#two-factor-authentication

[ follow ]
#cybersecurity
Information security
fromThe Verge
8 months ago

YubiKeys have an unfixable security flaw

YubiKey devices have a vulnerability that allows cloning, discovered in the Infineon cryptographic library, affecting many models and with moderate exploit difficulty.
fromArs Technica
8 months ago
Information security

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel

The YubiKey 5 has a cryptographic flaw allowing cloning, posing a serious security risk for two-factor authentication.
fromLondon On The Inside
8 months ago
Privacy professionals

5 Online Security Tips You Might Not Know

Advanced online security measures are essential to safeguard against cyber threats beyond basic practices like strong passwords.
fromTechRepublic
9 months ago
Information security

What Is Two-Factor Authentication? | TechRepublic

Implementing two-factor authentication is crucial in combating growing cybersecurity threats and protecting organizations and individuals from attacks.
Information security
fromThe Verge
8 months ago

YubiKeys have an unfixable security flaw

YubiKey devices have a vulnerability that allows cloning, discovered in the Infineon cryptographic library, affecting many models and with moderate exploit difficulty.
fromArs Technica
8 months ago
Information security

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel

The YubiKey 5 has a cryptographic flaw allowing cloning, posing a serious security risk for two-factor authentication.
fromLondon On The Inside
8 months ago
Privacy professionals

5 Online Security Tips You Might Not Know

Advanced online security measures are essential to safeguard against cyber threats beyond basic practices like strong passwords.
fromTechRepublic
9 months ago
Information security

What Is Two-Factor Authentication? | TechRepublic

Implementing two-factor authentication is crucial in combating growing cybersecurity threats and protecting organizations and individuals from attacks.
more#cybersecurity
#data-breach
Information security
fromThe Verge
2 months ago

Zapier says someone broke into its code repositories and may have accessed customer data

Unauthorized access to Zapier code repositories occurred due to a 2FA misconfiguration, exposing some customer information but not affecting critical systems.
fromSilicon Canals
6 months ago
Privacy professionals

Cloud security: Why two-factor authentication isn't enough

The Snowflake breach highlights critical vulnerabilities in two-factor authentication, indicating a need for stronger security measures in the rapidly growing cloud services market.
Information security
fromThe Verge
2 months ago

Zapier says someone broke into its code repositories and may have accessed customer data

Unauthorized access to Zapier code repositories occurred due to a 2FA misconfiguration, exposing some customer information but not affecting critical systems.
Privacy professionals
fromSilicon Canals
6 months ago

Cloud security: Why two-factor authentication isn't enough

The Snowflake breach highlights critical vulnerabilities in two-factor authentication, indicating a need for stronger security measures in the rapidly growing cloud services market.
more#data-breach
Digital life
fromComputerworld
6 months ago

18 Android settings that'll strengthen your security

Enhancing security on Android devices requires using features like NFC lock, Extend Unlock, and two-factor authentication for better protection of personal data.
[ Load more ]