Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ‘2FA’.
Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication being rolled out to versions of Office 365 this week.
Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse – but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.
Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a new, advanced Trojan, Hesperbot. But a new IBM system may help secure smartphones – by using near-field communications chips (NFC) for an additional layer of security. It’s the first system to allow “two-factor”
Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If you know my username on a computer system, you can check on what I do on that system through an audit trail, and I can therefore be held accountable for those actions. However,