Removing TFA from an Account in Authenticator

google-authenticatorGoogle Authenticator is my favorite go-to app for setting up two-factor authentication.  But what if you want to remove an account from Google Authenticator?

I set up two-factor authentication for Facebook and the Authenticator app did not work.  So I tried again, and ended up with two accounts on the Authenticator list, neither of which worked.  This pushed other working accounts down far enough ...

Continue Reading →
0

Two Factor Authentication for WordPress

Hardening and securing WordPress websites is one of my specialties.  We have reported previously on three of the best WordPress security plugins, Sucuri, Bulletproof, and WordFence.  I can tell you that each of these plug-ins performed admirably against the continuous barrage of brute force and password reset attacks that my sites have endured.  Security appeared to be strong, but I wanted more.

I have been deploying two-factor authentication (TFA) everywhere I can, in order to overcome the inherent weakness of password ...

Continue Reading →
0

Fake Tech Support Claims To Be From Your ISP

We have all received a fake tech support call from someone claiming to be a Microsoft employee.  Now there is a new twist on the scam involving a fake screen pop-up and tech support fakers who claim to be from your Internet service provider.  Google has an extensive collection of fake tech support pop-ups, these are all fake.  Take a look.

We have reported on this issue several times in this blog.  Like here and here and ...

Continue Reading →
0

Personal Privacy Through Email Encryption

encrypted-emailOne of the easiest ways for an intruder to learn about you is through a compromised email account.  And since most email is transmitted in the clear or in plain text, it is a simple thing for a bad actor to read intercepted email traffic.  Encrypting your email makes it harder for criminals, competitors, law enforcement, and government spy agencies to read your email messages.

You can set up secure email yourself ...

Continue Reading →
0

Business Email Compromise Report from FBI

image_thumbI very rarely will publish a news item or statistics, because we focus on discussing vulnerabilities, exploits, and countermeasures and leave the cyber news to others.  This report is important enough I had to share it.

On June 14th the Internet Crime Complaint Center of the FBI reported loss numbers for businesses that succumbed to the “Business Email Compromise” scam.  This scam works when an attacker is able to get ...

Continue Reading →
0

Happy Independence Day

yorktown-surrenderTwo hundred and forty years ago a bunch of “terrorists” (one man’s terrorist is another man’s freedom fighter) signed the Declaration of Independence in Philadelphia, Pennsylvania, and declared the founding of a new nation “conceived in liberty, and dedicated to the proposition that all men are created equal.”

Not everybody in the colonies was in favor of the concept of independence.  There were many British born citizens of the colonies who we ...

Continue Reading →
0

Mac Users Targeted By Cyber-Attackers

applelogoThe Apple OSX platform has long held the cache of being invulnerable to attack.  Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012.  The reason for this, as explored in a recent article on SiliconBeat, is that Apple users tend to have more disposable income.  If you willingly pay more to have “the best” or ...

Continue Reading →
0
Page 195 of 278 «...170180190193194195196197...»