With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?
2019 password security report shows that even though businesses are increasingly adopting MFA and password generator solution, the passwords are still not strong enough or being reused between different accounts.
CCPA pioneered a strong mandate for data privacy and security in the US, and now SB-327 is focusing on securing IoT devices. However, an opportunity was missed to ditch passwords altogether and advocate for a stronger method of authentication.
Owner of a botnet has leaked the access credentials for more than 515,000 servers and claimed they were changing business models to make use of cloud service providers instead.
Reddit hack shows that the industry standard two-factor authentication approach in certain cases might not offer as much protection of vulnerable data as has long been thought.
Honeypots set up by Sophos logged a staggering amount of scripted attacks attempting to pass default credentials. What’s more alarming is the aggressive speed and scale of these attempts with the first attack in less than 60 seconds.
Remote working is rapidly increasing in current pandemic situation but every remote connection creates a new access point that hackers can exploit. What can you do to fully minimize the risks?
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials.
State Farm, the insurance giant with more than 83 million customers, was hit by a credential stuffing attack with unknown number of customer accounts compromised.
A new phishing attack started to surface where hackers leverage on Microsoft OAuth apps to steal user credentials from SharePoint and OneDrive users using official Office 365 login page.