Two-factor authentication (2FA) is a commonly used means of securing access to website accounts through easily understood login procedures. Once the user provides the required information, whether a password or site generated code, a session cookie is generated and a secure session is established between the user and the site. But what if an unauthorized person eavesdrops and collects the 2FA information or session cookie?
Read more »Tag: 2fa
-
Modlishka – Exploiting Two-Factor Authentication Posted on: January 22, 2019 In: Data Privacy & Cybersecurity
Blog Search
Featured Posts
- December 04, 2020 Respect and Communication: Pathways to Productive and Satisfied Employees
- December 03, 2020 The Second Wave is Here – N.J. Executive Order 192 Imposes New Pandemic-Related Requirements for Employers
- November 10, 2020 California Voters Make CCPA 2.0 a Reality – California Privacy Rights Act Ballot Measure Passes
- May 29, 2020 Seventh Circuit Court of Appeals Recent Decision in Molson-Coors v. Anheuser-Busch Affirms Lesson: Choose Words Wisely
Blog Tags
alabama
arkansas
audit
bank secrecy act
biometric data
breach notification
california
canada
ccpa
client notification
coast guard
colorado
congress
consumer notification
coronavirus
covid-19
cpra
credit card fraud
cryptocurrency
cybersecurity
cyber threat
data breach
data privacy
data security
department of state
ebt
electronic benefit transfer
email
employment
equifax
eu
eu-u.s. privacy shield
eu-us privacy shield
european union
executive order
fbi
fcc
fcra
federal trade commission
forensic investigation
fraud
gdpr
genetic data
genetic testing
hacking
healthcare
hhsocr
hipaa
holiday season
homeland security
human resources
identity fraud
identity theft
iepa
illinois
information security
insurance
insurance industry
internet
irs
legislative alert
malware
managed service providers
maryland
meltdown
microsoft office 365
multi-factor identification
new jersey
new mexico
new york
ninth circuit
nist security controls
office for civil rights
passwords
personal data
personal information
phishing
privacy
protected health information
ransomware
regulations
research
scare scam
scareware
search warrant
security rule
social engineering
social media
statute
supreme court
tax returns
twea
utah
video-teleconferencing
virginia
w2
washington
websites
workplace policy
zoom