What is a mobile possession factor – and how can it replace passwords to stop phishing?
By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – […] The…
By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – […] The…
Comcast Xfinity customers report their accounts being hacked in widespread attacks that bypass two-factor authentication. These compromised accounts are then…
A fake Android SMS application, with 100,000 downloads on the Google Play store, has been discovered to secretly act as…
Dropbox disclosed a security breach after threat actors stole 130 code repositories after gaining access to one of its GitHub…
The BazarCall malicious operation has evolved its social engineering methods, keeping the old fake charges lure for the first phase…
Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. One component…
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some…
The threat actor behind the Twilio hack used their access to steal one-time passwords (OTPs) delivered over SMS to from…
A new credit card stealing campaign is underway in Singapore, snatching the payment details of sellers on classifieds sites through…
A new large-scale phishing campaign targeting credentials for Microsoft email services use a custom proxy-based phishing kit to bypass multi-factor…