two-factor   272

« earlier    

How to Protect Your Phone Against a SIM Swap Attack | WIRED
Your phone number is increasingly tied to your online identity. You need to do everything possible to protect it.
security  mobile  two-factor 
6 weeks ago by soepstad
We Need to Talk About NIST’s Dropped Password Management Recommendations
Recently, NIST reversed its stance on organizational password management requirements. The institute now recommends banishing forced periodic password changes and getting rid of complexity requirements.
data  protection  identity  &  access  biometric  security  fraud  prevention  multifactor  authentication  (mfa)  password  management  reuse  passwords  awareness  two-factor  (2fa) 
6 weeks ago by SecurityFeed
Überprüfungscode erhalten und mit der Zwei-Faktor-Authentifizierung anmelden - Apple Support
Bei der Zwei-Faktor-Authentifizierung benötigen Sie einen Bestätigungscode, um sich mit Ihrer Apple-ID auf einem neuen Gerät oder in einem neuen Browser anzumelden.
reference  two-factor  kbase  support  code  privacy  apple  Zwei-Faktor-Authentifizierung  security  appleid 
11 weeks ago by ferdinandfuchs
SMS Two-Factor Auth Isn’t Perfect, But You Should Still Use It
In a quest for perfect security, the perfect is the enemy of the good. People are criticizing SMS-based two-factor authentication in the wake of the Reddit hack, but using SMS-based two factor is still much better than not using two-factor authentication at all.
security  two-factor  2fa 
august 2018 by kger
Reddit user data compromised in sophisticated hack | Technology | The Guardian
Reddit uses the common SMS-based two-factor authentication to protect its employee accounts, requiring a one-time passcode to be entered alongside a username and password.

However, Reddit said hackers had intercepted those text messages.

Keith Graham, chief technology officer for SecureAuth + Core Security, said: “While SMS-based authentication is popular and much more secure than password alone, it’s widely known to be vulnerable to cybercriminals who have hacked many celebrities using this method.

Graham explained that cybercriminals are capable of gaining access to a phone number to which an SMS two-factor code is sent. He said: “For example, a cybercriminal would simply need to give a wireless provider an address, last 4 digits of a social security number and perhaps a credit card to transfer a phone number.

“This is exactly the type of data that is widely available on the dark web thanks to large database breaches like Equifax.”
2FA  two-factor  security  reddit 
august 2018 by dominomaster
Mit der Account-Wiederherstellung über eine Zwei-Faktor-Authentifizierung Apple-ID wiederherstellen - Apple Support
Wenn Sie die Zwei-Faktor-Authentifizierung verwenden und sich weder mit Ihrer Apple-ID anmelden noch Ihr Passwort zurücksetzen können, erhalten Sie mit der Account-Wiederherstellung wieder Zugriff auf Ihren Account.
reference  two-factor  password  kbase  restore  apple  howto  reset  appleid 
april 2018 by ferdinandfuchs
Command line 2FA tool.
2fa  oauth  two-factor  cli 
april 2018 by brunns
Zwei-Faktor-Authentifizierung für die Apple ID - Macwelt
Die Bestätigung in zwei Stufen hat ausgedient, ebenso der Wiederherstellungssschlüssel. Seit iOS 11 und macOS High Sierra setzt Apple allein auf die 2FA.
reference  two-factor  password  ios  appleid  apple  macos  2fa  security  howto 
september 2017 by ferdinandfuchs

« earlier    

related tags

$23m  &  (2fa)  (mfa)  2-factor  2  2015  2017  2fa  aaa  access  account  accounts  administration  advice  alternatives  amazon  and  android  api  apple-watch  apple  appleid  at&t  attack  audit  auditing  auth  authentication  authenticaton  authenticator  authentification  authorization  awareness  biometric  cli  code  computer  confluence  crime  crypto  cryptocurrency  cryptography  cryptopocalypse  cyber  cyberduck  data  ddos  deconstructed  development  devise  diigo  django  duo  ec2  email  encryption  facebook  factor  fido  flask  flaws  fraud  freeipa  gem  gets  go  golang  google  google_authenticator  googleauthenticator  gpg  guide  hardware  homekit  hotp  how  howto  hsm  htop  icloud  id  identification  identity  idm  ifttt  integrity  internet  ios  it  javascript  kbase  lastpass  lesson  lib  lifehacker  linux  lists  login  macos  malware  management  medium  mfa  mobile  multi-factor  multifactor  mytoolbox  nexmo  nist  node.js  oauth  office365  one-time  online  openssh  osx  otp  over  pam  password  passwords  phishing  playstation  plugins  policy  postjd  prevention  privacy  programming  protect  protection  radius  rails  reddit  reference  reset  restore  reuse  review  rhel  saas  scam  security  server  service  setup  sftp  silverstripe  smartcard  sms  ssh  ssl  start-up  sued  support  sysadmin  system  talk  technology  theft  tips  to  totp  tricks  truecar  tutorial  twitter  two-factor-authentication  two-step  two  u2f  ubuntu  uibikey  usb  verify  video  war  web-development  web  with  wordpress  your  zwei-faktor-authentifizierung  zweistufige-bestaetigung 

Copy this bookmark: