phone numbers for authentication

Twitter says it will allow users to remove their phone numbers from the secure login process, a move that has triggered widespread praise from the security community. Users can now use a one-time code, an app or a physical security key to as a second factor of authentication into their account. Before Thursday, Twitter customers trying to login in a secure way only could enter their username and password, then ask the site to send them an SMS message to verify their identity. The company also forced users who did use a third-party authentication app to use their phone number to sign up. Facebook announced in May 2018 it would stop requiring phone numbers for multi-factor authentication. Now, amid a growing body of evidence hackers can subvert text-based authentication, Twitter is expanding its options. We’re also making it easier to secure your account with Two-Factor Authentication. Starting today, you can […]

The post Twitter, tightening security, stops requiring phone numbers for authentication appeared first on CyberScoop.

Continue reading Twitter, tightening security, stops requiring phone numbers for authentication

How to Explain Cybersecurity and Improve User Behavior at the Same Time

Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.

The post How to Explain Cybersecurity and Improve User Behavior at the Same Time appeared first on Security Intelligence.

Continue reading How to Explain Cybersecurity and Improve User Behavior at the Same Time

Twitter: We accidentally used security data to target users with ads

Twitter announced Tuesday that email addresses and phone numbers used to secure accounts had accidentally been used for advertising purposes. In a blog post, the company says the addresses and numbers were used in its “Tailored Audiences” product, which allows advertisers to target ads to customers based on the advertiser’s own marketing lists. “When an advertiser uploaded their marketing list, we may have matched people on Twitter to their list based on the email or phone number the Twitter account holder provided for safety and security purposes,” the blog states. “This was an error and we apologize.” Twitter does not know how many people were impacted by the error. The company says no data was shared with third parties that used the Tailored Audiences feature. Twitter users share phone numbers with the company for security purposes, particularly for its two-factor authentication feature. With that feature, Twitter sends a code to […]

The post Twitter: We accidentally used security data to target users with ads appeared first on CyberScoop.

Continue reading Twitter: We accidentally used security data to target users with ads

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there’s no silver-bullet solutions, the world of magic offers insights for effective malware prevention.

The post Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention appeared first on Security Intelligence.

Continue reading Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art.

The post The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication appeared first on Security Intelligence.

Continue reading The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication

Why Cybercriminals Are Targeting Travel and Transportation

Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.

The post Why Cybercriminals Are Targeting Travel and Transportation appeared first on Security Intelligence.

Continue reading Why Cybercriminals Are Targeting Travel and Transportation

Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.

The post Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication appeared first on Security Intelligence.

Continue reading Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

How to Make Third-Party Risk Management Second Nature

Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.

The post How to Make Third-Party Risk Management Second Nature appeared first on Security Intelligence.

Continue reading How to Make Third-Party Risk Management Second Nature

Long Live the Password — Even if You Don’t Want It To

To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.

The post Long Live the Password — Even if You Don’t Want It To appeared first on Security Intelligence.

Continue reading Long Live the Password — Even if You Don’t Want It To