thu@duosecurity.com

9 Articles

Disrupting Nation State Hackers With the Security Basics

Earlier this year at the USENIX Enigma information security conference held in…

Flash Vulnerabilities & Exploits: An Information Security Primer

Adobe Flash Player is used to create and play animations, video games,…

thu@duosecurity.com thu@duosecurity.com 10 Min Read

Data Breach Lawsuits Revived: Court Turns in Favor of Consumers

A data breach may be in the news one week and out…

Securing Against Domain Hijacking with Strong Access Controls

Hosting registrars for regional Lenovo and Google domains were hijacked last month,…

Criminals Leverage Apple Pay for Fraud: Banks Boost Authentication Security

Apple Pay hasn’t been hacked. But it does provide a new way…

Attackers Find Value in the Master Key to Password Managers

A treasure trove of passwords, plus the keys to unlock multiple accounts…

Dynamic Cybersecurity Needs: Reassessing Security

As a recent report on Defending Data by Nuix found, cybersecurity needs…

Where on Earth Are My Users?

IT administrators have plenty of logs to pour through. With a bit…

Answer to OTP Bypass: Out-of-Band Two-Factor Authentication

Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly…