Latest Posts with security tag

security

288 Articles 2 Followers


Your Next 2FA solution?

28 Sep 2020 1 minute read 0 comments scythenoz

I have recently gotten frustrated when I lost my phone and had to update my 2FA to a new device. I went through to different exchanges and there is a need for me to take a Selfie with my ID and a paper with the date on it. After doing so for a few ex...

15 Years of Mistakes: why everybody created insecure passwords

24 Sep 2020 4 minute read 0 comments Luca B

The previous article of this series has given an overview of the reasons why human-generated passwords are weak (they're already out there, they're predictable, and they're short) and what was the origin of all those bizarre password creation rules t...

Iranian Hacker Group Developed A Malware to Steal Google 2FA Codes!

22 Sep 2020 1 minute read 0 comments Yasin

An Iran-based cyber attack group called Rampant Kitten managed to steal Google 2FA codes with a new malware they developed. The software produced by the Rampant Kitten group mostly uses the Trojan model and is integrated into applications that seem h...

Best and Most Secured Hardware Wallet in the market

22 Sep 2020 1 minute read 3 comments Pogitsu Ph

Using hardware wallet does not make you invincible against social engineering, physical threats or human errors but it's definitely one level higher protecting your crypto assets especially when it's sizable and most recommended when HODLing coins an...

We Don’t Want IoT Cybersecurity Regulations

21 Sep 2020 2 minute read 2 comments Matthew Rosenquist

It simply makes no sense to call for IoT devices to be certified safe-and-secure.  Before you get bent out of shape, hear me out.  Regulations are unwieldy blunt instruments, best left as a last resort.  Cybersecurity regulations are not nimble, tend...

Zerologon - Security Newsletter

21 Sep 2020 1 minute read 2 comments ircrp

Last month Microsoft has patched one of the most serious vulnerability reported to the company ever, a bug that if abused would easily allow actors to overtake Windows Server running as domain controllers in enterprise networks. The vulnerability rec...

Tips for all of us to be more cyber secure

19 Sep 2020 1 minute read 1 comment Matthew Rosenquist

There are many cybersecurity aspects we cannot control in our digital world. It can make anyone feel powerless. But we can control how we act and the decisions we make as we interact online. Secure behaviors are tremendously powerful when it comes t...

Beware of Unified Cybersecurity Solutions Claiming to Help CISO's

17 Sep 2020 1 minute read 2 comments Matthew Rosenquist

I am seeing many security vendors developing products to unify solutions into a single management interface. I fear this is just a sales tactic to gain greater market share and not intended to help the plight of CISO’s A recent article from Computer...

The Hive account recovery probably doesn't work the way you think

13 Sep 2020 2 minute read 0 comments okean123

I'm writing this post because I have seen a lot of confusion and discussion about the account recovery feature on the Hive blockchain. It seems to me, that there is the idea that this feature can be used in many different situations, e.g. to recover...

Your Insecure Passwords and Where To Find Them

10 Sep 2020 4 minute read 0 comments Luca B

Passwords are one of the most common forms of authentication to confirm the identity of a user. As they provide the key to access accounts and services, it is fundamental to choose them carefully so that they cannot be easily guessed. In other words,...