Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

If you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall prey to phone authentication scams. That’s not to say 2FA itself is a problem. You should keep using it, and many groups have turned […]

The post Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams appeared first on Security Intelligence.

Continue reading Beyond Text Messages: How to Secure 2FA Against Phone Authentication Scams

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.

The post Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP appeared first on Security Intelligence.

Continue reading Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

iOS 10 and macOS Sierra: Five Factoids for IT

As Apple prepares to release iOS 10 and macOS Sierra on Sept. 7, mobile technology enthusiasts are eagerly anticipating many exciting new features.

The post iOS 10 and macOS Sierra: Five Factoids for IT appeared first on Security Intelligence.

Continue reading iOS 10 and macOS Sierra: Five Factoids for IT

Look Who’s Calling: The Rise of the Robocalls

The FTC is fighting back against annoying and criminal robocalls, which have been made possible thanks to the growth of voice-over-IP (VoIP) technology.

The post Look Who’s Calling: The Rise of the Robocalls appeared first on Security Intelligence.

Continue reading Look Who’s Calling: The Rise of the Robocalls