Here’s what to know about attacks where a fraudster has your number, literally and otherwise
The post SIM swap scam: What it is and how to protect yourself appeared first on WeLiveSecurity
Here’s what to know about attacks where a fraudster has your number, literally and otherwise
The post SIM swap scam: What it is and how to protect yourself appeared first on WeLiveSecurity
This won’t be music to your ears – researchers spot an unsecured database replete with records used for an account hijacking spree
The post Up to 350,000 Spotify accounts hacked in credential stuffing attacks appeared first on WeLiveSecurity
The peace of mind that comes with connected home security gadgets may be false – your smart doorbell may make an inviting target for unwanted visitors
The post Security flaws in smart doorbells may open the door to hackers appeared first on WeLiveSecurity
Lazarus takes aim at South Korea via an unusual supply-chain attack – The harsh reality of poor passwords – Bumble bitten by bugs
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
From the impact of the pandemic on cybersecurity careers to workers’ job satisfaction, the report offers a number of interesting findings
The post 5 takeaways from the 2020 (ISC)<sup>2</sup> Cybersecurity Workforce Study appeared first on WeLiveSecurity
They’re supremely easy to remember, as well as easy to crack. Here’s how to improve your password security.
The post The worst passwords of 2020: Is it time to change yours? appeared first on WeLiveSecurity
The information at risk of theft due to API flaws included people’s pictures, locations, dating preferences and Facebook data
The post Bumble bugs could have exposed personal data of all users appeared first on WeLiveSecurity
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
The post Lazarus supply‑chain attack in South Korea appeared first on WeLiveSecurity
Security keys and your phone’s built-in security keys are reshaping the way users authenticate online. These technologies are trusted by a growing number of websites to provide phishing-resistant two-factor authentication (2FA). To help make sure that next generation authentication protocols work seamlessly across the internet, we are committed to partnering with the ecosystem and providing essential technologies to advance state-of-the-art authentication for everyone. So, today we are releasing a new open source security key test suite.
Under the hood, roaming security keys are powered by the FIDO Alliance CTAP protocols, the part of FIDO2 that ensures a seamless integration between your browser and security key. Whereas the security-key user experience aims to be straightforward, the CTAP protocols themselves are fairly complex. This is due to the broad range of authentication use cases the specification addresses: including websites, operating systems, and enterprise credentials. As the protocol specification continues to evolve—there is already a draft of CTAP 2.1—corner cases that can cause interoperability problems are bound to appear.
We encountered many of those tricky corner cases while implementing our open-source security-key firmware OpenSK and decided to create a comprehensive test suite to ensure all our new firmware releases handle them correctly. Over the last two years, our test suite grew to include over 80 tests that cover all the CTAP2 features.
Today we are making our test suite open source to allow security key vendors to directly integrate it into their testing infrastructure and benefit from increased testing coverage. Moving forward, we are excited to keep collaborating with the FIDO Alliance, its members, the hardware security key industry and the open source community to extend our test suite to improve its coverage and make it a comprehensive tool that the community can rely on to ensure key interoperability. In the long term, it is our hope that strengthening the community testing capabilities will ultimately benefit all security key users by helping ensure they have a consistent experience no matter which security keys they are using.
We thank our collaborators: Adam Langley, Alexei Czeskis, Arnar Birgisson, Borbala Benko, Christiaan Brand, Dirk Balfanz, Guillaume Endignoux, Jeff Hodges, Julien Cretin, Mark Risher, Oxana Comanescu, Tadek Pietraszek and all the security key vendors that worked with us.
ESET research uncovers a backdoor targeting POS systems – Why you shouldn’t share your Netflix password – Data of millions of hotel guests exposed
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity