FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayInfoSec Resources

Brand impersonation attacks targeting SMB organizations

By Susan Morrow

Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers and company. Brand trust and loyalty go hand-in-hand. Research has shown that 80% of US customers look at the trustworthiness of a brand […]

The post Brand impersonation attacks targeting SMB organizations appeared first on Infosec Resources.


Brand impersonation attacks targeting SMB organizations was first posted on October 21, 2020 at 8:05 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

How to avoid getting locked out of your own account with multi-factor authentication

By Greg Belding

Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond the basic password security measures by forcing the user to authenticate with another method that (presumably) only the legitimate user has access to.Β  […]

The post How to avoid getting locked out of your own account with multi-factor authentication appeared first on Infosec Resources.


How to avoid getting locked out of your own account with multi-factor authentication was first posted on October 19, 2020 at 8:00 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

How to find weak passwords in your organization’s Active Directory

By Claudio Dodt

Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There are several security controls designed specifically to enforce confidentiality requirements, but one of the oldest and best known is the use of passwords. […]

The post How to find weak passwords in your organization’s Active Directory appeared first on Infosec Resources.


How to find weak passwords in your organization’s Active Directory was first posted on October 14, 2020 at 8:00 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

How hackers use CAPTCHA to evade automated detection

By Dan Virgillito

Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals β€” you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA too. CAPTCHA was invented to help sites distinguish human users from bots and automated […]

The post How hackers use CAPTCHA to evade automated detection appeared first on Infosec Resources.


How hackers use CAPTCHA to evade automated detection was first posted on October 13, 2020 at 8:00 am.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
❌