Just like real fishing, criminals engaged in phishing dangle tempting bait in front of users in the hope that they can lure them into revealing their login credentials. If you have an email account, you’ve received at least one real looking email, seemingly from a financial institution like a bank or Paypal, asking you to provide your user name, password, or social security number.
To understand how to protect your data and accounts, it's helpful to know common ways in which your passwords and credentials could be stolen and used against you.
While it’s easy to understand how such major organizations might be specifically targeted, today, every organization on the Internet is as much a target of chance, as a target of choice.
Attackers were once able to bypass Google's two-step verification to gain account control by capturing a user's application-specific password (ASP).
In the spirit of year-end reviewing and wrapping up, we've been conferring with the ghosts of security trends past, present, and future. One of the most notable trends we've seen is that 2012 was the year in which two-factor authentication really broke out of the security community. Learn more
So what can a security minded online shopper do, other than giving up the convenience and selection of online shopping? Here are a few of our best tips for protecting your online identity from your online shopping when strong authentication options aren’t available.
The topic of trust is something near and dear to us at Duo, as we've designed our platform from the ground-up to place as minimal trust in our service as necessary and are continually working to further host-proof our service.
In case you haven't heard, LastPass, everyone's favorite browser-based password manager, posted an unsettling blog post yesterday detailing an anomalous event that occurred Tuesday morning on their infrastructure.
Massive, Internet-scale compromise has taken many forms over the years. But it's probably never been easier than today.