Facebook Hardens Authentication

facebookFacebook recently announced an improvement to it’s logon system.  Login security seems to be taking a position from and center lately.  Wednesday we wrote about Yahoo’s new authentication system, and today we will move on to Facebook’s Login Approvals.

Previously, Facebook users were able to get Login Notifications. When you entered your user name (usually your email address) and password from a new location, browser, or device, Facebook Notifications would send users an ...

Continue Reading →
0

Google Apps Features Single Sign-On

google-logoIf you are having trouble managing “all those passwords” for your online resources, one solution would be to use a password manager like LastPass or Dashlane.  Google has come up with a single sign-on (SSO) product that not only will log you into all your Google apps (Gmail, Voice, Blogger, YouTube, Apps, Drive, Analytics, AdWords, etc) but  also integrates access into 17 other ...

Continue Reading →
0

Comcast Subscribers: Change Your Password

comcastAccording to a post on Sophos, Comcast has reset the passwords on 200,000 customers after a security researcher discovered an advertisement on the Dark Web offering to sell 500,000 Comcast passwords in pain text for $1000 in BitCoin.  Investigation by Comcast found that “only” 200,000 of there accounts were active and proactively reset the passwords on all the affected accounts.  Comcast ...

Continue Reading →
0

Buy Your Password From 11-Year Old Girl?

Would you buy your password from an 11-year old girl?  I would, and maybe you should, too.  Mira Modi, an 11-year old New Yorker, has very very cool service called Diceware.  Using a technique developed by Arnold Reinhold, Mira uses dice to come up with a unique 6 word passphrase, which she will send to you in the US Mail.  Her fee is two bucks.

Understanding that passwords are cracked by cyber-criminals one of two ways, either ...

Continue Reading →
0

How Secure Is Your Smartphone?

smartphone-securityI read an article recently on Dark Matters, by Bob Monroe, that talked about smartphones from the perspective on an attacker – just how good of an attack surface is your average smartphone?  Pretty good, as it turns out, which is not so good for you and me.

The first problem is that these little computers are very chatty.  If they are turned on, they are talking to the nearest cell ...

Continue Reading →
0

What To Do When Your Personal Information Is Breached

penetration_test_436x270We recently learned that credit report service Experian had a breach of T-Mobile customer information.  This is just another addition to the pile of Personally Identifying Information (PII) that has been exfiltrated from sundry organizations including the Office of Personnel Management, various BlueCross BlueShield organizations, and Harvard University.

So what to do when this happens to you?  When you are notified by the offending ...

Continue Reading →
0

Word and Excel Macro Viruses Are Back

macro-virusUsing BASIC or Visual BASIC programming scripts can add automation and other functions to documents created in the Microsoft Office productivity suite of products.  Unfortunately, this feature can be used by cyber-attackers to send malware exploits in otherwise innocuous looking documents that most people would open without a second thought.

The macro virus goes back to 1995, the most infamous being the Melissa email macro virus that $80 million in damages to US ...

Continue Reading →
0

000Webhost Loses Plaintext Passwords

000WebHost

This comes under the heading of “know who you are doing business with.”  Web hosting company 000webhost.com was breached this week and over 13 million customer records were stolen and posted for sale on the Internet.  The data includes customer names, emails and passwords in plaintext  (meaning the passwords were unencrypted).  Storing passwords in an unencrypted form should be a criminal act in itself, ...

Continue Reading →
0
Page 49 of 58 «...2030404748495051...»