thu@duosecurity.com

9 Articles

Disrupting Nation State Hackers With the Security Basics

Earlier this year at the USENIX Enigma information security conference held in…

thu@duosecurity.com
5 Min Read

Flash Vulnerabilities & Exploits: An Information Security Primer

Adobe Flash Player is used to create and play animations, video games,…

thu@duosecurity.com
10 Min Read

Data Breach Lawsuits Revived: Court Turns in Favor of Consumers

A data breach may be in the news one week and out…

thu@duosecurity.com
6 Min Read

Securing Against Domain Hijacking with Strong Access Controls

Hosting registrars for regional Lenovo and Google domains were hijacked last month,…

thu@duosecurity.com
5 Min Read

Criminals Leverage Apple Pay for Fraud: Banks Boost Authentication Security

Apple Pay hasn’t been hacked. But it does provide a new way…

thu@duosecurity.com
6 Min Read

Attackers Find Value in the Master Key to Password Managers

A treasure trove of passwords, plus the keys to unlock multiple accounts…

thu@duosecurity.com
4 Min Read

Dynamic Cybersecurity Needs: Reassessing Security

As a recent report on Defending Data by Nuix found, cybersecurity needs…

thu@duosecurity.com
4 Min Read

Where on Earth Are My Users?

IT administrators have plenty of logs to pour through. With a bit…

thu@duosecurity.com
5 Min Read

Answer to OTP Bypass: Out-of-Band Two-Factor Authentication

Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly…

thu@duosecurity.com
8 Min Read