authentication

Challenges of User Authentication: What You Need to Know

In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In…

2 years ago

Stolen OAuth tokens used to download data from dozens of organizations, GitHub warns

GitHub reported that threat actors used stolen OAuth user tokens to exfiltrate private data from several organizations. GitHub uncovered threat…

2 years ago

Microsoft rolled out emergency updates to fix Windows Server auth failures

Microsoft has released out-of-band security updates to address authentication issues affecting Windows Server. Microsoft has released out-of-band updates to fix…

2 years ago

The importance of computer identity in network communications: how to protect it and prevent its theft

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing…

3 years ago

Great news, now you can protect your Zoom account with 2FA

Zoom has implemented two-factor authentication (2FA) to protect all user accounts against security breaches and other cyber attacks. Zoom has announced…

4 years ago

A flaw in Microsoft OAuth authentication could lead Azure account takeover

A vulnerability in the Microsoft OAuth implementation exposes Azure cloud accounts to takeover. The vulnerability affects the way Microsoft applications…

4 years ago

Twitter allows users to use 2FA without a phone number

Twitter announced that its users can protect their accounts with 2-Factor Authentication (2FA) even if they don't have a phone…

4 years ago

Microsoft removes Password-Expiration Policy in security baseline for Windows 10

Microsoft presented a series of security enhancements for its Windows 10, including the removal of the password-expiration policy.  Microsoft announced…

5 years ago

Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale

Amnesty International warns of threat actors that are launching phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale Amnesty…

5 years ago

Flaw allowing identity spoofing affects authentication based on German eID cards

The authentication process via German eID cards with RFID chips is flawed, an attacker could impersonate any other citizen. The…

5 years ago

This website uses cookies.