How to Protect Yourself From SIM Swapping Hacks

Here’s a guide on how to prevent and protect yourself against the threat of hackers taking over your phone number and going after your online accounts. Continue reading How to Protect Yourself From SIM Swapping Hacks

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the PEXA platform at settlement recently. We explain the most likely way the fraud occurred and what practical things you can do today to protect y… Continue reading Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Phishing 2FA Tokens with CredSniper – Tradecraft Security Weekly #25

Organizations are implementing two-factor on more and more web services. The traditional methods for phishing credentials is no longer good enough to gain access to user accounts if 2FA is setup. In this episode Mike Felch (@ustayready) and Beau Bulloc… Continue reading Phishing 2FA Tokens with CredSniper – Tradecraft Security Weekly #25

Post of the Week: Two-Factor Auth and SSO with BIG-IP

In this Lightboard Post of the Week, I answer a question about 2FA and SSO with AD/RSA on BIG-IP by creating a SSO Credential Mapping policy agent in the Visual Policy Editor, that takes the username and password from the logon page, and maps them to v… Continue reading Post of the Week: Two-Factor Auth and SSO with BIG-IP

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your d… Continue reading Data safety: The non-technical way

Lock Up Your Raspberry Pi with Google Authenticator

Raspberry Pi boards (or any of the many similar boards) are handy to leave at odd places to talk to the network and collect data, control things, or do whatever other tasks you need a tiny fanless computer to do. Of course, any time you have a computer on a network, you are inviting hackers (and not our kind of hackers) to break in.

We recently looked at how to tunnel ssh using a reverse proxy via Pagekite so you can connect to a Pi even through firewalls and at dynamic IP addresses. How do you stop a bad guy …read more

Continue reading Lock Up Your Raspberry Pi with Google Authenticator

Taking a U2F Hardware Key from Design to Production

Building a circuit from prototyping to printed circuit board assembly is within the reach of pretty much anyone with the will to get the job done. If that turns out to be something that everyone else wants, though, the job gets suddenly much more complex. This is what happened to [Conor], who started with an idea to create two-factor authentication tokens and ended up manufacturing an selling them on Amazon. He documented his trials and tribulations along the way, it’s both an interesting and perhaps cautionary tale.

[Conor]’s tokens themselves are interesting in their simplicity: they use an Atmel ATECC508A …read more

Continue reading Taking a U2F Hardware Key from Design to Production