article thumbnail

Episode 245: How AI is remaking knowledge-based authentication

The Security Ledger

Six decades in, password use has tipped into the absurd, while two-factor authentication is showing its limits. We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. 60 years in, passwords at a breaking point. Read the whole entry. »

article thumbnail

E-Verify’s “SSN Lock” is Nothing of the Sort

Krebs on Security

One of the most-read advice columns on this site is a 2018 piece called “ Plant Your Flag, Mark Your Territory ,” which tried to impress upon readers the importance of creating accounts at websites like those at the Social Security Administration , the IRS and others before crooks do it for you. DHS’s myE-Verify homepage.

Passwords 275
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experian, You Have Some Explaining to Do

Krebs on Security

In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Turner said he created the account at Experian in 2020 to place a security freeze on his credit file, and that he used a password manager to select and store a strong, unique password for his Experian account.

Passwords 305
article thumbnail

Top Open Source Security Tools

eSecurity Planet

But that success and the openness inherent in the community have led to a major challenge – security. Therefore, any security vulnerabilities are disclosed publicly. This has given rise to a large number of open source security tools. The Best Open Source Security Tools. WhiteSource.

Security 132
article thumbnail

Bank Attacks Put Password Insecurity Back in the Spotlight

The Security Ledger

Two separate attacks on banks in the United States and Pakistan revealed this week highlight once again the inherent weakness of a security practice that relies on passwords or knowledge-based credentials to protect critical information. Read the whole entry. »

article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

It’s no secret that passwords have become one of the weakest links in enterprise security. Zero Trust approaches are crucial in helping modern organisations achieve better security outcomes. Zero Trust Security. It has recently become a hot buzzword, but what is Zero Trust Security? Tue, 08/16/2022 - 06:32.

article thumbnail

How to Use MITRE ATT&CK to Understand Attacker Behavior

eSecurity Planet

MITRE ATT&CK (“miter attack”) is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate security issues and get examples of common tactics and techniques used by threat actors.

Analytics 102