Security news that informs and inspires

All Articles

1198 articles:

Microsoft Patch: Update to Fix Actively Exploited Vulnerabilities

Recently, Microsoft patched a vulnerability that could be used in phishing attacks to direct users to malicious websites. The security update is available in March’s Patch Tuesday, which included two months of updates and 18 security bulletins - 9 of which were rated as critical.

Microsoft, Microsoft Security, Phishing, Duo Beyond, Device Insight, Endpoint Remediation

Attackers Actively Targeting Healthcare’s FTP Servers

The FBI has issued a private industry notification to the healthcare industry, warning organizations that attackers are actively targeting FTP (File Transfer Protocol) servers to access protected health information.

Healthcare Data Privacy, Healthcare Cybersecurity, Healthcare Data Breach, Healthcare Security, Hipaa Breach

Privacy & Security Challenges in Investigative Journalism

This blog covers a talk given by Knight-Wallace journalists Bastian Obermayer and Laurent Richard discussing privacy and security challenges in investigative journalism.

Privacy, Journalist Security, Whistleblower Security, Securedrop, Tor

Website Security: Protecting Against Spammers

There’s been a 32 percent increase in hacked sites from 2015 to 2016, with no expectations of the trend slowing down, according to Google. Here are some of the top ways that websites get hacked, and what you can do to protect your site against spammers.

Website Security, Spammers, Phishing, Brute Force, Duo Beyond

Securing Access After the Cloudflare Bug & Data Leaks

The Cloudflare data leak impacted several sites using the popular CDN. Resetting session tokens and enabling 2FA can help affected sites protect their users' credentials.

Data Breaches, 2fa, Access Security, Cloud

Flipping Bits and Opening Doors: Reverse Engineering the Linear Wireless Security DX Protocol

A security researcher on the Duo Labs team details how he found several vulnerabilities in a wireless physical security system.

Reverse Engineering, Dx Protocol, Wireless Security, Labs Research

You Got the Touch: First Impressions of the 2017 MacBook Pro

Here are some first impressions of a resident Apple nerd’s experience with the 2017 MacBook Pro with Touch Bar, including a review of the Secure Enclave Processor and Touch ID from a security perspective.

Apple Touch Id, Macos

Google, Facebook Amp Up Authentication With Security Keys

Now Facebook and Google Suite users can use a security key to authenticate and verify their identities during login.

2fa, Google, Facebook, Security Keys, Mfa

Banking Malware Dridex Targets U.K. Financial Institutions

A number of U.K.-based financial institutions were hit by a wave of financial banking malware, delivered via phishing email campaigns. Dridex is back this year with new techniques to bypass security and steal user data.

Financial Data Security, Banking Malware, Banking Trojans, Dridex

The Latest Phishing Attacks Target Gmail, Microsoft Word & Android Apps

Recently, phishing attacks against Gmail users, a major U.S. financial services provider, and Android app users have revealed unique ways to deliver malware and steal login credentials.

Phishing, Google, Microsoft, Android

The Weird World of Attribution

Duo Labs researcher Mark Loveless explores the importance of attribution and how it can be helpful if your company is attacked.

Security Research

Why the MongoDB Ransomware Shouldn’t Surprise Anyone

Recent reports have discovered MongoDB instances being targeted with ransomware, with over 28,000 unique cases of ransomware from multiple actors targeting MongoDB hosts. Learn about exposed instances and get some helpful tips and resources on securing a MongoDB deployment.

Mongodb, Ransomware, Database Security

New Cybersecurity Regulation for NY Financial Services

Banking, insurance and other financial services must follow new cybersecurity regulation recently released by the New York State Dept. of Financial Services by March 1, 2017.

Financial Data Security, Banking Security

Is Your Healthcare Organization Ready for the HIPAA Security Audits?

The Office for Civil Rights is conducting audits of healthcare providers and business associates. The goal is to assess HIPAA compliance efforts and discover new security risks.

Hipaa Audits, Healthcare Security, Health Data Security

Holiday Travel Security & Privacy Tech Tips

Holiday travel tests your personal data security. It’s easier to keep your money, identity and tech safe with tips from Duo’s Senior Security Researcher.

Security Tips, Travel, Infosec, Information Security, Identity Theft Protection, Duo Security, 2fa