Two-Factor Authentication Requirements: The Basics
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.
At RSA Conference, we'll announce the general availability of Touch ID as a WebAuthn MFA method in Google Chrome.
To provide users and IT teams with actionable intelligence about Chrome extensions, Duo Labs is excited to announce the public beta of CRXcavator (rhymes with “excavator”), a free service that analyzes Chrome extensions and produces comprehensive security reports.
Duo Labs is releasing an open-source Android library that serves as a WebAuthn authenticator, supporting hardware-backed keys and biometric user verification.
The Department of Homeland Security (DHS) made a curious announcement during the shutdown that had everyone scratching their collective heads ... at first. DHS gave agencies 10 days to get their account security in order, specifically calling out two-factor authentication (2FA) and other protections due to DNS hijacking vulnerabilities.
The latest evolution in phishing is the Modlishka tool, which provides the attacker a simple tool to use a reverse proxy to place the attacker between the user and the target site. The user’s traffic passes through the tool and can capture SMS-based 2FA tokens. Here, we look at how to counter modern phishing attacks with strong 2FA and a defense in depth strategy.
The new Guide to Web Authentication aims to provide a useful developer resource for engaging with WebAuthn to replace or supplement password-based authentication on your own websites.
An overview of methods used in the wild to detect jailbreaks, as well as methods used to evade detection.
What do usability lessons mean for the future of security technology? Learn about how passwordless authentication, WebAuthn, U2F and zero-trust networking are revolutionizing how we securely log in.