What does Transparent 2FA Solve?

Our previous article goes over 2FA/MFA and how it drastically cuts down the threat of automated authentication attacks. Despite the benefits, the adoption of 2FA is limited. The process of enabling and using 2FA creates extra steps for the user, … Continue reading

Posted in Informative | Tagged , , , , , | Leave a comment

2-Factor and Multi-Factor Authentication

Talking about authentication just isn’t complete without mentioning 2-Factor Authentication (2FA) and Multi-Factor Authentication (MFA). Judging from the piling evidence of data breaches and weak password tendencies, using just a password as your only line of defense seems… risky. Let’s … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Alternatives to Remembering Passwords

It seems in today’s world, with such large parts of our lives online and intertwined with smart devices, everything has a password. To talk to your friends, perform banking transactions, order takeout and even to pay your bills, it all … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Data Breaches: Why You Should Update Your Old Passwords

Having a strong password is great when it comes to securing your account against traditional brute force and dictionary attacks. However, credential stuffing leverages passwords exposed in data breaches to crack accounts. More information about the different types of authentication … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , | Leave a comment

How Email Administrators Can Improve Authentication Security

The previous articles about authentication attacks focused on how an end user identifies and protects themselves from authentication attacks. But what about protecting the server itself, and all user accounts, from such attacks? This article goes over what can be … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , , | Leave a comment

What is an Authentication Attack

“My account has been hacked!” It’s probably not the first time that you’ve heard those words, but what exactly does it mean for your account to be hacked? I’m not referring to cases where your Ex guessed your password and … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Blocklists are for more than just Spam

Blocklists, also known as Real-time Blackhole Lists (RBL) or Domain Name System-based Blackhole Lists (DNSBL), have historically been used to reject or flag email. This is typically done by checking whether the IP address of the sending mail server is … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Trends in Networks: Spam #19

What else can be said about the Freenom and .xyz TLD abuse on Digital Ocean at this point. Perhaps it is time to just accept that email from these TLDs should never be accepted from the Digital Ocean network. Feb26 … Continue reading

Posted in Informative | Tagged , , , , , , , , , , | Leave a comment

Trends in Networks: Spam #18

It’s a shame that such simple fixes can’t or won’t be done by a company to make the world a better place. I wonder if the money is really worth knowingly turning a blind eye to malicious activity, activity that … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , | Leave a comment