two-factor authentication

The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account?…

13 years ago

iCloud two-factor protection, security flaw or deliberate choice?

iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to…

13 years ago

Two-factor authentication, necessary but not sufficient to be safe

Adoption of a two-factor authentication process is necessary  to increase the robustness for authentication processes, but security is a process…

13 years ago

To be or not to be… This is Authentication

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on…

13 years ago

This website uses cookies.