Password standards: 2024 requirements
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
46 articles
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Two-factor authentication protects your account from theft — until you yourself give away your one-time password.
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
How to secure chats on your phone, and why encryption alone is not enough
What two-factor authentication types are out there, and which ones should be preferred.
What multi-factor authentication is, why you should use it, and what “factors” there are.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
How authenticator apps work and what alternatives there are to Google Authenticator.
And more importantly — how to stop your passwords from being used by cybercriminals.
We review a recent study on biometric authentication that uses breath analysis.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.