Remove 11
Remove 2017 Remove Authentication Remove Education Remove IT
article thumbnail

The bleak picture of two-factor authentication adoption in the wild

Elie

This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption. reuse of passwords found in data breaches and phishing attacks. dongleauth.info. dongleauth.info.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017. The FaceTime bug definitely proves that your phone can be used as a remote listening device "without any authentication" — Marcus J.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

19, 2022, President Biden signed the National Security Memorandum, which implemented requirements from EO 14028 by setting out specific cyber requirements for government agencies and contractors, such as multifactor authentication, encryption, cloud technologies, and endpoint detection services. Not anymore. More recently, on Feb.

article thumbnail

Jamaica’s New Privacy Protection Bill

Data Matters

On 10 October 2017, Jamaica introduced into its House of Parliament a comprehensive Bill for privacy and data protection, entitled “An Act to Protect the Privacy of Certain Data and for Connected Matters.” The new law would cover personal data, including data in an “accessible record” such as a health record or an educational record.

Privacy 68