Phishing scam emails, purporting to come from Apple, are not an unusual sighting in users’ inboxes these days.
Phishing scam emails, purporting to come from Apple, are not an unusual sighting in users’ inboxes these days.
Two-Factor Authentication (2FA) has for years been one of the very dependable security technologies that was invoked to address high-risk scenarios — whether to safeguard enterprise resources accessed through the firewall, financial accounts, or — for high-value targets — protect each email login. Most people, to the extent that they spend time thinking about the […]
Here’s a polarizing question: is a phone a second factor, in the context of two-factor authentication? Fellow infosec pro @johnnysunshine tweeted the above last week, and sparked a lively debate. Before answering the question, let’s back up a bit and explain two-factor authentication (or 2fa). To borrow an analogy I first used two years ago: […]
Latest Comments