Two-factor authentication (2FA) is a commonly used means of securing access to website accounts through easily understood login procedures. Once the user provides the required information, whether a password or site generated code, a session cookie is generated and a secure session is established between the user and the site. But what if an unauthorized person eavesdrops and collects the 2FA information or session cookie?Read more »
Modlishka – Exploiting Two-Factor Authentication Posted on: January 22, 2019 In: Data Privacy & Cybersecurity
- March 14, 2019 ‘Full Moon’ Costs Denied by Supreme Court in Oracle Copyright Case
- March 12, 2019 FLSA Double Time
- February 27, 2019 It’s a Bird, It’s a Plane, No… It’s Cryptojacking!
9th circuit aba agreements alabama america invents act american bar association arkansas audit biometric bipa bitcoin breach notification business california ccpa client notification confidentiality congress consent order consumer notification copyright critical security controls cryptocurrency cybersecurity cyber threat data breach data privacy data security department of financial services employee handbook employers employment essential employees eu eu-u.s. privacy shield european parliament european unioin european union fcra federal circuit federal trade commission fines first sale doctrine foreign filing full costs gdpr grace period hacking hippa huawei identity theft infringement innovation inter partes review irs it justice department malware michigan microsoft office 365 misconduct multi-factor identification naic new mexico new york nist security controls non-competition ocabr on-call oracle oregon passwords patent cooperation treaty patent litigation patents payroll penalties personal data pipeda ptab ransomeware ransomware redigi regulations reporting-time scheduling social engineering social media south dakota spokeo statute strikes supervisory authorities supreme court tax preparers tax returns trade secrets uspto virginia work policy