Device code phishing abuses the OAuth device flow, and Google and Azure produce strikingly different attack surfaces. Register for Huntress Labs' Live Hack to learn about attack techniques, defensive ...
Passwords and app-based MFA add hidden costs through lost productivity, frequent resets, and risk of phishing and social ...
BIO-key® International, Inc. (NASDAQ: BKYI), an innovative provider of workforce and customer identity and access management ...
The Internet Engineering Task Force (IETF) --the organization that develops and promotes Internet standards-- has approved three new standards this week designed to improve the security of ...
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick ...
Method offers security without additional equipment costs. A recently developed identification authentication system permits personnel to receive single-use passwords via wireless devices, allowing ...
NinjaLab, a security research company, has discovered a vulnerability that would allow bad actors to clone YubiKeys. As the company has explained in a security advisory, NinjaLab found a vulnerability ...
In today's rapidly evolving identity landscape, organizations are accelerating their adoption of cloud-first strategies (specifically by modernizing identity infrastructure through the adoption of ...
Every business needs a secure way to collect, manage, and authenticate passwords. Unfortunately, no method is foolproof. Storing passwords in the browser and sending one-time access codes by SMS or ...
As Entrust Inc. enters the hardware token market selling tiny one-time password (OTP) tokens at $5 each, analysts say the vendor's entry into the market could drive down prices across the board. RSA ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results