Tag Archives: authentication attack

2-Factor and Multi-Factor Authentication

Talking about authentication just isn’t complete without mentioning 2-Factor Authentication (2FA) and Multi-Factor Authentication (MFA). Judging from the piling evidence of data breaches and weak password tendencies, using just a password as your only line of defense seems… risky. Let’s … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Data Breaches: Why You Should Update Your Old Passwords

Having a strong password is great when it comes to securing your account against traditional brute force and dictionary attacks. However, credential stuffing leverages passwords exposed in data breaches to crack accounts. More information about the different types of authentication … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , | Leave a comment

How Email Administrators Can Improve Authentication Security

The previous articles about authentication attacks focused on how an end user identifies and protects themselves from authentication attacks. But what about protecting the server itself, and all user accounts, from such attacks? This article goes over what can be … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , , | Leave a comment

What is an Authentication Attack

“My account has been hacked!” It’s probably not the first time that you’ve heard those words, but what exactly does it mean for your account to be hacked? I’m not referring to cases where your Ex guessed your password and … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Blocklists are for more than just Spam

Blocklists, also known as Real-time Blackhole Lists (RBL) or Domain Name System-based Blackhole Lists (DNSBL), have historically been used to reject or flag email. This is typically done by checking whether the IP address of the sending mail server is … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

New Botnet Activity Targeting Email Accounts

In the past week a new and emerging pattern is being observed which indicates cyber criminals have refined their techniques around attacking email accounts with the end goal of compromising the accounts for malicious purposes. Method A Botnet is being … Continue reading

Posted in Informative | Tagged , , , , , , , , | Leave a comment