Two-factor authentication (2FA) is a commonly used means of securing access to website accounts through easily understood login procedures. Once the user provides the required information, whether a password or site generated code, a session cookie is generated and a secure session is established between the user and the site. But what if an unauthorized person eavesdrops and collects the 2FA information or session cookie?
Read more »Tag: 2fa
-
Modlishka – Exploiting Two-Factor Authentication Posted on: January 22, 2019 In: Data Privacy & Cybersecurity
Blog Search
Featured Posts
- December 02, 2019 ‘Tis The Season: Online Shopping Tips
- November 18, 2019 Tax Considerations for Holiday Gifts to Employees
- November 05, 2019 Equal Pay and Barbie Dolls
- October 25, 2019 Amendments to the California Consumer Privacy Act Signed Into Law
- October 17, 2019 I Can’t Get Sued for Posting a Picture of Myself on Social Media… Can I?
- September 09, 2019 Ransomware Attack Trends: Tips for Prevention & Response
Blog Tags
aba
alabama
arkansas
audit
audit logging
biometric data
bitcoin
breach notification
california
ccpa
checklist
client notification
colorado
commission
congress
consumer notification
credit card fraud
cryptocurrency
cybersecurity
cyber threat
data breach
data privacy
data privacy directive
data protection officer
data security
delaware
department of commerce
employment
encryption attack
equifax
ethereum
ethics
eu
eu-u.s. data privacy shield
eu-u.s. privacy shield
european union
fbi
fcra
federal communication
federal trade commission
financial firms
financial fraud kill chain
fincen
forensics
gdpr
hacking
hippa
human resources
identity theft
illinois
incidence response plan
incident response
insider attacks
investigations
irs
legislative alert
malware
managed service providers
manufacturing
maryland
massachusetts
maze
microsoft office 365
multi-factor identification
net neutrality
new jersey
new mexico
new york
ninth circuit
nist security controls
nydfs
ocabr
online shopping
patching
personal data
personal information
phishing
privacy act
ransomware
rdp
regulations
remote desktop protocol
security posture assessment
security vulnerabilities
service provider agreement
social engineering
social media
spear-phishing
spokeo
statute
supreme court
tax returns
tennessee
third party
utah
virginia
virus
washington
wire transfers
workplace policy