S3 Ep67: Tax scams, carder busts and crypto capers [Podcast + Transcript]
Credit to Author: Paul Ducklin| Date: Thu, 27 Jan 2022 19:57:06 +0000
Latest episode – listen now!
Read moreCredit to Author: Paul Ducklin| Date: Thu, 27 Jan 2022 19:57:06 +0000
Latest episode – listen now!
Read moreCredit to Author: Lisa Vaas| Date: Tue, 17 Mar 2020 10:51:21 +0000
What a nightmare: your phone goes dead, and you can’t log into your bank account because it’s controlled by a hacker who’s draining you dry.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ORrtEW70IY8″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 20 Feb 2020 10:03:25 +0000
Amazon is following Google’s lead by forcing all users to use two-factor authentication when logging into their Ring accounts.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ZP4hOfnjH24″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: John E Dunn| Date: Wed, 19 Feb 2020 11:00:53 +0000
OpenSSH version 8.2 is out and the big news is that the world’s most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/sDQy3vGdNuw” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 13 Feb 2020 12:45:23 +0000
The FBI’s Internet Crime Report shows that business email comprise is the biggest money-maker for cybercriminals.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/z_YNbnD3_LU” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Thu, 13 Feb 2020 11:06:09 +0000
Nest users who aren’t using 2FA or a Google account will be required to take an extra step by verifying their identity via email.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/LX4OPw0ys9w” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: John E Dunn| Date: Wed, 05 Feb 2020 11:20:13 +0000
It relates to Twitter’s contact upload feature, which allows users to find others via contact info such as email or phone number.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/JjUJFBQ-IaQ” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: John E Dunn| Date: Mon, 03 Feb 2020 12:54:31 +0000
Apple thinks it’s come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/EmuD8lIFjiU” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Danny Bradbury| Date: Mon, 23 Dec 2019 11:03:45 +0000
Facebook clearly likes to use as much of your personal data as it feels it can, and that includes the phone number linked to your 2FA setting.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/8FHvy_UlUI0″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Lisa Vaas| Date: Fri, 20 Dec 2019 10:34:49 +0000
Once again, it reins supreme as the #1 smelliest old fish of a password on the list of ones that most frequently turn up in data breaches.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/6BuJWYChc5Q” height=”1″ width=”1″ alt=””/>
Read more