As you rush to buy something for your mom, con artists will be trying to make a dent in your wallet. Here are some common types of fraud to look out for not only this Mother’s Day.

The post Scams to watch out for not just this Mother’s Day appeared first on WeLiveSecurity


Today is World Password Day, and we found it fitting to release an update that’ll make it even easier for users to manage Google Authenticator 2-Step Verification (2SV) codes across multiple devices. We are introducing one of the most anticipated features – allowing users to transfer their 2SV secrets, the data used to generate 2SV codes across devices that have Google Authenticator installed. For instance, when upgrading from an old phone to a new phone. This feature has started rolling out and is available in the latest version (5.10) of Google Authenticator on Android.

Transferring accounts from one device to another with Google Authenticator

Using 2SV, 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) is critical to protecting your accounts from unauthorized access. With these mechanisms, users verify their identity through their password and an additional proof of identity, such as a security key or a passcode.

Google Authenticator makes it easy to use 2SV on accounts. In addition to supplying only a password when logging in, a user also enters a code generated by the Google Authenticator app on their phone. This is a safer alternative, used by millions of users, compared to passcodes via text message.

Users place their trust in Google Authenticator to keep their accounts safe. As a result, security is always a high priority. We made several explicit design decisions to minimize the attack surface while increasing the overall usability of the app. 

  • We ensured that no data is sent to Google’s servers during the transfer — communication is directly between your two devices. Your 2SV secrets can’t be accessed without having physical access to your phone and the ability to unlock it.
  • We implemented a variety of alerting mechanisms and in-app logs to make sure users are aware when the transfer function has been used.

You can find more information about the Google Authenticator and its usage guide here.

The pandemic has highlighted the need for businesses to act with alacrity and prepare for the long haul – and to do so with cybersecurity in mind

The post Digital transformation could be accelerated by COVID‑19 appeared first on WeLiveSecurity

Password recycling or using easy-to-guess passwords are just two common mistakes you may be making when protecting your digital accounts

The post 5 common password mistakes you should avoid appeared first on WeLiveSecurity

An unknown threat actor is exploiting vulnerabilities in plugins for which patches have been available for months, or even years

The post Almost a million WordPress websites targeted in massive campaign appeared first on WeLiveSecurity

…and why are they selling it to other security vendors and product testers?

The post Professional data leakage: How did that security vendor get my personal data? appeared first on WeLiveSecurity

Ghost wasn’t the only victim of break-ins over the weekend that exploited critical holes in infrastructure automation software for which patches were available

The post Ghost blogging platform servers hacked to mine cryptocurrency appeared first on WeLiveSecurity

ESET’s new Threat Report is out – Another deep dive into Latin American banking trojans – More coronavirus-themed scams

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it’s worth

The post It’s no time to let your guard down as coronavirus fraud remains a threat appeared first on WeLiveSecurity

The email includes the potential victim’s password as evidence of a hack, but there is more than meets the eye

The post Sextortion scammers still shilling with stolen passwords appeared first on WeLiveSecurity