While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tool called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.
Two of the most disruptive and widely-received spam email campaigns over the past few months — including an ongoing sextortion email scam and a bomb threat hoax that shut down dozens of schools, businesses and government buildings late last year — were made possible thanks to an authentication weakness at GoDaddy.com , the world’s largest domain name registrar, KrebsOnSecurity has learned.
There is a certain tension among the private companies and the government when it comes to the sharing of data. While companies openly claim that they never share data with anyone including the government, we don’t always know if that’s true.
Companies have focused more on making the consumer recovery process from fraud and data breaches easier than on better security. Most people seem OK with that.
— Read on www.csoonline.com/article/3328555/security/maybe-we-have-the-cybersecurity-we-deserve.html
The Reason Software Remains Insecure
— Read on danielmiessler.com/blog/the-reason-software-remains-insecure/
Buying heavily discounted, popular software from second-hand sources online has always been something of an iffy security proposition. But purchasing steeply discounted licenses for cloud-based subscription products like recent versions of Microsoft Office can be an extremely risky transaction, mainly because you may not have full control over who has access to your data.
A new report from Motherboard today takes a look into the practices of US wireless carriers selling user location data to third-parties. While it’s often credit card and other financial companies buying the location data for fraud detection and more, Motherboard says some rogue third-parties have access to user location data and it’s landing the hands of bounty hunters and the black market. more… The post User location data sold by AT&T, T-Mobile, and Sprint is making its way to bounty hunters, says report appeared first on 9to5Mac .