Microsoft and CNN were both breached by means of social engineering and stolen user credentials - where was two-factor authentication in these situations?
> IOActive Labs recently found that most iOS mobile banking applications are susceptible to major security vulnerabilities, after testing 40 different iOS banking apps used by 60 different banks in 20 different countries.
We're happy to announce availability of Duo Unix packages for Linux and also a Puppet module for easier automated installation!
Read on for a deep dive into variants of POS malware, ways they can infect systems, the type of data they steal, and how two-factor authentication could effectively thwart attackers from stealing retail company customer data.
Duo Security to Exhibit and Present at the 2014 RSA Conference Press and Events / Featured Article
> At the end of February, Duo Security will be exhibiting and speaking at one of the largest information security conferences in the world, the 2014 RSA Conference in San Francisco, California!
Hosted monthly at Duo Security's Ann Arbor office, Duo Tech Talks will cover a variety of topics of strong interest to the local technology community. Speakers will be enlisted both from the local community and subject matter experts from across the country.
Google's Android Bouncer was intended to shore up weaknesses of the Android Market by testing applications within a dynamic analysis environment to determine application security. In this talk, Jon Oberheide of Duo Security and his colleague Charlie Miller discussed their methods of bypassing Bouncer.
Duo Security has been shortlisted for the 2014 Cloud Award for Security Innovation of the Year! Since 2011, the Cloud Awards has been celebrating and promoting cloud innovation and excellence exemplified by consultancies, solutions providers, start-ups and more.
> While healthcare has long been lagging when it comes to standardizing and updating technology industry-wide, the final HIPAA omnibus rule released last year has not only healthcare organizations rushing to meet compliance, but also other health IT vendors that now fall under the scope of the revised rule.
Best of 2013: Duo Security's Year of Excellence in InfoSec Industry News / Featured Article
As we ring in the new year, it’s the perfect time to take a look back at Duo Security’s most notable 2013 milestones. The following blogs chronicle one great year leading the information security industry, from finding fixes for major Android vulnerabilities to attending the top hacker conventions, to signing on a major social media giant, and more - we’d like to give three cheers to our awesome year in 2013, and here’s to many more!