Background Let us quickly cover how 2FA works. As well as what it has going for it. And, also some of its not so good. Set Up To set up 2FA, you register a phone number and choose verification method. Currently Supported Verification Methods includes:- Text Messages Apps Usage Login To log into your … Continue reading Two-Factor ( 2FA ) Authentication – Option – Text Message
TechRepublic
Jack Wallen:- Security – Why 2FA is failing and what should be done about it
Background I think this is an important testimony by Jack Wallen. Article Link Jack Wallen details a recent hack and why he believes one aspect of two-factor authentication is part of the problem. Recently, my PayPal account was hacked, and it’s not the first or second time it’s happened. Fortunately, I have enough alerts set … Continue reading Jack Wallen:- Security – Why 2FA is failing and what should be done about it
Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary
Background Let us quickly try out another of the freely available tools for detecting the Log4J security vulnerabilities. Lineage Log4j – Security Vulnerability – Detection Tools Link Log4j – Security Vulnerability – Detection Tool – CERT ( Community Emergency Response Team ) – PowerShell Script Link WhiteSource Our Story Here is a beautiful story: … Continue reading Log4j – Security Vulnerability – Detection Tool – WhiteSource – Windows Binary
You must be logged in to post a comment.