Jailbreak Detector Detector: An Analysis of Jailbreak Detection Methods and the Tools Used to Evade Them
An overview of methods used in the wild to detect jailbreaks, as well as methods used to evade detection.
An overview of methods used in the wild to detect jailbreaks, as well as methods used to evade detection.
The new Guide to Web Authentication aims to provide a useful developer resource for engaging with WebAuthn to replace or supplement password-based authentication on your own websites.
The latest evolution in phishing is the Modlishka tool, which provides the attacker a simple tool to use a reverse proxy to place the attacker between the user and the target site. The user’s traffic passes through the tool and can capture SMS-based 2FA tokens. Here, we look at how to counter modern phishing attacks with strong 2FA and a defense in depth strategy.
The Department of Homeland Security (DHS) made a curious announcement during the shutdown that had everyone scratching their collective heads ... at first. DHS gave agencies 10 days to get their account security in order, specifically calling out two-factor authentication (2FA) and other protections due to DNS hijacking vulnerabilities.