Security news that informs and inspires

All Articles

1660 articles:

Website Security: Protecting Against Spammers

There’s been a 32 percent increase in hacked sites from 2015 to 2016, with no expectations of the trend slowing down, according to Google. Here are some of the top ways that websites get hacked, and what you can do to protect your site against spammers.

Website Security, Spammers, Phishing, Brute Force, Duo Beyond

Securing Access After the Cloudflare Bug & Data Leaks

The Cloudflare data leak impacted several sites using the popular CDN. Resetting session tokens and enabling 2FA can help affected sites protect their users' credentials.

Data Breaches, 2fa, Access Security, Cloud

Flipping Bits and Opening Doors: Reverse Engineering the Linear Wireless Security DX Protocol

A security researcher on the Duo Labs team details how he found several vulnerabilities in a wireless physical security system.

Reverse Engineering, Dx Protocol, Wireless Security, Labs Research

You Got the Touch: First Impressions of the 2017 MacBook Pro

Here are some first impressions of a resident Apple nerd’s experience with the 2017 MacBook Pro with Touch Bar, including a review of the Secure Enclave Processor and Touch ID from a security perspective.

Apple Touch Id, Macos

Google, Facebook Amp Up Authentication With Security Keys

Now Facebook and Google Suite users can use a security key to authenticate and verify their identities during login.

2fa, Google, Facebook, Security Keys, Mfa

Banking Malware Dridex Targets U.K. Financial Institutions

A number of U.K.-based financial institutions were hit by a wave of financial banking malware, delivered via phishing email campaigns. Dridex is back this year with new techniques to bypass security and steal user data.

Financial Data Security, Banking Malware, Banking Trojans, Dridex

The Latest Phishing Attacks Target Gmail, Microsoft Word & Android Apps

Recently, phishing attacks against Gmail users, a major U.S. financial services provider, and Android app users have revealed unique ways to deliver malware and steal login credentials.

Phishing, Google, Microsoft, Android

The Weird World of Attribution

Duo Labs researcher Mark Loveless explores the importance of attribution and how it can be helpful if your company is attacked.

Security Research

Why the MongoDB Ransomware Shouldn’t Surprise Anyone

Recent reports have discovered MongoDB instances being targeted with ransomware, with over 28,000 unique cases of ransomware from multiple actors targeting MongoDB hosts. Learn about exposed instances and get some helpful tips and resources on securing a MongoDB deployment.

Mongodb, Ransomware, Database Security

New Cybersecurity Regulation for NY Financial Services

Banking, insurance and other financial services must follow new cybersecurity regulation recently released by the New York State Dept. of Financial Services by March 1, 2017.

Financial Data Security, Banking Security

Is Your Healthcare Organization Ready for the HIPAA Security Audits?

The Office for Civil Rights is conducting audits of healthcare providers and business associates. The goal is to assess HIPAA compliance efforts and discover new security risks.

Hipaa Audits, Healthcare Security, Health Data Security

Holiday Travel Security & Privacy Tech Tips

Holiday travel tests your personal data security. It’s easier to keep your money, identity and tech safe with tips from Duo’s Senior Security Researcher.

Security Tips, Travel, Infosec, Information Security, Identity Theft Protection, Duo Security, 2fa

How Secure is the Retail Industry’s Infrastructure Today?

Retailers and consumers can better secure payment data. Tactics like two-factor authentication and wireless payment technologies offer secure paths forward.

Retail Cybersecurity, Retail Data Security, Duo Security Summit, Duo Push, 2fa

Security Projects to Keep an Eye on in 2017

Infosec is constantly evolving. We asked one of our security researchers to share some of the most exciting projects to keep an eye on in 2017.

Information Security, Infosec, Metron, Binary Analysis

Unicorn Wrangling 101: What is a Backdoor?

What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.

Mobile, Backdoors, Android