• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   two-factor authentication

Two-Factor Authentication and SMS Messages: Don’t Let The Perfect Be The Enemy Of The Good

  • Posted on:August 2, 2016 at 1:05 am
  • Posted in:Social
  • Author:
    Jonathan Leopando (Technical Communications)
0

Last week, a lot of tech media sites were breathlessly reporting how the National Institute of Science and Technology in the United States was saying that two-factor authentication (2FA) via SMS messages would be “deprecated” in future standards. Some took this to mean that this technique was insecure, and that users should shy away from this method. Let’s step back and see what the NIST really said:

Read More
Tags: 2FANISTtwo-factor authentication

Investigating Twitter Abuse, Part 3

  • Posted on:October 14, 2014 at 5:16 pm
  • Posted in:Social, Spam
  • Author:
    Jon Oliver (Senior Architect)
0

In the two previous parts of this series of blog posts, we discussed the kinds of threats that we’re seeing on Twitter, as well as the scope and scale of these threats. In this part, we will discuss their motivations, and what end users can do. The first question is: why do cybercriminals bother doing…

Read More
Tags: BotMakerphishingsocial mediaSpamTwittertwo-factor authentication

Finding Holes in Banking Security: Operation Emmental

  • Posted on:July 22, 2014 at 4:10 am
  • Posted in:Malware, Mobile
  • Author:
    David Sancho (Senior Threat Researcher)
0

Like Swiss Emmental cheese, the ways your online banking accounts are protected might be full of holes. Banks have been trying to prevent crooks from accessing your online accounts for ages. Passwords, PINs, coordinate cards, TANs, session tokens – all of these were created to help prevent banking fraud. We recently come across a criminal…

Read More
Tags: Operation Emmentalsession tokenstwo-factor authentication

Two-Factor Authentication: Something To Consider

  • Posted on:June 12, 2013 at 11:27 am
  • Posted in:Social
  • Author:
    Jonathan Leopando (Technical Communications)
1

The past few weeks have seen some very high-profile sites adopt two-factor authentication in one form or another. First was Twitter, followed soon by Evernote and Linkedin. For users of these sites, these represent a welcome improvement to their security. In the event that their password is (somehow) compromised, an attacker faces another barrier before…

Read More
Tags: data protectionevernoteinformation securityLinkedInTwittertwo-factor authentication

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.