IT
1091 views

Disrupting Nation State Hackers With the Security Basics

thu@duosecurity.com - April 6, 2016

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to…

Security
1491 views

Flash Vulnerabilities & Exploits: An Information Security Primer

thu@duosecurity.com - January 12, 2016

Adobe Flash Player is used to create and play animations, video games, advertisements and mobile apps - it’s considered a software necessity by many users and is…

Uncategorized
924 views

Data Breach Lawsuits Revived: Court Turns in Favor of Consumers

thu@duosecurity.com - July 30, 2015

A data breach may be in the news one week and out the other, but the real lasting business impact and consumer effects can be felt long…

Uncategorized
1001 views

Securing Against Domain Hijacking with Strong Access Controls

thu@duosecurity.com - April 2, 2015

Hosting registrars for regional Lenovo and Google domains were hijacked last month, prompting a focus on the security of hosting vendors. Domain hijacking is an attack against…

Uncategorized
1047 views

Criminals Leverage Apple Pay for Fraud: Banks Boost Authentication Security

thu@duosecurity.com - March 13, 2015

Apple Pay hasn’t been hacked. But it does provide a new way to commit fraud. As The Wall Street Journal reported, criminals are loading stolen credit card…

Uncategorized
909 views

Attackers Find Value in the Master Key to Password Managers

thu@duosecurity.com - December 1, 2014

A treasure trove of passwords, plus the keys to unlock multiple accounts - open-source password managers and cryptographic software client are being hit with a variant of…

Data Management
933 views

Dynamic Cybersecurity Needs: Reassessing Security

thu@duosecurity.com - November 30, 2014

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have…

Uncategorized
818 views

Where on Earth Are My Users?

thu@duosecurity.com - August 29, 2014

IT administrators have plenty of logs to pour through. With a bit of digging, admins can discover where login attempts are coming from, but doing this for…

Uncategorized
1580 views

Answer to OTP Bypass: Out-of-Band Two-Factor Authentication

thu@duosecurity.com - July 30, 2014

Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly news to those in the tech world, but it is well-packaged and even branded with…