December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,849 hits
Tag Archives: two-factor
LinkedIn Breach Data Leaked
Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2012, 2016, 2fa, cybercrime, hacked, hackers, information security, linkedin, passwords, security, Security Awareness, two-factor
Comments Off on LinkedIn Breach Data Leaked
Worst Passwords of 2015
2015’s most used cracked passwords ranked by popularity… Yes, people still use bad passwords, despite the warnings to have some complexity. Perhaps we should code systems to reject simple passwords? 1. 123456 (UNCHANGED) 2. PASSWORD (UNCHANGED) 3. 12345678 (UP 1) … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2015, 2016, authentication, password, passwords, two-factor
Comments Off on Worst Passwords of 2015
Happy Two-Factor Tuesday!!!
Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading
Posted in Security Blog
Tagged 2015, cyber risk, NCSAM, passwords, risk, security, Security Awareness, two-factor
Comments Off on Happy Two-Factor Tuesday!!!
Smartphone Enabled ATMs
BMO Harris Bank is launching the U.S.’s biggest cardless ATM network that allows customers to withdraw cash within seconds, using nothing but their smartphones! If your phone is lost or stolen, the bank can remotely remove the app. No card … Continue reading
Posted in Security Blog
Tagged 2015, BMO, cardless ATMs, Reducing Fraud, two-factor
Comments Off on Smartphone Enabled ATMs
SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China
The FBI was brought in to investigate The Scoular Company after the controller wired $17.2 million dollars to China through their accounting firm, KPMG. There were emails to the controller from an email address that resembled but was not the … Continue reading
Posted in Security Blog
Tagged Information Technology Security Awareness, Omaha, phishing, Scoular, Security Awareness, social engineering, spear phishing, spearphishing, two-factor
Comments Off on SpearPhishing in Omaha Tricked a Financial Controller to send $17.2 Million to China
Worst Passwords of 2014
An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading
Posted in Security Blog
Tagged 2014, 2015, authentication, Information Technology Security Awareness, passwords, reputational security, two-factor
Comments Off on Worst Passwords of 2014
LinkedIn Phishing
There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading
Posted in Security Blog
Tagged 2 factor, 2015, linkedin, passwords, phishing, social engineering, two-factor
Comments Off on LinkedIn Phishing
Protecting Personal Information
Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, passwords, Protect Your Personal Information, two-factor
Comments Off on Protecting Personal Information
Stealing Biometrics & Bypassing Authentication
Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading
Posted in Security Blog
Tagged 2015, biometrics, Chaos Computer Club, facial recognition, fingerprints, hackers, hacking, Information Technology Security Awareness, Jan Krissler, proof of concept, retina, two-factor, video tutorial
Comments Off on Stealing Biometrics & Bypassing Authentication
JP Morgan Follow Up: 2 Factor Authentication Fail
Back in October, I wrote about JP Morgan getting breached, and 76 million households and 7 million small businesses were affected. (83 Million in total) Most big banks use two-factor authentication, which requires a second one-time password to gain access … Continue reading
Posted in Security Blog
Tagged 2014, breach, Chase, computer security, JPMorgan, two-factor
Comments Off on JP Morgan Follow Up: 2 Factor Authentication Fail