Tag Archives: authentication

2-Factor and Multi-Factor Authentication

Talking about authentication just isn’t complete without mentioning 2-Factor Authentication (2FA) and Multi-Factor Authentication (MFA). Judging from the piling evidence of data breaches and weak password tendencies, using just a password as your only line of defense seems… risky. Let’s … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Alternatives to Remembering Passwords

It seems in today’s world, with such large parts of our lives online and intertwined with smart devices, everything has a password. To talk to your friends, perform banking transactions, order takeout and even to pay your bills, it all … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

Data Breaches: Why You Should Update Your Old Passwords

Having a strong password is great when it comes to securing your account against traditional brute force and dictionary attacks. However, credential stuffing leverages passwords exposed in data breaches to crack accounts. More information about the different types of authentication … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , | Leave a comment

How Email Administrators Can Improve Authentication Security

The previous articles about authentication attacks focused on how an end user identifies and protects themselves from authentication attacks. But what about protecting the server itself, and all user accounts, from such attacks? This article goes over what can be … Continue reading

Posted in Informative | Tagged , , , , , , , , , , , , , , | Leave a comment

What is an Authentication Attack

“My account has been hacked!” It’s probably not the first time that you’ve heard those words, but what exactly does it mean for your account to be hacked? I’m not referring to cases where your Ex guessed your password and … Continue reading

Posted in Informative | Tagged , , , , , , | Leave a comment

SMTP AUTH Attacks, How Big is the Problem Really?

The duties of a Spam Auditor involves more than just spam filtering; it also covers other suspicious mail server activity. One example of suspect mail server activity is SMTP Auth attacks. Such attacks can be carried by a single attacker, … Continue reading

Posted in Informative | Tagged , , , , | Leave a comment