A security researcher on the Duo Labs team details how he found several vulnerabilities in a wireless physical security system.
Here are some first impressions of a resident Apple nerd’s experience with the 2017 MacBook Pro with Touch Bar, including a review of the Secure Enclave Processor and Touch ID from a security perspective.
Now Facebook and Google Suite users can use a security key to authenticate and verify their identities during login.
A number of U.K.-based financial institutions were hit by a wave of financial banking malware, delivered via phishing email campaigns. Dridex is back this year with new techniques to bypass security and steal user data.
Recently, phishing attacks against Gmail users, a major U.S. financial services provider, and Android app users have revealed unique ways to deliver malware and steal login credentials.
Duo Labs researcher Mark Loveless explores the importance of attribution and how it can be helpful if your company is attacked.
Recent reports have discovered MongoDB instances being targeted with ransomware, with over 28,000 unique cases of ransomware from multiple actors targeting MongoDB hosts. Learn about exposed instances and get some helpful tips and resources on securing a MongoDB deployment.
Banking, insurance and other financial services must follow new cybersecurity regulation recently released by the New York State Dept. of Financial Services by March 1, 2017.
The Office for Civil Rights is conducting audits of healthcare providers and business associates. The goal is to assess HIPAA compliance efforts and discover new security risks.
Holiday travel tests your personal data security. It’s easier to keep your money, identity and tech safe with tips from Duo’s Senior Security Researcher.
Retailers and consumers can better secure payment data. Tactics like two-factor authentication and wireless payment technologies offer secure paths forward.
Infosec is constantly evolving. We asked one of our security researchers to share some of the most exciting projects to keep an eye on in 2017.
What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.
Duo Labs set out to measure how many Redis instances were exposed to the Internet and potentially vulnerable to attacks. Here is a brief summary of our findings.
Find out more about the latest three vulnerabilities affecting iOS devices, and how many enterprise endpoints and phones are susceptible to these exploits.