FreshRSS

🔒
☐ ☆ ✇ InfoSec Resources

Brand impersonation attacks targeting SMB organizations

By Susan Morrow — October 21st 2020 at 13:05

Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers and company. Brand trust and loyalty go hand-in-hand. Research has shown that 80% of US customers look at the trustworthiness of a brand […]

The post Brand impersonation attacks targeting SMB organizations appeared first on Infosec Resources.


Brand impersonation attacks targeting SMB organizations was first posted on October 21, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ InfoSec Resources

How to avoid getting locked out of your own account with multi-factor authentication

By Greg Belding — October 19th 2020 at 13:00

Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond the basic password security measures by forcing the user to authenticate with another method that (presumably) only the legitimate user has access to.  […]

The post How to avoid getting locked out of your own account with multi-factor authentication appeared first on Infosec Resources.


How to avoid getting locked out of your own account with multi-factor authentication was first posted on October 19, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ InfoSec Resources

How to find weak passwords in your organization’s Active Directory

By Claudio Dodt — October 14th 2020 at 13:00

Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There are several security controls designed specifically to enforce confidentiality requirements, but one of the oldest and best known is the use of passwords. […]

The post How to find weak passwords in your organization’s Active Directory appeared first on Infosec Resources.


How to find weak passwords in your organization’s Active Directory was first posted on October 14, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ InfoSec Resources

How hackers use CAPTCHA to evade automated detection

By Dan Virgillito — October 13th 2020 at 13:00

Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA too. CAPTCHA was invented to help sites distinguish human users from bots and automated […]

The post How hackers use CAPTCHA to evade automated detection appeared first on Infosec Resources.


How hackers use CAPTCHA to evade automated detection was first posted on October 13, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
❌